2025/04/30 13:30:59 Requesting https://server4:443/vvpyyzpsmy. 2025/04/30 13:30:59 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:59 Increased send buffer size to 14336 kiB 2025/04/30 13:30:59 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:59 Created qlog file: /logs/qlog/b2d211fe390191ec3f2beaf7cc0a22533e6e65.sqlog 2025/04/30 13:30:59 client Starting new connection to server4 ([::]:46398 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b2d211fe390191ec3f2beaf7cc0a22533e6e65, version v1 2025/04/30 13:30:59 Adding connection ID (empty). 2025/04/30 13:30:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:59 client -> Sending packet 0 (1280 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, Initial 2025/04/30 13:30:59 client Long Header{Type: Initial, DestConnectionID: b2d211fe390191ec3f2beaf7cc0a22533e6e65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:30:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:31:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:00 client -> Sending packet 1 (1280 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, Initial 2025/04/30 13:31:00 client Long Header{Type: Initial, DestConnectionID: b2d211fe390191ec3f2beaf7cc0a22533e6e65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:31:00 client -> Sending packet 2 (1280 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, Initial 2025/04/30 13:31:00 client Long Header{Type: Initial, DestConnectionID: b2d211fe390191ec3f2beaf7cc0a22533e6e65, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:31:00 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:00 client Received first packet. Switching destination connection ID to: d3f3dcb4d106afc4f51c79fa07904de2 2025/04/30 13:31:00 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 3ms} 2025/04/30 13:31:00 client newly acked packets (1): [2] 2025/04/30 13:31:00 client updated RTT: 34.932173ms (σ: 17.466086ms) 2025/04/30 13:31:00 client -> Sending packet 3 (1280 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, Initial 2025/04/30 13:31:00 client Long Header{Type: Initial, DestConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:00 client -> &wire.PingFrame{} 2025/04/30 13:31:00 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:00 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2.6ms} 2025/04/30 13:31:00 client newly acked packets (1): [3] 2025/04/30 13:31:00 client updated RTT: 34.795ms (σ: 13.373ms) 2025/04/30 13:31:00 client -> Sending packet 4 (1280 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, Initial 2025/04/30 13:31:00 client Long Header{Type: Initial, DestConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:00 client -> &wire.PingFrame{} 2025/04/30 13:31:01 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:01 client <- Reading packet 4 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 4.488368s} 2025/04/30 13:31:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:01 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:01 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:01 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:01 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:01 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:01 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 13:31:01 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:01 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:01 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b2d211fe390191ec3f2beaf7cc0a22533e6e65, InitialSourceConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:01 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65 2025/04/30 13:31:01 client Long Header{Type: Initial, DestConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client Long Header{Type: Handshake, DestConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:01 client Dropping Initial keys. 2025/04/30 13:31:01 client -> Sending packet 1 (51 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, Handshake 2025/04/30 13:31:01 client Long Header{Type: Handshake, DestConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client -> Sending packet 0 (54 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: d3f3dcb4d106afc4f51c79fa07904de2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:01 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.744ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client Peer doesn't await address validation any longer. 2025/04/30 13:31:01 client newly acked packets (1): [0] 2025/04/30 13:31:01 client updated RTT: 34.733ms (σ: 10.152ms) 2025/04/30 13:31:01 client ECN capability confirmed. 2025/04/30 13:31:01 client Canceling loss detection timer. 2025/04/30 13:31:01 client Dropping Handshake keys. 2025/04/30 13:31:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, StatelessResetToken: 0xd9a06982b5f18b29107d05db1ee33edc} 2025/04/30 13:31:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 551ee892da6f9421f71435a905fd8bc7, StatelessResetToken: 0x14936b6184c9bde5a8707988cef43262} 2025/04/30 13:31:01 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 8ef89f69a989bbe8c4edab4042314a0b, StatelessResetToken: 0xa8f0a256ddce813a1ea91aac81a8cb02} 2025/04/30 13:31:01 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:01 client -> Sending packet 1 (45 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 228.438µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:01 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:01 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:01 client Sending ACK because the ACK timer expired. 2025/04/30 13:31:01 client -> Sending packet 2 (44 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.253401ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:01 client -> Sending packet 4 (37 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:01 client -> Sending packet 5 (37 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:01 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 5.024ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client newly acked packets (1): [5] 2025/04/30 13:31:01 client updated RTT: 34.988ms (σ: 8.125ms) 2025/04/30 13:31:01 client Canceling loss detection timer. 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:01 client -> Sending packet 6 (45 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 139.571µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 124.592ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:01 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 124.592ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client -> Sending packet 7 (1366 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.PingFrame{} 2025/04/30 13:31:01 client -> Sending packet 8 (49 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 186.289µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- Reading packet 13 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 25.872ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client newly acked packets (1): [7] 2025/04/30 13:31:01 client updated RTT: 37.949ms (σ: 12.016ms) 2025/04/30 13:31:01 client <- Reading packet 15 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 213.688ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:01 client <- Reading packet 17 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 213.688ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client -> Sending packet 9 (1409 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.PingFrame{} 2025/04/30 13:31:01 client -> Sending packet 10 (53 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 0, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 189.285µs, ECT0: 7, ECT1: 0, CE: 1} 2025/04/30 13:31:01 client <- Reading packet 20 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 111.952ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client newly acked packets (1): [9] 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:01 client <- Reading packet 22 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 111.952ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client -> Sending packet 11 (57 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 0, AckRanges: {{Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 20}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 162.093µs, ECT0: 9, ECT1: 0, CE: 1} 2025/04/30 13:31:01 client <- Reading packet 24 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 334.44ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:01 client <- Reading packet 26 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 334.44ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client <- &wire.PingFrame{} 2025/04/30 13:31:01 client -> Sending packet 12 (1430 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.PingFrame{} 2025/04/30 13:31:01 client -> Sending packet 13 (61 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.AckFrame{LargestAcked: 26, LowestAcked: 0, AckRanges: {{Largest: 26, Smallest: 26}, {Largest: 24, Smallest: 24}, {Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 20}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 221.945µs, ECT0: 11, ECT1: 0, CE: 1} 2025/04/30 13:31:01 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 13:31:01 client <- Reading packet 27 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:01 client Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:01 client <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 12, DelayTime: 888µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 13:31:01 client newly acked packets (1): [12] 2025/04/30 13:31:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:01 client -> Sending packet 14 (38 bytes) for connection b2d211fe390191ec3f2beaf7cc0a22533e6e65, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:01 client Short Header{DestConnectionID: 9993f2e0879d0ab84f45490f6ddf708d, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:01 client Connection b2d211fe390191ec3f2beaf7cc0a22533e6e65 closed. 2025/04/30 13:31:01 Requesting https://server4:443/wdgwgpihbt. 2025/04/30 13:31:01 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:01 Increased send buffer size to 14336 kiB 2025/04/30 13:31:01 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:01 Created qlog file: /logs/qlog/147eb588fa85d94ec8f884deb91eca324c.sqlog 2025/04/30 13:31:01 client Starting new connection to server4 ([::]:43794 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 147eb588fa85d94ec8f884deb91eca324c, version v1 2025/04/30 13:31:01 Adding connection ID (empty). 2025/04/30 13:31:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:01 client -> Sending packet 0 (1280 bytes) for connection 147eb588fa85d94ec8f884deb91eca324c, Initial 2025/04/30 13:31:01 client Long Header{Type: Initial, DestConnectionID: 147eb588fa85d94ec8f884deb91eca324c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:31:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:02 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:02 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 928fe028d50f50db8cc7e7a952c71d10, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:02 client Received first packet. Switching destination connection ID to: 928fe028d50f50db8cc7e7a952c71d10 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.096ms} 2025/04/30 13:31:02 client newly acked packets (1): [0] 2025/04/30 13:31:02 client updated RTT: 34.50171ms (σ: 17.250855ms) 2025/04/30 13:31:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:02 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:02 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 928fe028d50f50db8cc7e7a952c71d10, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 13:31:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 147eb588fa85d94ec8f884deb91eca324c, InitialSourceConnectionID: 928fe028d50f50db8cc7e7a952c71d10, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 147eb588fa85d94ec8f884deb91eca324c 2025/04/30 13:31:02 client Long Header{Type: Initial, DestConnectionID: 928fe028d50f50db8cc7e7a952c71d10, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client Long Header{Type: Handshake, DestConnectionID: 928fe028d50f50db8cc7e7a952c71d10, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:02 client Dropping Initial keys. 2025/04/30 13:31:02 client -> Sending packet 1 (105 bytes) for connection 147eb588fa85d94ec8f884deb91eca324c, Handshake 2025/04/30 13:31:02 client Long Header{Type: Handshake, DestConnectionID: 928fe028d50f50db8cc7e7a952c71d10, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client Short Header{DestConnectionID: 928fe028d50f50db8cc7e7a952c71d10, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:02 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.168ms} 2025/04/30 13:31:02 client Peer doesn't await address validation any longer. 2025/04/30 13:31:02 client newly acked packets (1): [0] 2025/04/30 13:31:02 client updated RTT: 34.414ms (σ: 13.11ms) 2025/04/30 13:31:02 client Canceling loss detection timer. 2025/04/30 13:31:02 client Dropping Handshake keys. 2025/04/30 13:31:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: dab2db531bfbb88aa264fb2acbaf4782, StatelessResetToken: 0x8c0117689428e862f24f88ab6281a218} 2025/04/30 13:31:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: e2642288e78c73630a427991757d8cce, StatelessResetToken: 0xd07c3633bbdf8baf7436e90d907ebee5} 2025/04/30 13:31:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 1eef8041cf8718e2feba17bfbb11de2f, StatelessResetToken: 0xb248c95277278bbe088006b893bd271e} 2025/04/30 13:31:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:02 client -> Sending packet 1 (45 bytes) for connection 147eb588fa85d94ec8f884deb91eca324c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: dab2db531bfbb88aa264fb2acbaf4782, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 236.743µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:02 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:02 client -> Sending packet 2 (45 bytes) for connection 147eb588fa85d94ec8f884deb91eca324c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: dab2db531bfbb88aa264fb2acbaf4782, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 83.806µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 7.752ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client newly acked packets (1): [1] 2025/04/30 13:31:02 client ECN capability confirmed. 2025/04/30 13:31:02 client Canceling loss detection timer. 2025/04/30 13:31:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:02 client Ignoring all packets below 1. 2025/04/30 13:31:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:02 client -> Sending packet 3 (38 bytes) for connection 147eb588fa85d94ec8f884deb91eca324c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: dab2db531bfbb88aa264fb2acbaf4782, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:02 client Connection 147eb588fa85d94ec8f884deb91eca324c closed. 2025/04/30 13:31:02 Requesting https://server4:443/mafzvwyund. 2025/04/30 13:31:02 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:02 Increased send buffer size to 14336 kiB 2025/04/30 13:31:02 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:02 Created qlog file: /logs/qlog/aaf9ce1bd038f2ad.sqlog 2025/04/30 13:31:02 client Starting new connection to server4 ([::]:38090 -> 193.167.100.100:443), source connection ID (empty), destination connection ID aaf9ce1bd038f2ad, version v1 2025/04/30 13:31:02 Adding connection ID (empty). 2025/04/30 13:31:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:02 client -> Sending packet 0 (1280 bytes) for connection aaf9ce1bd038f2ad, Initial 2025/04/30 13:31:02 client Long Header{Type: Initial, DestConnectionID: aaf9ce1bd038f2ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:31:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:02 client -> Sending packet 1 (1280 bytes) for connection aaf9ce1bd038f2ad, Initial 2025/04/30 13:31:02 client Long Header{Type: Initial, DestConnectionID: aaf9ce1bd038f2ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:31:02 client -> Sending packet 2 (1280 bytes) for connection aaf9ce1bd038f2ad, Initial 2025/04/30 13:31:02 client Long Header{Type: Initial, DestConnectionID: aaf9ce1bd038f2ad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:31:02 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:02 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f7177eacdae6dbc5242c5959616523a5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:02 client Received first packet. Switching destination connection ID to: f7177eacdae6dbc5242c5959616523a5 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.8ms} 2025/04/30 13:31:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:02 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:02 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7177eacdae6dbc5242c5959616523a5, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 687, Offset + Data length: 687} 2025/04/30 13:31:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: aaf9ce1bd038f2ad, InitialSourceConnectionID: f7177eacdae6dbc5242c5959616523a5, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection aaf9ce1bd038f2ad 2025/04/30 13:31:02 client Long Header{Type: Initial, DestConnectionID: f7177eacdae6dbc5242c5959616523a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client Long Header{Type: Handshake, DestConnectionID: f7177eacdae6dbc5242c5959616523a5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:02 client Dropping Initial keys. 2025/04/30 13:31:02 client -> Sending packet 1 (105 bytes) for connection aaf9ce1bd038f2ad, Handshake 2025/04/30 13:31:02 client Long Header{Type: Handshake, DestConnectionID: f7177eacdae6dbc5242c5959616523a5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client Short Header{DestConnectionID: f7177eacdae6dbc5242c5959616523a5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:02 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 13:31:02 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:02 client Dropping Handshake keys. 2025/04/30 13:31:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 573e4cb1ab330ec4a900497ace53334c, StatelessResetToken: 0xf621dfbb0cc8856ba7c4554732fb6875} 2025/04/30 13:31:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 050171cb6dcf44dded3ec46bce9fac61, StatelessResetToken: 0x180691286c2d7e4b04a0ef1cc0af4744} 2025/04/30 13:31:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a87436c1da3fa0a72dd401a33c239437, StatelessResetToken: 0x18d10a020fdf2c1e6bfe4c2d6bebc5ae} 2025/04/30 13:31:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:02 client -> Sending packet 1 (1366 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.PingFrame{} 2025/04/30 13:31:02 client -> Sending packet 2 (45 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 220.523µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:02 client <- Reading packet 1 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 26.168ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client newly acked packets (2): [1 2] 2025/04/30 13:31:02 client updated RTT: 59.052533ms (σ: 29.526266ms) 2025/04/30 13:31:02 client ECN capability confirmed. 2025/04/30 13:31:02 client lost packet 0 (time threshold) 2025/04/30 13:31:02 client Canceling loss detection timer. 2025/04/30 13:31:02 client Ignoring all packets below 1. 2025/04/30 13:31:02 client -> Sending packet 3 (54 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:02 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:02 client -> Sending packet 5 (54 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:02 client -> Sending packet 6 (54 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:02 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 1.184ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client newly acked packets (1): [6] 2025/04/30 13:31:02 client updated RTT: 55.868ms (σ: 28.511ms) 2025/04/30 13:31:02 client Canceling loss detection timer. 2025/04/30 13:31:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:02 client -> Sending packet 7 (1409 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.PingFrame{} 2025/04/30 13:31:02 client -> Sending packet 8 (45 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 202.158µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 81.024ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client newly acked packets (1): [7] 2025/04/30 13:31:02 client updated RTT: 60.002ms (σ: 29.653ms) 2025/04/30 13:31:02 client <- &wire.PingFrame{} 2025/04/30 13:31:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:02 client -> Sending packet 9 (47 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 138.338µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 103.688ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client <- &wire.PingFrame{} 2025/04/30 13:31:02 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:02 client <- Reading packet 14 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:02 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:02 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 103.688ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:02 client <- &wire.PingFrame{} 2025/04/30 13:31:02 client -> Sending packet 10 (51 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:02 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:02 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 1, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 122.519µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- Reading packet 16 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 308.328ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- &wire.PingFrame{} 2025/04/30 13:31:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:03 client <- Reading packet 18 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 308.328ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- &wire.PingFrame{} 2025/04/30 13:31:03 client -> Sending packet 11 (1430 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.PingFrame{} 2025/04/30 13:31:03 client -> Sending packet 12 (55 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 1, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 238.597µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- Reading packet 21 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 12, DelayTime: 93.8ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- &wire.PingFrame{} 2025/04/30 13:31:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:03 client -> Sending packet 13 (57 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 1, AckRanges: {{Largest: 21, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 122.589µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- Reading packet 27 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 12, DelayTime: 279.352ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- &wire.PingFrame{} 2025/04/30 13:31:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:03 client -> Sending packet 14 (59 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 27, LowestAcked: 1, AckRanges: {{Largest: 27, Smallest: 27}, {Largest: 21, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 162.434µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- Reading packet 30 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 88.088ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- &wire.PingFrame{} 2025/04/30 13:31:03 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:03 client <- Reading packet 32 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 88.088ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- &wire.PingFrame{} 2025/04/30 13:31:03 client -> Sending packet 15 (63 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 32, LowestAcked: 1, AckRanges: {{Largest: 32, Smallest: 32}, {Largest: 30, Smallest: 30}, {Largest: 27, Smallest: 27}, {Largest: 21, Smallest: 21}, {Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 167.113µs, ECT0: 12, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- Reading packet 33 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 33, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 15, LowestAcked: 15, DelayTime: 688µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:03 client -> Sending packet 16 (38 bytes) for connection aaf9ce1bd038f2ad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: 573e4cb1ab330ec4a900497ace53334c, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:03 client Connection aaf9ce1bd038f2ad closed. 2025/04/30 13:31:03 Requesting https://server4:443/dqikhqxsce. 2025/04/30 13:31:03 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:03 Increased send buffer size to 14336 kiB 2025/04/30 13:31:03 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:03 Created qlog file: /logs/qlog/fbc7b1327837cb8fc1f702a5.sqlog 2025/04/30 13:31:03 client Starting new connection to server4 ([::]:45375 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fbc7b1327837cb8fc1f702a5, version v1 2025/04/30 13:31:03 Adding connection ID (empty). 2025/04/30 13:31:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:03 client -> Sending packet 0 (1280 bytes) for connection fbc7b1327837cb8fc1f702a5, Initial 2025/04/30 13:31:03 client Long Header{Type: Initial, DestConnectionID: fbc7b1327837cb8fc1f702a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:31:03 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:03 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7986bb89a8f4780cef151be7410139f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:03 client Received first packet. Switching destination connection ID to: a7986bb89a8f4780cef151be7410139f 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 11.08ms} 2025/04/30 13:31:03 client newly acked packets (1): [0] 2025/04/30 13:31:03 client updated RTT: 34.635996ms (σ: 17.317998ms) 2025/04/30 13:31:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:03 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:03 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a7986bb89a8f4780cef151be7410139f, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:31:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fbc7b1327837cb8fc1f702a5, InitialSourceConnectionID: a7986bb89a8f4780cef151be7410139f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fbc7b1327837cb8fc1f702a5 2025/04/30 13:31:03 client Long Header{Type: Initial, DestConnectionID: a7986bb89a8f4780cef151be7410139f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client Long Header{Type: Handshake, DestConnectionID: a7986bb89a8f4780cef151be7410139f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:03 client Dropping Initial keys. 2025/04/30 13:31:03 client -> Sending packet 1 (51 bytes) for connection fbc7b1327837cb8fc1f702a5, Handshake 2025/04/30 13:31:03 client Long Header{Type: Handshake, DestConnectionID: a7986bb89a8f4780cef151be7410139f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client -> Sending packet 0 (54 bytes) for connection fbc7b1327837cb8fc1f702a5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: a7986bb89a8f4780cef151be7410139f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:03 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:03 client -> Sending packet 2 (82 bytes) for connection fbc7b1327837cb8fc1f702a5, Handshake 2025/04/30 13:31:03 client Long Header{Type: Handshake, DestConnectionID: a7986bb89a8f4780cef151be7410139f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:03 client -> Sending packet 3 (82 bytes) for connection fbc7b1327837cb8fc1f702a5, Handshake 2025/04/30 13:31:03 client Long Header{Type: Handshake, DestConnectionID: a7986bb89a8f4780cef151be7410139f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:03 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:03 client Dropping Handshake keys. 2025/04/30 13:31:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:03 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:03 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:03 client -> Sending packet 2 (64 bytes) for connection fbc7b1327837cb8fc1f702a5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: a7986bb89a8f4780cef151be7410139f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 149.339µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:03 client -> Sending packet 3 (54 bytes) for connection fbc7b1327837cb8fc1f702a5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: a7986bb89a8f4780cef151be7410139f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:03 client <- Reading packet 5 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 896µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client newly acked packets (1): [3] 2025/04/30 13:31:03 client updated RTT: 34.462ms (σ: 13.332ms) 2025/04/30 13:31:03 client ECN capability confirmed. 2025/04/30 13:31:03 client Canceling loss detection timer. 2025/04/30 13:31:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:03 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:03 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:03 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:03 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:03 client -> Sending packet 4 (45 bytes) for connection fbc7b1327837cb8fc1f702a5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: a7986bb89a8f4780cef151be7410139f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 171.631µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:03 client -> Sending packet 5 (38 bytes) for connection fbc7b1327837cb8fc1f702a5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: a7986bb89a8f4780cef151be7410139f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:03 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:03 client Connection fbc7b1327837cb8fc1f702a5 closed. 2025/04/30 13:31:03 Requesting https://server4:443/myjfljqjof. 2025/04/30 13:31:03 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:03 Increased send buffer size to 14336 kiB 2025/04/30 13:31:03 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:03 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:03 Created qlog file: /logs/qlog/3a99327532949cd8.sqlog 2025/04/30 13:31:03 client Starting new connection to server4 ([::]:41959 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3a99327532949cd8, version v1 2025/04/30 13:31:03 Adding connection ID (empty). 2025/04/30 13:31:03 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:03 client -> Sending packet 0 (1280 bytes) for connection 3a99327532949cd8, Initial 2025/04/30 13:31:03 client Long Header{Type: Initial, DestConnectionID: 3a99327532949cd8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:31:03 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:03 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e299902b98ae08efd19769229ca4ab56, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:03 client Received first packet. Switching destination connection ID to: e299902b98ae08efd19769229ca4ab56 2025/04/30 13:31:03 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 11.856ms} 2025/04/30 13:31:03 client newly acked packets (1): [0] 2025/04/30 13:31:03 client updated RTT: 34.893447ms (σ: 17.446723ms) 2025/04/30 13:31:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:03 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:03 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e299902b98ae08efd19769229ca4ab56, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 686, Offset + Data length: 686} 2025/04/30 13:31:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3a99327532949cd8, InitialSourceConnectionID: e299902b98ae08efd19769229ca4ab56, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3a99327532949cd8 2025/04/30 13:31:03 client Long Header{Type: Initial, DestConnectionID: e299902b98ae08efd19769229ca4ab56, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client Long Header{Type: Handshake, DestConnectionID: e299902b98ae08efd19769229ca4ab56, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:03 client Dropping Initial keys. 2025/04/30 13:31:03 client -> Sending packet 1 (51 bytes) for connection 3a99327532949cd8, Handshake 2025/04/30 13:31:03 client Long Header{Type: Handshake, DestConnectionID: e299902b98ae08efd19769229ca4ab56, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client -> Sending packet 0 (54 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: e299902b98ae08efd19769229ca4ab56, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:03 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:03 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:03 client Dropping Handshake keys. 2025/04/30 13:31:03 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:03 client -> Sending packet 1 (43 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: e299902b98ae08efd19769229ca4ab56, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 115.897µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:03 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:03 client -> Sending packet 3 (54 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: e299902b98ae08efd19769229ca4ab56, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:03 client -> Sending packet 4 (54 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:03 client Short Header{DestConnectionID: e299902b98ae08efd19769229ca4ab56, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:04 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 376µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client newly acked packets (1): [4] 2025/04/30 13:31:04 client updated RTT: 34.532ms (σ: 13.805ms) 2025/04/30 13:31:04 client ECN capability confirmed. 2025/04/30 13:31:04 client Canceling loss detection timer. 2025/04/30 13:31:04 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.48ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client <- &wire.PingFrame{} 2025/04/30 13:31:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:04 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.48ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client <- &wire.PingFrame{} 2025/04/30 13:31:04 client -> Sending packet 5 (49 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: e299902b98ae08efd19769229ca4ab56, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 169.567µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 103.368ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client <- &wire.PingFrame{} 2025/04/30 13:31:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:04 client <- Reading packet 13 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 103.368ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client <- &wire.PingFrame{} 2025/04/30 13:31:04 client -> Sending packet 6 (1366 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: e299902b98ae08efd19769229ca4ab56, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.PingFrame{} 2025/04/30 13:31:04 client -> Sending packet 7 (53 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: e299902b98ae08efd19769229ca4ab56, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 2, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 233.407µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client <- Reading packet 14 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 800µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client newly acked packets (1): [6] 2025/04/30 13:31:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d1c204c2eefc35e8d2d6944c2abdc826, StatelessResetToken: 0xdde37bf5e85f7ae69a87f60de2b20c4e} 2025/04/30 13:31:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 72b6c9590df817d613e7c70c016deea2, StatelessResetToken: 0x30f9a340ba6f21ad54c75a309bc73115} 2025/04/30 13:31:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 90f0294e5176c713caaa95736aad4c63, StatelessResetToken: 0x62dbae7b472ca09244b813c752c3d90c} 2025/04/30 13:31:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:04 client -> Sending packet 8 (55 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: d1c204c2eefc35e8d2d6944c2abdc826, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 2, AckRanges: {{Largest: 14, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 200.886µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:04 client -> Sending packet 9 (38 bytes) for connection 3a99327532949cd8, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: d1c204c2eefc35e8d2d6944c2abdc826, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:04 client Connection 3a99327532949cd8 closed. 2025/04/30 13:31:04 Requesting https://server4:443/shemauelbd. 2025/04/30 13:31:04 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:04 Increased send buffer size to 14336 kiB 2025/04/30 13:31:04 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:04 Created qlog file: /logs/qlog/456b0e60d93b48f2dd729df4bdd9.sqlog 2025/04/30 13:31:04 client Starting new connection to server4 ([::]:41439 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 456b0e60d93b48f2dd729df4bdd9, version v1 2025/04/30 13:31:04 Adding connection ID (empty). 2025/04/30 13:31:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:04 client -> Sending packet 0 (1280 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, Initial 2025/04/30 13:31:04 client Long Header{Type: Initial, DestConnectionID: 456b0e60d93b48f2dd729df4bdd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:04 client -> Sending packet 1 (1280 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, Initial 2025/04/30 13:31:04 client Long Header{Type: Initial, DestConnectionID: 456b0e60d93b48f2dd729df4bdd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:04 client -> Sending packet 2 (1280 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, Initial 2025/04/30 13:31:04 client Long Header{Type: Initial, DestConnectionID: 456b0e60d93b48f2dd729df4bdd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:04 client -> Sending packet 3 (1280 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, Initial 2025/04/30 13:31:04 client Long Header{Type: Initial, DestConnectionID: 456b0e60d93b48f2dd729df4bdd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:04 client -> Sending packet 4 (1280 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, Initial 2025/04/30 13:31:04 client Long Header{Type: Initial, DestConnectionID: 456b0e60d93b48f2dd729df4bdd9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:04 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:04 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2b44a315bb5beb4d857eaa16396d9c21, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:04 client Received first packet. Switching destination connection ID to: 2b44a315bb5beb4d857eaa16396d9c21 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 11.672ms} 2025/04/30 13:31:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:04 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:04 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:04 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:04 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:04 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2b44a315bb5beb4d857eaa16396d9c21, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:04 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:31:04 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:04 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:04 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 456b0e60d93b48f2dd729df4bdd9, InitialSourceConnectionID: 2b44a315bb5beb4d857eaa16396d9c21, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:04 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 456b0e60d93b48f2dd729df4bdd9 2025/04/30 13:31:04 client Long Header{Type: Initial, DestConnectionID: 2b44a315bb5beb4d857eaa16396d9c21, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client Long Header{Type: Handshake, DestConnectionID: 2b44a315bb5beb4d857eaa16396d9c21, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:04 client Dropping Initial keys. 2025/04/30 13:31:04 client -> Sending packet 1 (51 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, Handshake 2025/04/30 13:31:04 client Long Header{Type: Handshake, DestConnectionID: 2b44a315bb5beb4d857eaa16396d9c21, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client -> Sending packet 0 (54 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: 2b44a315bb5beb4d857eaa16396d9c21, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:04 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.248ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client Peer doesn't await address validation any longer. 2025/04/30 13:31:04 client newly acked packets (1): [0] 2025/04/30 13:31:04 client updated RTT: 33.719961ms (σ: 16.85998ms) 2025/04/30 13:31:04 client ECN capability confirmed. 2025/04/30 13:31:04 client Canceling loss detection timer. 2025/04/30 13:31:04 client Dropping Handshake keys. 2025/04/30 13:31:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 953041aabc6f65b57309073151e9180e, StatelessResetToken: 0x0888b6ab40fc0935ce486876da0e2d9b} 2025/04/30 13:31:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 728996ad42a9b2f1498f8ae09f13b657, StatelessResetToken: 0x92c56390a2fd52166421b8d605c13d8e} 2025/04/30 13:31:04 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 3b090fb2222b75c5857e70fbba955bff, StatelessResetToken: 0x214e292c0f20465b0e800e23ee445186} 2025/04/30 13:31:04 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:04 client -> Sending packet 1 (45 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: 953041aabc6f65b57309073151e9180e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 229.8µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:04 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:04 client -> Sending packet 2 (45 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: 953041aabc6f65b57309073151e9180e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 71.263µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:04 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:04 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 6.704ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:04 client newly acked packets (1): [1] 2025/04/30 13:31:04 client Canceling loss detection timer. 2025/04/30 13:31:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:04 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:04 client Ignoring all packets below 1. 2025/04/30 13:31:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:04 client -> Sending packet 3 (38 bytes) for connection 456b0e60d93b48f2dd729df4bdd9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:04 client Short Header{DestConnectionID: 953041aabc6f65b57309073151e9180e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:04 client Connection 456b0e60d93b48f2dd729df4bdd9 closed. 2025/04/30 13:31:04 Requesting https://server4:443/wgvgdghguk. 2025/04/30 13:31:04 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:04 Increased send buffer size to 14336 kiB 2025/04/30 13:31:04 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:04 Created qlog file: /logs/qlog/41e6c246c39963d7a6b988a17aef7ceab862bd.sqlog 2025/04/30 13:31:04 client Starting new connection to server4 ([::]:57774 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 41e6c246c39963d7a6b988a17aef7ceab862bd, version v1 2025/04/30 13:31:04 Adding connection ID (empty). 2025/04/30 13:31:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:04 client -> Sending packet 0 (1280 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Initial 2025/04/30 13:31:04 client Long Header{Type: Initial, DestConnectionID: 41e6c246c39963d7a6b988a17aef7ceab862bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:31:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:05 client -> Sending packet 1 (1280 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Initial 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: 41e6c246c39963d7a6b988a17aef7ceab862bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:31:05 client -> Sending packet 2 (1280 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Initial 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: 41e6c246c39963d7a6b988a17aef7ceab862bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:31:05 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 26fd10d5aa44110244cdc81efe650e7c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:05 client Received first packet. Switching destination connection ID to: 26fd10d5aa44110244cdc81efe650e7c 2025/04/30 13:31:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2.68ms} 2025/04/30 13:31:05 client newly acked packets (1): [2] 2025/04/30 13:31:05 client updated RTT: 34.873123ms (σ: 17.436561ms) 2025/04/30 13:31:05 client -> Sending packet 3 (1280 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Initial 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:05 client -> &wire.PingFrame{} 2025/04/30 13:31:05 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 26fd10d5aa44110244cdc81efe650e7c, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:05 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 3.216ms} 2025/04/30 13:31:05 client newly acked packets (1): [3] 2025/04/30 13:31:05 client updated RTT: 34.767ms (σ: 13.287ms) 2025/04/30 13:31:05 client -> Sending packet 4 (1280 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Initial 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:05 client -> &wire.PingFrame{} 2025/04/30 13:31:05 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 26fd10d5aa44110244cdc81efe650e7c, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2.72ms} 2025/04/30 13:31:05 client newly acked packets (1): [4] 2025/04/30 13:31:05 client updated RTT: 34.665ms (σ: 10.168ms) 2025/04/30 13:31:05 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:05 client <- Reading packet 5 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 26fd10d5aa44110244cdc81efe650e7c, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:05 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.357024s} 2025/04/30 13:31:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:05 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:05 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 26fd10d5aa44110244cdc81efe650e7c, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:31:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 41e6c246c39963d7a6b988a17aef7ceab862bd, InitialSourceConnectionID: 26fd10d5aa44110244cdc81efe650e7c, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd 2025/04/30 13:31:05 client Long Header{Type: Initial, DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:05 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:05 client Long Header{Type: Handshake, DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:05 client Dropping Initial keys. 2025/04/30 13:31:05 client -> Sending packet 1 (105 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Handshake 2025/04/30 13:31:05 client Long Header{Type: Handshake, DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:05 client Short Header{DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:06 client -> Sending packet 2 (82 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:06 client -> Sending packet 3 (82 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:06 client <- Reading packet 6 (61 bytes) for connection (empty), Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 26fd10d5aa44110244cdc81efe650e7c, PacketNumber: 6, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 562.768ms} 2025/04/30 13:31:06 client Peer doesn't await address validation any longer. 2025/04/30 13:31:06 client <- &wire.PingFrame{} 2025/04/30 13:31:06 client <- Reading packet 8 (61 bytes) for connection (empty), Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 26fd10d5aa44110244cdc81efe650e7c, PacketNumber: 8, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 562.768ms} 2025/04/30 13:31:06 client <- &wire.PingFrame{} 2025/04/30 13:31:06 client -> Sending packet 4 (55 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 26fd10d5aa44110244cdc81efe650e7c, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:06 client Dropping Handshake keys. 2025/04/30 13:31:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 01eae741c092728f4980fd027fc62ec7, StatelessResetToken: 0x65522b581b8f1dea67d42445c8ef8d6b} 2025/04/30 13:31:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 80d51dffde10e24155e553119ea81f82, StatelessResetToken: 0x87f1b2470c90c95df25e7fcc01f10be8} 2025/04/30 13:31:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a159bede769a12b15574eaef2cd79273, StatelessResetToken: 0xa33ca16cc14a4070263481b058907b59} 2025/04/30 13:31:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:06 client -> Sending packet 2 (61 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 01eae741c092728f4980fd027fc62ec7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 119.243µs} 2025/04/30 13:31:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client -> Sending packet 3 (56 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 01eae741c092728f4980fd027fc62ec7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:06 client -> Sending packet 4 (42 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 01eae741c092728f4980fd027fc62ec7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 118.291µs} 2025/04/30 13:31:06 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 7.888ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client newly acked packets (1): [3] 2025/04/30 13:31:06 client ECN capability confirmed. 2025/04/30 13:31:06 client Canceling loss detection timer. 2025/04/30 13:31:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:06 client -> Sending packet 5 (38 bytes) for connection 41e6c246c39963d7a6b988a17aef7ceab862bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 01eae741c092728f4980fd027fc62ec7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:06 client Connection 41e6c246c39963d7a6b988a17aef7ceab862bd closed. 2025/04/30 13:31:06 Requesting https://server4:443/bdqlffgbcg. 2025/04/30 13:31:06 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:06 Increased send buffer size to 14336 kiB 2025/04/30 13:31:06 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:06 Created qlog file: /logs/qlog/5e2ca90fe83a3bb0955e.sqlog 2025/04/30 13:31:06 client Starting new connection to server4 ([::]:51698 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5e2ca90fe83a3bb0955e, version v1 2025/04/30 13:31:06 Adding connection ID (empty). 2025/04/30 13:31:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:06 client -> Sending packet 0 (1280 bytes) for connection 5e2ca90fe83a3bb0955e, Initial 2025/04/30 13:31:06 client Long Header{Type: Initial, DestConnectionID: 5e2ca90fe83a3bb0955e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:31:06 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:06 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:06 client Received first packet. Switching destination connection ID to: 623c9e3aa76730a9ce1f7012aa19858f 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.992ms} 2025/04/30 13:31:06 client newly acked packets (1): [0] 2025/04/30 13:31:06 client updated RTT: 34.602095ms (σ: 17.301047ms) 2025/04/30 13:31:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:06 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:06 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:31:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5e2ca90fe83a3bb0955e, InitialSourceConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5e2ca90fe83a3bb0955e 2025/04/30 13:31:06 client Long Header{Type: Initial, DestConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:06 client Dropping Initial keys. 2025/04/30 13:31:06 client -> Sending packet 1 (51 bytes) for connection 5e2ca90fe83a3bb0955e, Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client -> Sending packet 0 (54 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:06 client -> Sending packet 2 (82 bytes) for connection 5e2ca90fe83a3bb0955e, Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:06 client -> Sending packet 3 (82 bytes) for connection 5e2ca90fe83a3bb0955e, Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 623c9e3aa76730a9ce1f7012aa19858f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:06 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:06 client Dropping Handshake keys. 2025/04/30 13:31:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 2b994bcacb083ab607eb9fd63be411ba, StatelessResetToken: 0x7090b513d280001f6b21ec3fb307689c} 2025/04/30 13:31:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 7682a1a01300579315792ece4be993fd, StatelessResetToken: 0xc1d451493fda49102dc63af5089df865} 2025/04/30 13:31:06 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 9cf9f9e13d479b1e7b271fa2695bff67, StatelessResetToken: 0x786a812a5a768094294594e0e0097f35} 2025/04/30 13:31:06 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:06 client -> Sending packet 2 (64 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 161.963µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client -> Sending packet 3 (56 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:06 client -> Sending packet 4 (45 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 119.754µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 115.96ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client <- &wire.PingFrame{} 2025/04/30 13:31:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:06 client -> Sending packet 5 (47 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 117.069µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:31:06 client -> Sending packet 7 (56 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client -> Sending packet 8 (56 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client -> Sending packet 9 (1366 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.PingFrame{} 2025/04/30 13:31:06 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 440µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client newly acked packets (1): [8] 2025/04/30 13:31:06 client updated RTT: 34.313ms (σ: 13.552ms) 2025/04/30 13:31:06 client ECN capability confirmed. 2025/04/30 13:31:06 client Canceling loss detection timer. 2025/04/30 13:31:06 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 83.624ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client newly acked packets (1): [9] 2025/04/30 13:31:06 client updated RTT: 41.517ms (σ: 24.572ms) 2025/04/30 13:31:06 client <- &wire.PingFrame{} 2025/04/30 13:31:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:06 client -> Sending packet 10 (51 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 148.699µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client <- Reading packet 13 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:06 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 616µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:06 client -> Sending packet 11 (53 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 113.503µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:06 client -> Sending packet 12 (38 bytes) for connection 5e2ca90fe83a3bb0955e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 2b994bcacb083ab607eb9fd63be411ba, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:06 client Connection 5e2ca90fe83a3bb0955e closed. 2025/04/30 13:31:06 Requesting https://server4:443/goeeegwlut. 2025/04/30 13:31:06 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:06 Increased send buffer size to 14336 kiB 2025/04/30 13:31:06 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:06 Created qlog file: /logs/qlog/576cffec6735f139d3ea208ebef0.sqlog 2025/04/30 13:31:06 client Starting new connection to server4 ([::]:58606 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 576cffec6735f139d3ea208ebef0, version v1 2025/04/30 13:31:06 Adding connection ID (empty). 2025/04/30 13:31:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:06 client -> Sending packet 0 (1280 bytes) for connection 576cffec6735f139d3ea208ebef0, Initial 2025/04/30 13:31:06 client Long Header{Type: Initial, DestConnectionID: 576cffec6735f139d3ea208ebef0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:31:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:06 client -> Sending packet 1 (1280 bytes) for connection 576cffec6735f139d3ea208ebef0, Initial 2025/04/30 13:31:06 client Long Header{Type: Initial, DestConnectionID: 576cffec6735f139d3ea208ebef0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:31:06 client -> Sending packet 2 (1280 bytes) for connection 576cffec6735f139d3ea208ebef0, Initial 2025/04/30 13:31:06 client Long Header{Type: Initial, DestConnectionID: 576cffec6735f139d3ea208ebef0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:31:06 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:06 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 61b368bc680064db4ba3d449a6fd4573, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:06 client Received first packet. Switching destination connection ID to: 61b368bc680064db4ba3d449a6fd4573 2025/04/30 13:31:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.208ms} 2025/04/30 13:31:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:06 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:06 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:06 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:06 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 61b368bc680064db4ba3d449a6fd4573, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:06 client <- &wire.CryptoFrame{Offset: 0, Data length: 692, Offset + Data length: 692} 2025/04/30 13:31:06 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:06 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:06 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 576cffec6735f139d3ea208ebef0, InitialSourceConnectionID: 61b368bc680064db4ba3d449a6fd4573, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:06 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 576cffec6735f139d3ea208ebef0 2025/04/30 13:31:06 client Long Header{Type: Initial, DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:06 client Dropping Initial keys. 2025/04/30 13:31:06 client -> Sending packet 1 (51 bytes) for connection 576cffec6735f139d3ea208ebef0, Handshake 2025/04/30 13:31:06 client Long Header{Type: Handshake, DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:06 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:06 client -> Sending packet 0 (54 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:06 client Short Header{DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:06 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 13:31:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:07 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client Dropping Handshake keys. 2025/04/30 13:31:07 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:07 client -> Sending packet 1 (1366 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.PingFrame{} 2025/04/30 13:31:07 client -> Sending packet 2 (43 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 195.286µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:07 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 119.144ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client newly acked packets (2): [0 1] 2025/04/30 13:31:07 client ECN capability confirmed. 2025/04/30 13:31:07 client Canceling loss detection timer. 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:07 client -> Sending packet 3 (1409 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.PingFrame{} 2025/04/30 13:31:07 client -> Sending packet 4 (45 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 208.049µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 101.936ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client newly acked packets (1): [3] 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:07 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 101.936ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client -> Sending packet 5 (1430 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.PingFrame{} 2025/04/30 13:31:07 client -> Sending packet 6 (49 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 61b368bc680064db4ba3d449a6fd4573, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 1, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 272.884µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client <- Reading packet 13 (140 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 608µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 91103aa41ef1d7b8ffb6200e34b7b706, StatelessResetToken: 0x545a827c7427fb026b5d948901f3268d} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: d583c29ce63e4ebbfdaa4a8e860d78e2, StatelessResetToken: 0xfb6eece4ae1bf93694bffd284e578a75} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 76c71d5bdf1929373dfa71d60fc60e44, StatelessResetToken: 0x3a07c5fa4f0abcf2b47441e66ed21ca1} 2025/04/30 13:31:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:07 client -> Sending packet 7 (51 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 91103aa41ef1d7b8ffb6200e34b7b706, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 1, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 203.972µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:07 client -> Sending packet 8 (38 bytes) for connection 576cffec6735f139d3ea208ebef0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 91103aa41ef1d7b8ffb6200e34b7b706, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:07 client Connection 576cffec6735f139d3ea208ebef0 closed. 2025/04/30 13:31:07 Requesting https://server4:443/xfusssswlc. 2025/04/30 13:31:07 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:07 Increased send buffer size to 14336 kiB 2025/04/30 13:31:07 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:07 Created qlog file: /logs/qlog/8df2fce50cbb3229d470bc7649f0930948d5.sqlog 2025/04/30 13:31:07 client Starting new connection to server4 ([::]:48031 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8df2fce50cbb3229d470bc7649f0930948d5, version v1 2025/04/30 13:31:07 Adding connection ID (empty). 2025/04/30 13:31:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:07 client -> Sending packet 0 (1280 bytes) for connection 8df2fce50cbb3229d470bc7649f0930948d5, Initial 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: 8df2fce50cbb3229d470bc7649f0930948d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:31:07 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:07 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 404da48b9ea7a5c321ce376d7e6bfef0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:07 client Received first packet. Switching destination connection ID to: 404da48b9ea7a5c321ce376d7e6bfef0 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.928ms} 2025/04/30 13:31:07 client newly acked packets (1): [0] 2025/04/30 13:31:07 client updated RTT: 34.315175ms (σ: 17.157587ms) 2025/04/30 13:31:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:07 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 404da48b9ea7a5c321ce376d7e6bfef0, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:31:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8df2fce50cbb3229d470bc7649f0930948d5, InitialSourceConnectionID: 404da48b9ea7a5c321ce376d7e6bfef0, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8df2fce50cbb3229d470bc7649f0930948d5 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: 404da48b9ea7a5c321ce376d7e6bfef0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: 404da48b9ea7a5c321ce376d7e6bfef0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:07 client Dropping Initial keys. 2025/04/30 13:31:07 client -> Sending packet 1 (51 bytes) for connection 8df2fce50cbb3229d470bc7649f0930948d5, Handshake 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: 404da48b9ea7a5c321ce376d7e6bfef0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client -> Sending packet 0 (54 bytes) for connection 8df2fce50cbb3229d470bc7649f0930948d5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 404da48b9ea7a5c321ce376d7e6bfef0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:07 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.16ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client Peer doesn't await address validation any longer. 2025/04/30 13:31:07 client newly acked packets (1): [0] 2025/04/30 13:31:07 client updated RTT: 34.234ms (σ: 13.029ms) 2025/04/30 13:31:07 client ECN capability confirmed. 2025/04/30 13:31:07 client Canceling loss detection timer. 2025/04/30 13:31:07 client Dropping Handshake keys. 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: f02dc5b1d3317a92df7f1d0608664932, StatelessResetToken: 0x2eb366b1351d9968ad62756039e0b524} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 38c0e901cf4013c3ab9b6cd53640ba8a, StatelessResetToken: 0x649d975c7709c2eb1940e5d8fa3e6513} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: f38bdb60486664ca1722fbf791caf46d, StatelessResetToken: 0x2c7cbfd0519d2e4a86b8c23742b1ceb9} 2025/04/30 13:31:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:07 client -> Sending packet 1 (45 bytes) for connection 8df2fce50cbb3229d470bc7649f0930948d5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: f02dc5b1d3317a92df7f1d0608664932, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 241.823µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:07 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:07 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:07 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:07 client -> Sending packet 2 (43 bytes) for connection 8df2fce50cbb3229d470bc7649f0930948d5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: f02dc5b1d3317a92df7f1d0608664932, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 123µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:07 client -> Sending packet 3 (38 bytes) for connection 8df2fce50cbb3229d470bc7649f0930948d5, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: f02dc5b1d3317a92df7f1d0608664932, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:07 client Connection 8df2fce50cbb3229d470bc7649f0930948d5 closed. 2025/04/30 13:31:07 Requesting https://server4:443/cchpwgbkxm. 2025/04/30 13:31:07 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:07 Increased send buffer size to 14336 kiB 2025/04/30 13:31:07 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:07 Created qlog file: /logs/qlog/5c85ad907e569a23bb2470ce446656d66d8397b4.sqlog 2025/04/30 13:31:07 client Starting new connection to server4 ([::]:39912 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5c85ad907e569a23bb2470ce446656d66d8397b4, version v1 2025/04/30 13:31:07 Adding connection ID (empty). 2025/04/30 13:31:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:07 client -> Sending packet 0 (1280 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, Initial 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: 5c85ad907e569a23bb2470ce446656d66d8397b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:07 client -> Sending packet 1 (1280 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, Initial 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: 5c85ad907e569a23bb2470ce446656d66d8397b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:07 client -> Sending packet 2 (1280 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, Initial 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: 5c85ad907e569a23bb2470ce446656d66d8397b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:07 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:07 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e84d6949fe398716513d3bb1163afb5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:07 client Received first packet. Switching destination connection ID to: 5e84d6949fe398716513d3bb1163afb5 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 10.728ms} 2025/04/30 13:31:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:07 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e84d6949fe398716513d3bb1163afb5, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 13:31:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5c85ad907e569a23bb2470ce446656d66d8397b4, InitialSourceConnectionID: 5e84d6949fe398716513d3bb1163afb5, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: 5e84d6949fe398716513d3bb1163afb5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: 5e84d6949fe398716513d3bb1163afb5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:07 client Dropping Initial keys. 2025/04/30 13:31:07 client -> Sending packet 1 (51 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, Handshake 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: 5e84d6949fe398716513d3bb1163afb5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client -> Sending packet 0 (54 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 5e84d6949fe398716513d3bb1163afb5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:07 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client Dropping Handshake keys. 2025/04/30 13:31:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:07 client -> Sending packet 1 (1366 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 5e84d6949fe398716513d3bb1163afb5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.PingFrame{} 2025/04/30 13:31:07 client -> Sending packet 2 (43 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 5e84d6949fe398716513d3bb1163afb5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 176.57µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client <- Reading packet 3 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 5.112ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client newly acked packets (2): [0 1] 2025/04/30 13:31:07 client ECN capability confirmed. 2025/04/30 13:31:07 client Canceling loss detection timer. 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 7aae6bee77822c219c0dceae3182cd58, StatelessResetToken: 0xecb834e9569e937ce1bf6e877fd4d9ba} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 353b2e0d4e45d492e587e5446e535868, StatelessResetToken: 0xfd9d11e9506da95aa89f8d7774ffa3d8} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 3e4883ac06f24ea1b2336ea23a4765b4, StatelessResetToken: 0x29b7c7d59bf92dd61b10db0c4d73fb99} 2025/04/30 13:31:07 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:07 client -> Sending packet 3 (1409 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 7aae6bee77822c219c0dceae3182cd58, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.PingFrame{} 2025/04/30 13:31:07 client -> Sending packet 4 (45 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 7aae6bee77822c219c0dceae3182cd58, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 268.733µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:07 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:07 client -> Sending packet 5 (38 bytes) for connection 5c85ad907e569a23bb2470ce446656d66d8397b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 7aae6bee77822c219c0dceae3182cd58, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:07 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:07 client Connection 5c85ad907e569a23bb2470ce446656d66d8397b4 closed. 2025/04/30 13:31:07 Requesting https://server4:443/enttvuzuja. 2025/04/30 13:31:07 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:07 Increased send buffer size to 14336 kiB 2025/04/30 13:31:07 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:07 Created qlog file: /logs/qlog/0dea120ad5171a2a57c2f0.sqlog 2025/04/30 13:31:07 client Starting new connection to server4 ([::]:39016 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0dea120ad5171a2a57c2f0, version v1 2025/04/30 13:31:07 Adding connection ID (empty). 2025/04/30 13:31:07 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:07 client -> Sending packet 0 (1280 bytes) for connection 0dea120ad5171a2a57c2f0, Initial 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: 0dea120ad5171a2a57c2f0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:07 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:07 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:07 client Received first packet. Switching destination connection ID to: 558b04a2a5c51e2b107d6164d131c4e4 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 12.672ms} 2025/04/30 13:31:07 client newly acked packets (1): [0] 2025/04/30 13:31:07 client updated RTT: 35.352357ms (σ: 17.676178ms) 2025/04/30 13:31:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:07 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:31:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0dea120ad5171a2a57c2f0, InitialSourceConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0dea120ad5171a2a57c2f0 2025/04/30 13:31:07 client Long Header{Type: Initial, DestConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:07 client Dropping Initial keys. 2025/04/30 13:31:07 client -> Sending packet 1 (105 bytes) for connection 0dea120ad5171a2a57c2f0, Handshake 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client Short Header{DestConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:07 client -> Sending packet 2 (82 bytes) for connection 0dea120ad5171a2a57c2f0, Handshake 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:07 client -> Sending packet 3 (82 bytes) for connection 0dea120ad5171a2a57c2f0, Handshake 2025/04/30 13:31:07 client Long Header{Type: Handshake, DestConnectionID: 558b04a2a5c51e2b107d6164d131c4e4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:07 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:07 client Dropping Handshake keys. 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 54dd81e484a43b9ed06f9b0afea67e56, StatelessResetToken: 0x2de2f53d67853cbaba50773ed1c0cccb} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: ce775ade833e17b402cbf26ef6386aeb, StatelessResetToken: 0xb17606b526a410ccdaf5656630735968} 2025/04/30 13:31:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 1020f9cbc21f1066569747a0a06f026a, StatelessResetToken: 0x209b2aa9bb4e72ce9a416798f855578d} 2025/04/30 13:31:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:07 client -> Sending packet 2 (64 bytes) for connection 0dea120ad5171a2a57c2f0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 54dd81e484a43b9ed06f9b0afea67e56, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 153.477µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:07 client -> Sending packet 3 (56 bytes) for connection 0dea120ad5171a2a57c2f0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 54dd81e484a43b9ed06f9b0afea67e56, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:07 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:07 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:07 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.104ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:07 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:07 client Sending ACK because the ACK timer expired. 2025/04/30 13:31:07 client -> Sending packet 4 (44 bytes) for connection 0dea120ad5171a2a57c2f0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:07 client Short Header{DestConnectionID: 54dd81e484a43b9ed06f9b0afea67e56, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.422534ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:08 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:08 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:08 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 67.48ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:08 client <- &wire.PingFrame{} 2025/04/30 13:31:08 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:08 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:08 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:08 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 67.48ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:08 client <- &wire.PingFrame{} 2025/04/30 13:31:08 client -> Sending packet 5 (47 bytes) for connection 0dea120ad5171a2a57c2f0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:08 client Short Header{DestConnectionID: 54dd81e484a43b9ed06f9b0afea67e56, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:08 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 145.289µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:08 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:08 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:08 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 560µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:08 client -> Sending packet 6 (1366 bytes) for connection 0dea120ad5171a2a57c2f0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:08 client Short Header{DestConnectionID: 54dd81e484a43b9ed06f9b0afea67e56, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:08 client -> &wire.PingFrame{} 2025/04/30 13:31:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:08 client -> Sending packet 7 (38 bytes) for connection 0dea120ad5171a2a57c2f0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:08 client Short Header{DestConnectionID: 54dd81e484a43b9ed06f9b0afea67e56, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:08 client Connection 0dea120ad5171a2a57c2f0 closed. 2025/04/30 13:31:08 Requesting https://server4:443/gmcvzprxko. 2025/04/30 13:31:08 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:08 Increased send buffer size to 14336 kiB 2025/04/30 13:31:08 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:08 Created qlog file: /logs/qlog/ab9c933ff15a469dfc.sqlog 2025/04/30 13:31:08 client Starting new connection to server4 ([::]:58857 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ab9c933ff15a469dfc, version v1 2025/04/30 13:31:08 Adding connection ID (empty). 2025/04/30 13:31:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:08 client -> Sending packet 0 (1280 bytes) for connection ab9c933ff15a469dfc, Initial 2025/04/30 13:31:08 client Long Header{Type: Initial, DestConnectionID: ab9c933ff15a469dfc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:08 client -> Sending packet 1 (1280 bytes) for connection ab9c933ff15a469dfc, Initial 2025/04/30 13:31:08 client Long Header{Type: Initial, DestConnectionID: ab9c933ff15a469dfc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:08 client -> Sending packet 2 (1280 bytes) for connection ab9c933ff15a469dfc, Initial 2025/04/30 13:31:08 client Long Header{Type: Initial, DestConnectionID: ab9c933ff15a469dfc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:08 client -> Sending packet 3 (1280 bytes) for connection ab9c933ff15a469dfc, Initial 2025/04/30 13:31:08 client Long Header{Type: Initial, DestConnectionID: ab9c933ff15a469dfc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:08 client -> Sending packet 4 (1280 bytes) for connection ab9c933ff15a469dfc, Initial 2025/04/30 13:31:08 client Long Header{Type: Initial, DestConnectionID: ab9c933ff15a469dfc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:08 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:09 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/04/30 13:31:09 client <- Reading packet 3 (145 bytes) for connection (empty), Initial 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 796a59357a11359ae28d24776a4c9ac9, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 13:31:09 client Received first packet. Switching destination connection ID to: 796a59357a11359ae28d24776a4c9ac9 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 6.408144s} 2025/04/30 13:31:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/04/30 13:31:09 client <- Reading packet 2 (1055 bytes) for connection (empty), Handshake 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 796a59357a11359ae28d24776a4c9ac9, PacketNumber: 2, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/04/30 13:31:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:31:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ab9c933ff15a469dfc, InitialSourceConnectionID: 796a59357a11359ae28d24776a4c9ac9, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ab9c933ff15a469dfc 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:09 client Dropping Initial keys. 2025/04/30 13:31:09 client -> Sending packet 1 (105 bytes) for connection ab9c933ff15a469dfc, Handshake 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client Short Header{DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:09 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/04/30 13:31:09 client Dropping %!s(logging.PacketType=0) packet (145 bytes) because we already dropped the keys. 2025/04/30 13:31:09 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/04/30 13:31:09 client <- Reading packet 4 (1055 bytes) for connection (empty), Handshake 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 796a59357a11359ae28d24776a4c9ac9, PacketNumber: 4, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/04/30 13:31:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:31:09 client -> Sending packet 2 (53 bytes) for connection ab9c933ff15a469dfc, Handshake 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:09 client Dropping Handshake keys. 2025/04/30 13:31:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:09 client -> Sending packet 1 (1366 bytes) for connection ab9c933ff15a469dfc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.PingFrame{} 2025/04/30 13:31:09 client -> Sending packet 2 (43 bytes) for connection ab9c933ff15a469dfc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 157.015µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:09 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 134.384ms} 2025/04/30 13:31:09 client newly acked packets (1): [0] 2025/04/30 13:31:09 client updated RTT: 167.354832ms (σ: 83.677416ms) 2025/04/30 13:31:09 client Canceling loss detection timer. 2025/04/30 13:31:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:09 client -> Sending packet 3 (45 bytes) for connection ab9c933ff15a469dfc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 155.832µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- Reading packet 9 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 116.272ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- &wire.PingFrame{} 2025/04/30 13:31:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:09 client Skipping packet number 4 2025/04/30 13:31:09 client -> Sending packet 5 (47 bytes) for connection ab9c933ff15a469dfc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 796a59357a11359ae28d24776a4c9ac9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 161.642µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- Reading packet 12 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 504µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e0754de18abaa36b8716e6424f4cb31a, StatelessResetToken: 0xa579f4c7a5390dfe3777d58abb28ee75} 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: a3fb7214cdd8e615a687044ebcd25140, StatelessResetToken: 0x9d55ce0a725ba388480e588eeb4ee790} 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 69140d9ccbf9922a7c91a54fed0b5a67, StatelessResetToken: 0x7002d3fe8255977d36c07b4314106abb} 2025/04/30 13:31:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:09 client -> Sending packet 6 (51 bytes) for connection ab9c933ff15a469dfc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: e0754de18abaa36b8716e6424f4cb31a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 208.52µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:09 client -> Sending packet 7 (38 bytes) for connection ab9c933ff15a469dfc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: e0754de18abaa36b8716e6424f4cb31a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:09 client Connection ab9c933ff15a469dfc closed. 2025/04/30 13:31:09 Requesting https://server4:443/lqkqaslzil. 2025/04/30 13:31:09 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:09 Increased send buffer size to 14336 kiB 2025/04/30 13:31:09 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:09 Created qlog file: /logs/qlog/4933241236f0b03f.sqlog 2025/04/30 13:31:09 client Starting new connection to server4 ([::]:58295 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 4933241236f0b03f, version v1 2025/04/30 13:31:09 Adding connection ID (empty). 2025/04/30 13:31:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:09 client -> Sending packet 0 (1280 bytes) for connection 4933241236f0b03f, Initial 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: 4933241236f0b03f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:09 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:09 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b12035c8270797c87799855fa4f62a76, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:09 client Received first packet. Switching destination connection ID to: b12035c8270797c87799855fa4f62a76 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.448ms} 2025/04/30 13:31:09 client newly acked packets (1): [0] 2025/04/30 13:31:09 client updated RTT: 34.452746ms (σ: 17.226373ms) 2025/04/30 13:31:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:09 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b12035c8270797c87799855fa4f62a76, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 685, Offset + Data length: 685} 2025/04/30 13:31:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 4933241236f0b03f, InitialSourceConnectionID: b12035c8270797c87799855fa4f62a76, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4933241236f0b03f 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: b12035c8270797c87799855fa4f62a76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: b12035c8270797c87799855fa4f62a76, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:09 client Dropping Initial keys. 2025/04/30 13:31:09 client -> Sending packet 1 (51 bytes) for connection 4933241236f0b03f, Handshake 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: b12035c8270797c87799855fa4f62a76, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client -> Sending packet 0 (54 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: b12035c8270797c87799855fa4f62a76, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:09 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:09 client Dropping Handshake keys. 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, StatelessResetToken: 0xc9b13425f5f7c26b73d988b12dbdaa19} 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: a283bbe8c2a62d6a65535113a11fb12f, StatelessResetToken: 0x39a6f57c902c1e91e4fbe60e0d265d13} 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 467bc7d18ff737a673d0c55d5e4562c8, StatelessResetToken: 0xaa0ecbd2ca63dfec6e67806e1a95d79c} 2025/04/30 13:31:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:09 client -> Sending packet 1 (45 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 142.667µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:09 client -> Sending packet 3 (54 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:09 client Skipping packet number 2 2025/04/30 13:31:09 client -> Sending packet 4 (37 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:09 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 232µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client newly acked packets (1): [4] 2025/04/30 13:31:09 client updated RTT: 34.128ms (σ: 13.566ms) 2025/04/30 13:31:09 client ECN capability confirmed. 2025/04/30 13:31:09 client setting loss timer for packet 3 (1-RTT) to 38.394ms (in 2025-04-30 13:31:09.696110045 +0000 UTC m=+9.724686372) 2025/04/30 13:31:09 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 13:31:09.696110045 +0000 UTC m=+9.724686372 2025/04/30 13:31:09 client lost packet 3 (time threshold) 2025/04/30 13:31:09 client Canceling loss detection timer. 2025/04/30 13:31:09 client -> Sending packet 5 (54 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:09 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 1.512ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client newly acked packets (1): [5] 2025/04/30 13:31:09 client updated RTT: 33.876ms (σ: 10.676ms) 2025/04/30 13:31:09 client Canceling loss detection timer. 2025/04/30 13:31:09 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:09 client -> Sending packet 6 (1366 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.PingFrame{} 2025/04/30 13:31:09 client Sending ACK because the ACK timer expired. 2025/04/30 13:31:09 client -> Sending packet 7 (46 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.500085ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 584µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client newly acked packets (1): [6] 2025/04/30 13:31:09 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 67.576ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- &wire.PingFrame{} 2025/04/30 13:31:09 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:09 client <- Reading packet 9 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 67.576ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- &wire.PingFrame{} 2025/04/30 13:31:09 client -> Sending packet 8 (51 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 152.045µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 552µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:09 client -> Sending packet 9 (38 bytes) for connection 4933241236f0b03f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 2af0dea46a44d53a52b1db0a4c0e40a7, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:09 client Connection 4933241236f0b03f closed. 2025/04/30 13:31:09 Requesting https://server4:443/twduvpcprz. 2025/04/30 13:31:09 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:09 Increased send buffer size to 14336 kiB 2025/04/30 13:31:09 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:09 Created qlog file: /logs/qlog/9ff719eefcdb46321953b3164eff.sqlog 2025/04/30 13:31:09 client Starting new connection to server4 ([::]:43335 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9ff719eefcdb46321953b3164eff, version v1 2025/04/30 13:31:09 Adding connection ID (empty). 2025/04/30 13:31:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:09 client -> Sending packet 0 (1280 bytes) for connection 9ff719eefcdb46321953b3164eff, Initial 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: 9ff719eefcdb46321953b3164eff, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:31:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:31:09 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:09 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 96c787fb21d9b1d25b71df66456328d3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:09 client Received first packet. Switching destination connection ID to: 96c787fb21d9b1d25b71df66456328d3 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.336ms} 2025/04/30 13:31:09 client newly acked packets (1): [0] 2025/04/30 13:31:09 client updated RTT: 35.748349ms (σ: 17.874174ms) 2025/04/30 13:31:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:09 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 96c787fb21d9b1d25b71df66456328d3, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 692, Offset + Data length: 692} 2025/04/30 13:31:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9ff719eefcdb46321953b3164eff, InitialSourceConnectionID: 96c787fb21d9b1d25b71df66456328d3, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9ff719eefcdb46321953b3164eff 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: 96c787fb21d9b1d25b71df66456328d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: 96c787fb21d9b1d25b71df66456328d3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:09 client Dropping Initial keys. 2025/04/30 13:31:09 client -> Sending packet 1 (51 bytes) for connection 9ff719eefcdb46321953b3164eff, Handshake 2025/04/30 13:31:09 client Long Header{Type: Handshake, DestConnectionID: 96c787fb21d9b1d25b71df66456328d3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client -> Sending packet 0 (54 bytes) for connection 9ff719eefcdb46321953b3164eff, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: 96c787fb21d9b1d25b71df66456328d3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:09 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.616ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client Peer doesn't await address validation any longer. 2025/04/30 13:31:09 client newly acked packets (1): [0] 2025/04/30 13:31:09 client updated RTT: 35.575ms (σ: 13.75ms) 2025/04/30 13:31:09 client ECN capability confirmed. 2025/04/30 13:31:09 client Canceling loss detection timer. 2025/04/30 13:31:09 client Dropping Handshake keys. 2025/04/30 13:31:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: c92cf58b81f12f3709fae4086b43c810, StatelessResetToken: 0x922453e87fb1622b204c97bac2850385} 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: a1eeb3f8cb0fc90502bf4e6fa9ef941c, StatelessResetToken: 0xe6c6f0ecf50081c5aeb456c7b2eb3951} 2025/04/30 13:31:09 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 42196dc3387b4adb9167b114d7f35567, StatelessResetToken: 0x17e1ba842c9b82bcb37b7d46d0f6e528} 2025/04/30 13:31:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:09 client -> Sending packet 1 (45 bytes) for connection 9ff719eefcdb46321953b3164eff, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: c92cf58b81f12f3709fae4086b43c810, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 172.203µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:09 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:09 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:09 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:09 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:09 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:09 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:09 client -> Sending packet 2 (43 bytes) for connection 9ff719eefcdb46321953b3164eff, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: c92cf58b81f12f3709fae4086b43c810, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 61.726µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:09 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:09 client -> Sending packet 3 (38 bytes) for connection 9ff719eefcdb46321953b3164eff, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:09 client Short Header{DestConnectionID: c92cf58b81f12f3709fae4086b43c810, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:09 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:09 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:09 client Connection 9ff719eefcdb46321953b3164eff closed. 2025/04/30 13:31:09 Requesting https://server4:443/bgvlbqeevl. 2025/04/30 13:31:09 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:09 Increased send buffer size to 14336 kiB 2025/04/30 13:31:09 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:09 Created qlog file: /logs/qlog/741b2c1c1434d36944e2d6120a1352100c.sqlog 2025/04/30 13:31:09 client Starting new connection to server4 ([::]:35034 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 741b2c1c1434d36944e2d6120a1352100c, version v1 2025/04/30 13:31:09 Adding connection ID (empty). 2025/04/30 13:31:09 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:09 client -> Sending packet 0 (1280 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, Initial 2025/04/30 13:31:09 client Long Header{Type: Initial, DestConnectionID: 741b2c1c1434d36944e2d6120a1352100c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:31:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:31:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:10 client -> Sending packet 1 (1280 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, Initial 2025/04/30 13:31:10 client Long Header{Type: Initial, DestConnectionID: 741b2c1c1434d36944e2d6120a1352100c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:31:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:31:10 client -> Sending packet 2 (1280 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, Initial 2025/04/30 13:31:10 client Long Header{Type: Initial, DestConnectionID: 741b2c1c1434d36944e2d6120a1352100c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:31:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:31:10 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:10 client Received first packet. Switching destination connection ID to: 0c4c18eca5498cea9d476ab2450cf24b 2025/04/30 13:31:10 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.624ms} 2025/04/30 13:31:10 client newly acked packets (1): [2] 2025/04/30 13:31:10 client updated RTT: 35.005914ms (σ: 17.502957ms) 2025/04/30 13:31:10 client -> Sending packet 3 (1280 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, Initial 2025/04/30 13:31:10 client Long Header{Type: Initial, DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:10 client -> &wire.PingFrame{} 2025/04/30 13:31:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:31:10 client -> Sending packet 4 (1280 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, Initial 2025/04/30 13:31:10 client Long Header{Type: Initial, DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:10 client -> &wire.PingFrame{} 2025/04/30 13:31:10 client -> Sending packet 5 (1280 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, Initial 2025/04/30 13:31:10 client Long Header{Type: Initial, DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:10 client -> &wire.PingFrame{} 2025/04/30 13:31:10 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:10 client <- Reading packet 5 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:10 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 1.06884s} 2025/04/30 13:31:10 client newly acked packets (1): [5] 2025/04/30 13:31:10 client updated RTT: 51.717ms (σ: 46.551ms) 2025/04/30 13:31:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:10 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:10 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:10 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:10 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:10 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:10 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:31:10 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:10 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:10 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 741b2c1c1434d36944e2d6120a1352100c, InitialSourceConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c 2025/04/30 13:31:11 client Long Header{Type: Initial, DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:11 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:11 client Long Header{Type: Handshake, DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:11 client Dropping Initial keys. 2025/04/30 13:31:11 client -> Sending packet 1 (51 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, Handshake 2025/04/30 13:31:11 client Long Header{Type: Handshake, DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:11 client -> Sending packet 0 (54 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:11 client Short Header{DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:11 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:11 client Dropping %!s(logging.PacketType=0) packet (147 bytes) because we already dropped the keys. 2025/04/30 13:31:11 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:11 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:31:11 client -> Sending packet 2 (53 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, Handshake 2025/04/30 13:31:11 client Long Header{Type: Handshake, DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:31:11 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:11 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:11 client Peer doesn't await address validation any longer. 2025/04/30 13:31:11 client newly acked packets (1): [0] 2025/04/30 13:31:11 client updated RTT: 49.702ms (σ: 38.941ms) 2025/04/30 13:31:11 client ECN capability confirmed. 2025/04/30 13:31:11 client Canceling loss detection timer. 2025/04/30 13:31:11 client Dropping Handshake keys. 2025/04/30 13:31:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:11 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:11 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:11 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:11 client -> Sending packet 1 (40 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:11 client Short Header{DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 189.034µs} 2025/04/30 13:31:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:11 client -> Sending packet 2 (38 bytes) for connection 741b2c1c1434d36944e2d6120a1352100c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:11 client Short Header{DestConnectionID: 0c4c18eca5498cea9d476ab2450cf24b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:11 client Connection 741b2c1c1434d36944e2d6120a1352100c closed. 2025/04/30 13:31:11 Requesting https://server4:443/asjvpxvopp. 2025/04/30 13:31:11 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:11 Increased send buffer size to 14336 kiB 2025/04/30 13:31:11 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:11 Created qlog file: /logs/qlog/14f60a517296d6497c.sqlog 2025/04/30 13:31:11 client Starting new connection to server4 ([::]:49437 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 14f60a517296d6497c, version v1 2025/04/30 13:31:11 Adding connection ID (empty). 2025/04/30 13:31:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:11 client -> Sending packet 0 (1280 bytes) for connection 14f60a517296d6497c, Initial 2025/04/30 13:31:11 client Long Header{Type: Initial, DestConnectionID: 14f60a517296d6497c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 13:31:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:11 client -> Sending packet 1 (1280 bytes) for connection 14f60a517296d6497c, Initial 2025/04/30 13:31:11 client Long Header{Type: Initial, DestConnectionID: 14f60a517296d6497c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 13:31:11 client -> Sending packet 2 (1280 bytes) for connection 14f60a517296d6497c, Initial 2025/04/30 13:31:11 client Long Header{Type: Initial, DestConnectionID: 14f60a517296d6497c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 13:31:11 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:11 client -> Sending packet 3 (1280 bytes) for connection 14f60a517296d6497c, Initial 2025/04/30 13:31:11 client Long Header{Type: Initial, DestConnectionID: 14f60a517296d6497c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 13:31:11 client -> Sending packet 4 (1280 bytes) for connection 14f60a517296d6497c, Initial 2025/04/30 13:31:11 client Long Header{Type: Initial, DestConnectionID: 14f60a517296d6497c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 13:31:11 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0d30be529ce1db82be869f4219c52cbf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:11 client Received first packet. Switching destination connection ID to: 0d30be529ce1db82be869f4219c52cbf 2025/04/30 13:31:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 3ms} 2025/04/30 13:31:11 client newly acked packets (1): [4] 2025/04/30 13:31:11 client updated RTT: 34.868371ms (σ: 17.434185ms) 2025/04/30 13:31:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:12 client -> Sending packet 5 (1280 bytes) for connection 14f60a517296d6497c, Initial 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: 0d30be529ce1db82be869f4219c52cbf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:12 client -> &wire.PingFrame{} 2025/04/30 13:31:12 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:12 client <- Reading packet 4 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0d30be529ce1db82be869f4219c52cbf, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:12 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 1.181728s} 2025/04/30 13:31:12 client newly acked packets (1): [5] 2025/04/30 13:31:12 client updated RTT: 53.267ms (σ: 49.875ms) 2025/04/30 13:31:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:12 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:12 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0d30be529ce1db82be869f4219c52cbf, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 686, Offset + Data length: 686} 2025/04/30 13:31:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 14f60a517296d6497c, InitialSourceConnectionID: 0d30be529ce1db82be869f4219c52cbf, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 14f60a517296d6497c 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: 0d30be529ce1db82be869f4219c52cbf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:12 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:12 client Long Header{Type: Handshake, DestConnectionID: 0d30be529ce1db82be869f4219c52cbf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:12 client Dropping Initial keys. 2025/04/30 13:31:12 client -> Sending packet 1 (105 bytes) for connection 14f60a517296d6497c, Handshake 2025/04/30 13:31:12 client Long Header{Type: Handshake, DestConnectionID: 0d30be529ce1db82be869f4219c52cbf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:12 client Short Header{DestConnectionID: 0d30be529ce1db82be869f4219c52cbf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:12 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:12 client Dropping %!s(logging.PacketType=0) packet (147 bytes) because we already dropped the keys. 2025/04/30 13:31:12 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:12 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0d30be529ce1db82be869f4219c52cbf, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 686, Offset + Data length: 686} 2025/04/30 13:31:12 client -> Sending packet 2 (53 bytes) for connection 14f60a517296d6497c, Handshake 2025/04/30 13:31:12 client Long Header{Type: Handshake, DestConnectionID: 0d30be529ce1db82be869f4219c52cbf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:31:12 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:12 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:12 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.384ms} 2025/04/30 13:31:12 client Peer doesn't await address validation any longer. 2025/04/30 13:31:12 client newly acked packets (1): [0] 2025/04/30 13:31:12 client updated RTT: 50.853ms (σ: 42.233ms) 2025/04/30 13:31:12 client Canceling loss detection timer. 2025/04/30 13:31:12 client Dropping Handshake keys. 2025/04/30 13:31:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 6f3c56d7b92e24335f1409292e6cf3f4, StatelessResetToken: 0x4519b638b35808192f75cc8cc102c565} 2025/04/30 13:31:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 7aaf4bf18742c99ab1f8f8420cd17e3f, StatelessResetToken: 0x41c7efba31008bd8f06bdcf72f60d31b} 2025/04/30 13:31:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: d3e80999246e7cb7d4e312d16b710c3e, StatelessResetToken: 0xf28a525830dfae5a6380a0133e0bdfab} 2025/04/30 13:31:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:12 client -> Sending packet 1 (45 bytes) for connection 14f60a517296d6497c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:12 client Short Header{DestConnectionID: 6f3c56d7b92e24335f1409292e6cf3f4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 204.052µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:12 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:12 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:12 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:12 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:12 client -> Sending packet 2 (43 bytes) for connection 14f60a517296d6497c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:12 client Short Header{DestConnectionID: 6f3c56d7b92e24335f1409292e6cf3f4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 70.245µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:12 client -> Sending packet 3 (38 bytes) for connection 14f60a517296d6497c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:12 client Short Header{DestConnectionID: 6f3c56d7b92e24335f1409292e6cf3f4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:12 client Connection 14f60a517296d6497c closed. 2025/04/30 13:31:12 Requesting https://server4:443/kajdzwozxd. 2025/04/30 13:31:12 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:12 Increased send buffer size to 14336 kiB 2025/04/30 13:31:12 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:12 Created qlog file: /logs/qlog/b736f0dd200dcaa1ca84a76c80714d9781.sqlog 2025/04/30 13:31:12 client Starting new connection to server4 ([::]:56388 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b736f0dd200dcaa1ca84a76c80714d9781, version v1 2025/04/30 13:31:12 Adding connection ID (empty). 2025/04/30 13:31:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:12 client -> Sending packet 0 (1280 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, Initial 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: b736f0dd200dcaa1ca84a76c80714d9781, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:31:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:12 client -> Sending packet 1 (1280 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, Initial 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: b736f0dd200dcaa1ca84a76c80714d9781, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:31:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:12 client -> Sending packet 2 (1280 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, Initial 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: b736f0dd200dcaa1ca84a76c80714d9781, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:31:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:12 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3526c5e76612b14ca6af7d09db423a03, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:12 client Received first packet. Switching destination connection ID to: 3526c5e76612b14ca6af7d09db423a03 2025/04/30 13:31:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 2.984ms} 2025/04/30 13:31:12 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:12 client -> Sending packet 3 (1280 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, Initial 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:12 client -> Sending packet 4 (1280 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, Initial 2025/04/30 13:31:12 client Long Header{Type: Initial, DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:13 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:13 client <- Reading packet 5 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3526c5e76612b14ca6af7d09db423a03, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:13 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 3.181528s} 2025/04/30 13:31:13 client newly acked packets (1): [4] 2025/04/30 13:31:13 client updated RTT: 433.053443ms (σ: 216.526721ms) 2025/04/30 13:31:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:13 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:13 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3526c5e76612b14ca6af7d09db423a03, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:31:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b736f0dd200dcaa1ca84a76c80714d9781, InitialSourceConnectionID: 3526c5e76612b14ca6af7d09db423a03, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781 2025/04/30 13:31:13 client Long Header{Type: Initial, DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:13 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:13 client Long Header{Type: Handshake, DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:13 client Dropping Initial keys. 2025/04/30 13:31:13 client -> Sending packet 1 (51 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, Handshake 2025/04/30 13:31:13 client Long Header{Type: Handshake, DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:13 client -> Sending packet 0 (54 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:13 client Short Header{DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:13 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:13 client Dropping %!s(logging.PacketType=0) packet (147 bytes) because we already dropped the keys. 2025/04/30 13:31:13 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:13 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3526c5e76612b14ca6af7d09db423a03, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:31:13 client -> Sending packet 2 (53 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, Handshake 2025/04/30 13:31:13 client Long Header{Type: Handshake, DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:31:13 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:13 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:13 client Dropping Handshake keys. 2025/04/30 13:31:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:13 client -> Sending packet 1 (40 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:13 client Short Header{DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 181.149µs} 2025/04/30 13:31:13 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:13 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:13 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 120.936ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:13 client newly acked packets (1): [0] 2025/04/30 13:31:13 client ECN capability confirmed. 2025/04/30 13:31:13 client Canceling loss detection timer. 2025/04/30 13:31:13 client <- &wire.PingFrame{} 2025/04/30 13:31:13 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:13 client -> Sending packet 2 (42 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:13 client Short Header{DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:13 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 152.435µs} 2025/04/30 13:31:14 client <- Reading packet 15 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:14 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:14 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 811.768ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:14 client <- &wire.PingFrame{} 2025/04/30 13:31:14 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:14 client -> Sending packet 3 (44 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:14 client Short Header{DestConnectionID: 3526c5e76612b14ca6af7d09db423a03, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:14 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 2, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 131.095µs} 2025/04/30 13:31:14 client <- Reading packet 16 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:14 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:14 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 632µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 8533e1323d8274604ed97281d959793b, StatelessResetToken: 0x77f82de9f2fcd09d6e9e45c3cf6c4636} 2025/04/30 13:31:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5194676694766782efcee8c3b7322a9a, StatelessResetToken: 0xe8b56240dcc69e5c734c45c2e4e2cd76} 2025/04/30 13:31:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 51bbe001848f2d7703c28347e1ca24c1, StatelessResetToken: 0x41c204c76aaf40d8071f658495e2ec7b} 2025/04/30 13:31:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:14 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:14 client -> Sending packet 4 (46 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:14 client Short Header{DestConnectionID: 8533e1323d8274604ed97281d959793b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:14 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 2, AckRanges: {{Largest: 16, Smallest: 15}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 172.032µs} 2025/04/30 13:31:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:14 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:14 client -> Sending packet 5 (38 bytes) for connection b736f0dd200dcaa1ca84a76c80714d9781, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:14 client Short Header{DestConnectionID: 8533e1323d8274604ed97281d959793b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:14 client Connection b736f0dd200dcaa1ca84a76c80714d9781 closed. 2025/04/30 13:31:14 Requesting https://server4:443/lmxriauvip. 2025/04/30 13:31:14 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:14 Increased send buffer size to 14336 kiB 2025/04/30 13:31:14 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:14 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:14 Created qlog file: /logs/qlog/917cc60a05c03c859e253a.sqlog 2025/04/30 13:31:14 client Starting new connection to server4 ([::]:34763 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 917cc60a05c03c859e253a, version v1 2025/04/30 13:31:14 Adding connection ID (empty). 2025/04/30 13:31:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:14 client -> Sending packet 0 (1280 bytes) for connection 917cc60a05c03c859e253a, Initial 2025/04/30 13:31:14 client Long Header{Type: Initial, DestConnectionID: 917cc60a05c03c859e253a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:31:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:14 client -> Sending packet 1 (1280 bytes) for connection 917cc60a05c03c859e253a, Initial 2025/04/30 13:31:14 client Long Header{Type: Initial, DestConnectionID: 917cc60a05c03c859e253a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:31:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:14 client -> Sending packet 2 (1280 bytes) for connection 917cc60a05c03c859e253a, Initial 2025/04/30 13:31:14 client Long Header{Type: Initial, DestConnectionID: 917cc60a05c03c859e253a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:31:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:14 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5589de144d5d7d0273357195c03b914, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:14 client Received first packet. Switching destination connection ID to: e5589de144d5d7d0273357195c03b914 2025/04/30 13:31:14 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 3.032ms} 2025/04/30 13:31:14 client newly acked packets (1): [2] 2025/04/30 13:31:14 client updated RTT: 34.958905ms (σ: 17.479452ms) 2025/04/30 13:31:14 client -> Sending packet 3 (1280 bytes) for connection 917cc60a05c03c859e253a, Initial 2025/04/30 13:31:14 client Long Header{Type: Initial, DestConnectionID: e5589de144d5d7d0273357195c03b914, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:14 client -> &wire.PingFrame{} 2025/04/30 13:31:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:14 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:31:15 client -> Sending packet 4 (1280 bytes) for connection 917cc60a05c03c859e253a, Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: e5589de144d5d7d0273357195c03b914, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:15 client -> &wire.PingFrame{} 2025/04/30 13:31:15 client -> Sending packet 5 (1280 bytes) for connection 917cc60a05c03c859e253a, Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: e5589de144d5d7d0273357195c03b914, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:15 client -> &wire.PingFrame{} 2025/04/30 13:31:15 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5589de144d5d7d0273357195c03b914, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:15 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.776ms} 2025/04/30 13:31:15 client newly acked packets (1): [5] 2025/04/30 13:31:15 client updated RTT: 34.972ms (σ: 13.138ms) 2025/04/30 13:31:15 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 13:31:15 client <- Reading packet 7 (149 bytes) for connection (empty), Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5589de144d5d7d0273357195c03b914, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 13:31:15 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.067376s} 2025/04/30 13:31:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Parsed a coalesced packet. Part 2: 1051 bytes. Remaining: 0 bytes. 2025/04/30 13:31:15 client <- Reading packet 4 (1051 bytes) for connection (empty), Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5589de144d5d7d0273357195c03b914, PacketNumber: 4, PacketNumberLen: 1, Length: 1026, Version: v1} 2025/04/30 13:31:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:31:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 917cc60a05c03c859e253a, InitialSourceConnectionID: e5589de144d5d7d0273357195c03b914, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 917cc60a05c03c859e253a 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: e5589de144d5d7d0273357195c03b914, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: e5589de144d5d7d0273357195c03b914, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:15 client Dropping Initial keys. 2025/04/30 13:31:15 client -> Sending packet 1 (51 bytes) for connection 917cc60a05c03c859e253a, Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: e5589de144d5d7d0273357195c03b914, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client -> Sending packet 0 (54 bytes) for connection 917cc60a05c03c859e253a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: e5589de144d5d7d0273357195c03b914, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:15 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.44ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Peer doesn't await address validation any longer. 2025/04/30 13:31:15 client newly acked packets (1): [0] 2025/04/30 13:31:15 client updated RTT: 34.85ms (σ: 10.097ms) 2025/04/30 13:31:15 client ECN capability confirmed. 2025/04/30 13:31:15 client Canceling loss detection timer. 2025/04/30 13:31:15 client Dropping Handshake keys. 2025/04/30 13:31:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 7d531713d8621d6135b31db0f3d9c908, StatelessResetToken: 0xc16477c9f788440c6df42372837fdb4b} 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 83a05f589f605609a61009b8d1ac289b, StatelessResetToken: 0x28d7270eba23f7c90c3e11378f2d66ae} 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 6b69b8dfea3d1852efdcd19557b20f17, StatelessResetToken: 0x926b7929410a17a8716daa8d421632e0} 2025/04/30 13:31:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:15 client -> Sending packet 1 (45 bytes) for connection 917cc60a05c03c859e253a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 7d531713d8621d6135b31db0f3d9c908, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 203.037µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:15 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:15 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:15 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:15 client -> Sending packet 2 (43 bytes) for connection 917cc60a05c03c859e253a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 7d531713d8621d6135b31db0f3d9c908, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 104.847µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:15 client -> Sending packet 3 (38 bytes) for connection 917cc60a05c03c859e253a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 7d531713d8621d6135b31db0f3d9c908, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:15 client Connection 917cc60a05c03c859e253a closed. 2025/04/30 13:31:15 Requesting https://server4:443/sjtnkymhoz. 2025/04/30 13:31:15 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:15 Increased send buffer size to 14336 kiB 2025/04/30 13:31:15 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:15 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:15 Created qlog file: /logs/qlog/3425d1876b537f58f196e5dacb159040f68b5587.sqlog 2025/04/30 13:31:15 client Starting new connection to server4 ([::]:42301 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3425d1876b537f58f196e5dacb159040f68b5587, version v1 2025/04/30 13:31:15 Adding connection ID (empty). 2025/04/30 13:31:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:15 client -> Sending packet 0 (1280 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: 3425d1876b537f58f196e5dacb159040f68b5587, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:15 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:15 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 36ffd7a36468111eae9486f10b1832a0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:15 client Received first packet. Switching destination connection ID to: 36ffd7a36468111eae9486f10b1832a0 2025/04/30 13:31:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.896ms} 2025/04/30 13:31:15 client newly acked packets (1): [0] 2025/04/30 13:31:15 client updated RTT: 34.177781ms (σ: 17.08889ms) 2025/04/30 13:31:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:15 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 36ffd7a36468111eae9486f10b1832a0, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 13:31:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3425d1876b537f58f196e5dacb159040f68b5587, InitialSourceConnectionID: 36ffd7a36468111eae9486f10b1832a0, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:15 client Dropping Initial keys. 2025/04/30 13:31:15 client -> Sending packet 1 (51 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client -> Sending packet 0 (54 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:15 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:15 client -> Sending packet 2 (82 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:15 client -> Sending packet 3 (82 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:15 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 13:31:15 client -> Sending packet 4 (82 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:15 client -> Sending packet 5 (82 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:15 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:15 client Dropping Handshake keys. 2025/04/30 13:31:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:15 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:15 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:15 client -> Sending packet 2 (64 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 141.635µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:15 client -> Sending packet 3 (54 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 36ffd7a36468111eae9486f10b1832a0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:15 client <- Reading packet 9 (135 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 768µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client newly acked packets (1): [3] 2025/04/30 13:31:15 client updated RTT: 33.974ms (σ: 13.221ms) 2025/04/30 13:31:15 client ECN capability confirmed. 2025/04/30 13:31:15 client Canceling loss detection timer. 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 2bc7d9e36047a124e6bac36f30ef3711, StatelessResetToken: 0x92130167621b32c15e26b83a096e306c} 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 30631e24a07ba641da7cc4ff313f18a6, StatelessResetToken: 0xc4c4212960232c54fafa3b3644342821} 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: ccbe83a02ae3c9b2ae723e17cce76c62, StatelessResetToken: 0xac9d0a4bdd37f4eb55457f21b7d033db} 2025/04/30 13:31:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:15 client -> Sending packet 4 (47 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 2bc7d9e36047a124e6bac36f30ef3711, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 174.577µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:15 client <- Reading packet 10 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:15 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:15 client -> Sending packet 5 (45 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 2bc7d9e36047a124e6bac36f30ef3711, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 75.365µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:15 client -> Sending packet 6 (38 bytes) for connection 3425d1876b537f58f196e5dacb159040f68b5587, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 2bc7d9e36047a124e6bac36f30ef3711, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:15 client Connection 3425d1876b537f58f196e5dacb159040f68b5587 closed. 2025/04/30 13:31:15 Requesting https://server4:443/udfujxmdih. 2025/04/30 13:31:15 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:15 Increased send buffer size to 14336 kiB 2025/04/30 13:31:15 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:15 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:15 Created qlog file: /logs/qlog/e225a23d53e0937fc56663390ee00f2172854b.sqlog 2025/04/30 13:31:15 client Starting new connection to server4 ([::]:55446 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e225a23d53e0937fc56663390ee00f2172854b, version v1 2025/04/30 13:31:15 Adding connection ID (empty). 2025/04/30 13:31:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:15 client -> Sending packet 0 (1280 bytes) for connection e225a23d53e0937fc56663390ee00f2172854b, Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: e225a23d53e0937fc56663390ee00f2172854b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:15 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:15 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d1448f6a9e757f406d3347c36eac0d47, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:15 client Received first packet. Switching destination connection ID to: d1448f6a9e757f406d3347c36eac0d47 2025/04/30 13:31:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.12ms} 2025/04/30 13:31:15 client newly acked packets (1): [0] 2025/04/30 13:31:15 client updated RTT: 34.211424ms (σ: 17.105712ms) 2025/04/30 13:31:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:15 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d1448f6a9e757f406d3347c36eac0d47, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:31:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e225a23d53e0937fc56663390ee00f2172854b, InitialSourceConnectionID: d1448f6a9e757f406d3347c36eac0d47, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e225a23d53e0937fc56663390ee00f2172854b 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: d1448f6a9e757f406d3347c36eac0d47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: d1448f6a9e757f406d3347c36eac0d47, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:15 client Dropping Initial keys. 2025/04/30 13:31:15 client -> Sending packet 1 (105 bytes) for connection e225a23d53e0937fc56663390ee00f2172854b, Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: d1448f6a9e757f406d3347c36eac0d47, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Short Header{DestConnectionID: d1448f6a9e757f406d3347c36eac0d47, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:15 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.152ms} 2025/04/30 13:31:15 client Peer doesn't await address validation any longer. 2025/04/30 13:31:15 client newly acked packets (1): [0] 2025/04/30 13:31:15 client updated RTT: 34.137ms (σ: 12.975ms) 2025/04/30 13:31:15 client Canceling loss detection timer. 2025/04/30 13:31:15 client Dropping Handshake keys. 2025/04/30 13:31:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 5f7d6b8b6bf827162094756060e1b971, StatelessResetToken: 0xdbe7f875057aac0b15e81ca06d9f9f99} 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 83d30fa2611796d3e0a1f11829f2e077, StatelessResetToken: 0xcc6f451111b9578141d5075634663136} 2025/04/30 13:31:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 92709d92ecd264d646396398f88366b4, StatelessResetToken: 0x9a40b4ef2762e65cb870a5ddb8796acb} 2025/04/30 13:31:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:15 client -> Sending packet 1 (45 bytes) for connection e225a23d53e0937fc56663390ee00f2172854b, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 5f7d6b8b6bf827162094756060e1b971, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 182.471µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:15 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:15 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:15 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:15 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:15 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:15 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:15 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:15 client -> Sending packet 2 (43 bytes) for connection e225a23d53e0937fc56663390ee00f2172854b, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 5f7d6b8b6bf827162094756060e1b971, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 66.505µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:15 client -> Sending packet 3 (38 bytes) for connection e225a23d53e0937fc56663390ee00f2172854b, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 5f7d6b8b6bf827162094756060e1b971, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:15 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:15 client Connection e225a23d53e0937fc56663390ee00f2172854b closed. 2025/04/30 13:31:15 Requesting https://server4:443/raogfsqtnk. 2025/04/30 13:31:15 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:15 Increased send buffer size to 14336 kiB 2025/04/30 13:31:15 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:15 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:15 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:15 Created qlog file: /logs/qlog/00bbcdf76643836b8b8d37.sqlog 2025/04/30 13:31:15 client Starting new connection to server4 ([::]:59061 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 00bbcdf76643836b8b8d37, version v1 2025/04/30 13:31:15 Adding connection ID (empty). 2025/04/30 13:31:15 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:15 client -> Sending packet 0 (1280 bytes) for connection 00bbcdf76643836b8b8d37, Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: 00bbcdf76643836b8b8d37, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:31:15 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:15 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:15 client Received first packet. Switching destination connection ID to: 96f890ea500a46ca01a0ae3f434f8d85 2025/04/30 13:31:15 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.784ms} 2025/04/30 13:31:15 client newly acked packets (1): [0] 2025/04/30 13:31:15 client updated RTT: 34.199529ms (σ: 17.099764ms) 2025/04/30 13:31:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:15 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:31:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 00bbcdf76643836b8b8d37, InitialSourceConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 00bbcdf76643836b8b8d37 2025/04/30 13:31:15 client Long Header{Type: Initial, DestConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:15 client Dropping Initial keys. 2025/04/30 13:31:15 client -> Sending packet 1 (51 bytes) for connection 00bbcdf76643836b8b8d37, Handshake 2025/04/30 13:31:15 client Long Header{Type: Handshake, DestConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:15 client -> Sending packet 0 (54 bytes) for connection 00bbcdf76643836b8b8d37, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:15 client Short Header{DestConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:16 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:16 client -> Sending packet 2 (82 bytes) for connection 00bbcdf76643836b8b8d37, Handshake 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:16 client -> Sending packet 3 (82 bytes) for connection 00bbcdf76643836b8b8d37, Handshake 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:16 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:16 client Dropping Handshake keys. 2025/04/30 13:31:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:16 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:16 client -> Sending packet 2 (64 bytes) for connection 00bbcdf76643836b8b8d37, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 152.034µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:16 client -> Sending packet 3 (54 bytes) for connection 00bbcdf76643836b8b8d37, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 96f890ea500a46ca01a0ae3f434f8d85, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:16 client <- Reading packet 5 (135 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 784µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client newly acked packets (1): [3] 2025/04/30 13:31:16 client updated RTT: 33.989ms (σ: 13.243ms) 2025/04/30 13:31:16 client ECN capability confirmed. 2025/04/30 13:31:16 client Canceling loss detection timer. 2025/04/30 13:31:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 943a11fc21e36a78d7c3273361876d97, StatelessResetToken: 0x156723573a1174e64854fb83c4cc68cc} 2025/04/30 13:31:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 2fcc31f41b49bb77551cdc5d0b5cfe7a, StatelessResetToken: 0xfca70be0526b06555fd2c5740010c6d8} 2025/04/30 13:31:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 77c994f506273ba5c4d08f3226192d94, StatelessResetToken: 0x74f970633eb171f23344de45c18851d3} 2025/04/30 13:31:16 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:16 client -> Sending packet 4 (47 bytes) for connection 00bbcdf76643836b8b8d37, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 943a11fc21e36a78d7c3273361876d97, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 196.097µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:16 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:16 client -> Sending packet 5 (47 bytes) for connection 00bbcdf76643836b8b8d37, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 943a11fc21e36a78d7c3273361876d97, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 75.121µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client <- Reading packet 8 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 6.616ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client newly acked packets (1): [4] 2025/04/30 13:31:16 client Canceling loss detection timer. 2025/04/30 13:31:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:16 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:16 client Ignoring all packets below 6. 2025/04/30 13:31:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:16 client -> Sending packet 6 (38 bytes) for connection 00bbcdf76643836b8b8d37, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 943a11fc21e36a78d7c3273361876d97, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:16 client Connection 00bbcdf76643836b8b8d37 closed. 2025/04/30 13:31:16 Requesting https://server4:443/pqdnlkytrn. 2025/04/30 13:31:16 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:16 Increased send buffer size to 14336 kiB 2025/04/30 13:31:16 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:16 Created qlog file: /logs/qlog/a4772da5f40e7f1e.sqlog 2025/04/30 13:31:16 client Starting new connection to server4 ([::]:44863 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a4772da5f40e7f1e, version v1 2025/04/30 13:31:16 Adding connection ID (empty). 2025/04/30 13:31:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:16 client -> Sending packet 0 (1280 bytes) for connection a4772da5f40e7f1e, Initial 2025/04/30 13:31:16 client Long Header{Type: Initial, DestConnectionID: a4772da5f40e7f1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:16 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:16 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1567fe566675d1949a846c5c452bfefc, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:16 client Received first packet. Switching destination connection ID to: 1567fe566675d1949a846c5c452bfefc 2025/04/30 13:31:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.768ms} 2025/04/30 13:31:16 client newly acked packets (1): [0] 2025/04/30 13:31:16 client updated RTT: 34.607816ms (σ: 17.303908ms) 2025/04/30 13:31:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:16 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:16 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1567fe566675d1949a846c5c452bfefc, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 685, Offset + Data length: 685} 2025/04/30 13:31:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a4772da5f40e7f1e, InitialSourceConnectionID: 1567fe566675d1949a846c5c452bfefc, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a4772da5f40e7f1e 2025/04/30 13:31:16 client Long Header{Type: Initial, DestConnectionID: 1567fe566675d1949a846c5c452bfefc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: 1567fe566675d1949a846c5c452bfefc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:16 client Dropping Initial keys. 2025/04/30 13:31:16 client -> Sending packet 1 (51 bytes) for connection a4772da5f40e7f1e, Handshake 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: 1567fe566675d1949a846c5c452bfefc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client -> Sending packet 0 (54 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 1567fe566675d1949a846c5c452bfefc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:16 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:16 client -> Sending packet 2 (82 bytes) for connection a4772da5f40e7f1e, Handshake 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: 1567fe566675d1949a846c5c452bfefc, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:16 client -> Sending packet 3 (82 bytes) for connection a4772da5f40e7f1e, Handshake 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: 1567fe566675d1949a846c5c452bfefc, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:16 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 13:31:16 client -> Sending packet 4 (82 bytes) for connection a4772da5f40e7f1e, Handshake 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: 1567fe566675d1949a846c5c452bfefc, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:16 client -> Sending packet 5 (82 bytes) for connection a4772da5f40e7f1e, Handshake 2025/04/30 13:31:16 client Long Header{Type: Handshake, DestConnectionID: 1567fe566675d1949a846c5c452bfefc, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:16 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:16 client Dropping Handshake keys. 2025/04/30 13:31:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, StatelessResetToken: 0xbc35ce1d91cc249ac595902c3697e14a} 2025/04/30 13:31:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: f987c116b98f6119516540136c6b14f1, StatelessResetToken: 0x3af42f6210acf63ed7c2b7443c308dd4} 2025/04/30 13:31:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: eecbf145e1528f773dadf51dd20d1320, StatelessResetToken: 0x063f63e5aa8888a19473733d226ff329} 2025/04/30 13:31:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:16 client -> Sending packet 2 (64 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 138.93µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:16 client -> Sending packet 3 (56 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:16 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:16 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:16 client -> Sending packet 4 (47 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 116.331µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:31:16 client -> Sending packet 6 (56 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:16 client -> Sending packet 7 (56 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:16 client -> Sending packet 8 (1366 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.PingFrame{} 2025/04/30 13:31:16 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:16 client -> Sending packet 9 (49 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 117.085µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client <- Reading packet 9 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:16 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:16 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, DelayTime: 122.032ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:16 client newly acked packets (2): [7 8] 2025/04/30 13:31:16 client ECN capability confirmed. 2025/04/30 13:31:16 client Canceling loss detection timer. 2025/04/30 13:31:16 client <- &wire.PingFrame{} 2025/04/30 13:31:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:16 client -> Sending packet 10 (1409 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.PingFrame{} 2025/04/30 13:31:16 client -> Sending packet 11 (51 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:16 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:16 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 193.021µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client <- Reading packet 12 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, DelayTime: 792µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client newly acked packets (1): [10] 2025/04/30 13:31:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:17 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:17 client -> Sending packet 12 (53 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 141.825µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:17 client -> Sending packet 13 (38 bytes) for connection a4772da5f40e7f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 3e14a0e63e2a5640a8ceaa158fc42739, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:17 client Connection a4772da5f40e7f1e closed. 2025/04/30 13:31:17 Requesting https://server4:443/sblcavsooi. 2025/04/30 13:31:17 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:17 Increased send buffer size to 14336 kiB 2025/04/30 13:31:17 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:17 Created qlog file: /logs/qlog/7ea6f40c1bfd2f80caf253c528.sqlog 2025/04/30 13:31:17 client Starting new connection to server4 ([::]:48610 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7ea6f40c1bfd2f80caf253c528, version v1 2025/04/30 13:31:17 Adding connection ID (empty). 2025/04/30 13:31:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:17 client -> Sending packet 0 (1280 bytes) for connection 7ea6f40c1bfd2f80caf253c528, Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: 7ea6f40c1bfd2f80caf253c528, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:31:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 13:31:17 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:17 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30223b261de20ee64b51193ce7d586aa, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:17 client Received first packet. Switching destination connection ID to: 30223b261de20ee64b51193ce7d586aa 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.936ms} 2025/04/30 13:31:17 client newly acked packets (1): [0] 2025/04/30 13:31:17 client updated RTT: 34.260275ms (σ: 17.130137ms) 2025/04/30 13:31:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:17 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:17 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 30223b261de20ee64b51193ce7d586aa, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:31:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7ea6f40c1bfd2f80caf253c528, InitialSourceConnectionID: 30223b261de20ee64b51193ce7d586aa, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7ea6f40c1bfd2f80caf253c528 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: 30223b261de20ee64b51193ce7d586aa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client Long Header{Type: Handshake, DestConnectionID: 30223b261de20ee64b51193ce7d586aa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:17 client Dropping Initial keys. 2025/04/30 13:31:17 client -> Sending packet 1 (51 bytes) for connection 7ea6f40c1bfd2f80caf253c528, Handshake 2025/04/30 13:31:17 client Long Header{Type: Handshake, DestConnectionID: 30223b261de20ee64b51193ce7d586aa, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client -> Sending packet 0 (54 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 30223b261de20ee64b51193ce7d586aa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:17 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:17 client Dropping Handshake keys. 2025/04/30 13:31:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 713191181f90047d8d318d6b8233cfa7, StatelessResetToken: 0xe7f6f905bebefd7f847ef1f60a53b294} 2025/04/30 13:31:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: cdf871a8806f915151e5c8d76d965074, StatelessResetToken: 0x298ba6c617cedbb816841cb221bfd34c} 2025/04/30 13:31:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 6019bd879ef60068c2a66454df277889, StatelessResetToken: 0x887da56ca91a54a8f81a6f7c4e6ce6cf} 2025/04/30 13:31:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:17 client -> Sending packet 1 (45 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 713191181f90047d8d318d6b8233cfa7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 166.783µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:17 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:17 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:17 client -> Sending packet 2 (45 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 713191181f90047d8d318d6b8233cfa7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 71.684µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:17 client -> Sending packet 4 (54 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 713191181f90047d8d318d6b8233cfa7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:17 client Skipping packet number 3 2025/04/30 13:31:17 client -> Sending packet 5 (37 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 713191181f90047d8d318d6b8233cfa7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:17 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 110.576ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client <- &wire.PingFrame{} 2025/04/30 13:31:17 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:17 client -> Sending packet 6 (47 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 713191181f90047d8d318d6b8233cfa7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 105.538µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 472µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client newly acked packets (2): [4 5] 2025/04/30 13:31:17 client updated RTT: 33.989ms (σ: 13.389ms) 2025/04/30 13:31:17 client ECN capability confirmed. 2025/04/30 13:31:17 client Canceling loss detection timer. 2025/04/30 13:31:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:17 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 188.6ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client <- &wire.PingFrame{} 2025/04/30 13:31:17 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:17 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 188.6ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client <- &wire.PingFrame{} 2025/04/30 13:31:17 client -> Sending packet 7 (1366 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 713191181f90047d8d318d6b8233cfa7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.PingFrame{} 2025/04/30 13:31:17 client -> Sending packet 8 (51 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 713191181f90047d8d318d6b8233cfa7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 181.73µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client <- Reading packet 13 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 784µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client newly acked packets (1): [7] 2025/04/30 13:31:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:17 client -> Sending packet 9 (38 bytes) for connection 7ea6f40c1bfd2f80caf253c528, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 713191181f90047d8d318d6b8233cfa7, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:17 client Connection 7ea6f40c1bfd2f80caf253c528 closed. 2025/04/30 13:31:17 Requesting https://server4:443/ylfaonydje. 2025/04/30 13:31:17 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:17 Increased send buffer size to 14336 kiB 2025/04/30 13:31:17 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:17 Created qlog file: /logs/qlog/35f3bb5296704ecc.sqlog 2025/04/30 13:31:17 client Starting new connection to server4 ([::]:37674 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 35f3bb5296704ecc, version v1 2025/04/30 13:31:17 Adding connection ID (empty). 2025/04/30 13:31:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:17 client -> Sending packet 0 (1280 bytes) for connection 35f3bb5296704ecc, Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: 35f3bb5296704ecc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:31:17 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:17 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8617e5dea5b6017472a61a7d176df1c4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:17 client Received first packet. Switching destination connection ID to: 8617e5dea5b6017472a61a7d176df1c4 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.616ms} 2025/04/30 13:31:17 client newly acked packets (1): [0] 2025/04/30 13:31:17 client updated RTT: 34.537545ms (σ: 17.268772ms) 2025/04/30 13:31:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:17 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:17 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8617e5dea5b6017472a61a7d176df1c4, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 686, Offset + Data length: 686} 2025/04/30 13:31:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 35f3bb5296704ecc, InitialSourceConnectionID: 8617e5dea5b6017472a61a7d176df1c4, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 35f3bb5296704ecc 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: 8617e5dea5b6017472a61a7d176df1c4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client Long Header{Type: Handshake, DestConnectionID: 8617e5dea5b6017472a61a7d176df1c4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:17 client Dropping Initial keys. 2025/04/30 13:31:17 client -> Sending packet 1 (51 bytes) for connection 35f3bb5296704ecc, Handshake 2025/04/30 13:31:17 client Long Header{Type: Handshake, DestConnectionID: 8617e5dea5b6017472a61a7d176df1c4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client -> Sending packet 0 (54 bytes) for connection 35f3bb5296704ecc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 8617e5dea5b6017472a61a7d176df1c4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:17 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.096ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client Peer doesn't await address validation any longer. 2025/04/30 13:31:17 client newly acked packets (1): [0] 2025/04/30 13:31:17 client updated RTT: 34.402ms (σ: 13.219ms) 2025/04/30 13:31:17 client ECN capability confirmed. 2025/04/30 13:31:17 client Canceling loss detection timer. 2025/04/30 13:31:17 client Dropping Handshake keys. 2025/04/30 13:31:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 1dfa062aa9dea3243eadf7bca345f9dd, StatelessResetToken: 0xa3ac8fd2db6bc8895a1c6ef3c0f9dca4} 2025/04/30 13:31:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 1254f9d994d2d7b39506ed51904a05c8, StatelessResetToken: 0x1b5cc13abc7f70e1ea90a03af91fabc1} 2025/04/30 13:31:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 13c4a23a671207e887a1b33a4d5c47e1, StatelessResetToken: 0xe10d82f12b4e38959074618a1502377f} 2025/04/30 13:31:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:17 client -> Sending packet 1 (45 bytes) for connection 35f3bb5296704ecc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 1dfa062aa9dea3243eadf7bca345f9dd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 182.762µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:17 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:17 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:17 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:17 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:17 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:17 client -> Sending packet 2 (43 bytes) for connection 35f3bb5296704ecc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 1dfa062aa9dea3243eadf7bca345f9dd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 61.501µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:17 client -> Sending packet 3 (38 bytes) for connection 35f3bb5296704ecc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:17 client Short Header{DestConnectionID: 1dfa062aa9dea3243eadf7bca345f9dd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:17 client Connection 35f3bb5296704ecc closed. 2025/04/30 13:31:17 Requesting https://server4:443/xgcmyfaubh. 2025/04/30 13:31:17 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:17 Increased send buffer size to 14336 kiB 2025/04/30 13:31:17 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:17 Created qlog file: /logs/qlog/99fc3d8de3b5dc19769a21ec.sqlog 2025/04/30 13:31:17 client Starting new connection to server4 ([::]:60504 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 99fc3d8de3b5dc19769a21ec, version v1 2025/04/30 13:31:17 Adding connection ID (empty). 2025/04/30 13:31:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:17 client -> Sending packet 0 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: 99fc3d8de3b5dc19769a21ec, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:17 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:17 client -> Sending packet 1 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: 99fc3d8de3b5dc19769a21ec, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:17 client -> Sending packet 2 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: 99fc3d8de3b5dc19769a21ec, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:17 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:17 client Received first packet. Switching destination connection ID to: a6cb7d7e7b5707182701ce1ba60fd04a 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 2.752ms} 2025/04/30 13:31:17 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.568ms} 2025/04/30 13:31:17 client newly acked packets (1): [2] 2025/04/30 13:31:17 client updated RTT: 34.908942ms (σ: 17.454471ms) 2025/04/30 13:31:18 client -> Sending packet 3 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:18 client Long Header{Type: Initial, DestConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:18 client -> &wire.PingFrame{} 2025/04/30 13:31:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:31:18 client -> Sending packet 4 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:18 client Long Header{Type: Initial, DestConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:18 client -> &wire.PingFrame{} 2025/04/30 13:31:18 client -> Sending packet 5 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:18 client Long Header{Type: Initial, DestConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:18 client -> &wire.PingFrame{} 2025/04/30 13:31:18 client Queueing packet (737 bytes) for later decryption 2025/04/30 13:31:18 client Queueing packet (737 bytes) for later decryption 2025/04/30 13:31:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 13:31:19 client -> Sending packet 6 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:19 client Long Header{Type: Initial, DestConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:19 client -> &wire.PingFrame{} 2025/04/30 13:31:19 client -> Sending packet 7 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:19 client Long Header{Type: Initial, DestConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:19 client -> &wire.PingFrame{} 2025/04/30 13:31:19 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:19 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 3.16ms} 2025/04/30 13:31:19 client <- Reading packet 8 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:19 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 1.309288s} 2025/04/30 13:31:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:19 client -> Sending packet 8 (1280 bytes) for connection 99fc3d8de3b5dc19769a21ec, Initial 2025/04/30 13:31:19 client Long Header{Type: Initial, DestConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:19 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:19 client <- Reading packet 2 (737 bytes) for connection (empty), Handshake 2025/04/30 13:31:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, PacketNumber: 2, PacketNumberLen: 1, Length: 712, Version: v1} 2025/04/30 13:31:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:31:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 99fc3d8de3b5dc19769a21ec, InitialSourceConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:19 client <- Reading packet 4 (737 bytes) for connection (empty), Handshake 2025/04/30 13:31:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, PacketNumber: 4, PacketNumberLen: 1, Length: 712, Version: v1} 2025/04/30 13:31:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:31:19 client -> Sending packet 0 (92 bytes) for connection 99fc3d8de3b5dc19769a21ec, Handshake 2025/04/30 13:31:19 client Long Header{Type: Handshake, DestConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 67, Version: v1} 2025/04/30 13:31:19 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:19 client Dropping Initial keys. 2025/04/30 13:31:19 client -> Sending packet 0 (54 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:19 client Short Header{DestConnectionID: a6cb7d7e7b5707182701ce1ba60fd04a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:19 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.6ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:19 client Peer doesn't await address validation any longer. 2025/04/30 13:31:19 client newly acked packets (1): [0] 2025/04/30 13:31:19 client updated RTT: 34.743ms (σ: 13.419ms) 2025/04/30 13:31:19 client ECN capability confirmed. 2025/04/30 13:31:19 client Canceling loss detection timer. 2025/04/30 13:31:19 client Dropping Handshake keys. 2025/04/30 13:31:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: a8a54960e82c30faff176edd6c3e7dc3, StatelessResetToken: 0x239f8cbdfb5f1ce074c566f3c07659bd} 2025/04/30 13:31:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: cdde57d3a466267211d2354fabee1f32, StatelessResetToken: 0xdf634c4cfdaf7540d93aefdcc0e11841} 2025/04/30 13:31:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a42c8e3dc5213e63ea476efe1b2f57e2, StatelessResetToken: 0x9173595bcc380b7a29eee291f8a73a56} 2025/04/30 13:31:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:19 client -> Sending packet 1 (45 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:19 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 217.287µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:19 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:19 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:19 client Sending ACK because the ACK timer expired. 2025/04/30 13:31:19 client -> Sending packet 2 (44 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:19 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:19 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.25418ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:19 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:19 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:19 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 368µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:19 client newly acked packets (1): [1] 2025/04/30 13:31:19 client Canceling loss detection timer. 2025/04/30 13:31:19 client Ignoring all packets below 1. 2025/04/30 13:31:19 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 13:31:20 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:20 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:20 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 764.088ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:20 client <- &wire.PingFrame{} 2025/04/30 13:31:20 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:20 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:20 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:20 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 764.088ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:20 client <- &wire.PingFrame{} 2025/04/30 13:31:20 client -> Sending packet 3 (1366 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:20 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:20 client -> &wire.PingFrame{} 2025/04/30 13:31:20 client -> Sending packet 4 (49 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:20 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:20 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 203.257µs, ECT0: 4, ECT1: 0, CE: 1} 2025/04/30 13:31:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:20 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:20 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:20 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 26.096ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:20 client newly acked packets (1): [3] 2025/04/30 13:31:20 client updated RTT: 34.642ms (σ: 10.265ms) 2025/04/30 13:31:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:20 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:21 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 13:31:21 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:21 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:21 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 1.60692s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:21 client <- &wire.PingFrame{} 2025/04/30 13:31:21 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:21 client -> Sending packet 5 (1409 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:21 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:21 client -> &wire.PingFrame{} 2025/04/30 13:31:21 client -> Sending packet 6 (51 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:21 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:21 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 1, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 190.486µs, ECT0: 6, ECT1: 0, CE: 1} 2025/04/30 13:31:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:22 client <- Reading packet 15 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:22 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:22 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 728.08ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:22 client newly acked packets (1): [5] 2025/04/30 13:31:22 client <- &wire.PingFrame{} 2025/04/30 13:31:22 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:22 client <- Reading packet 17 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:22 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:22 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 728.08ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:22 client <- &wire.PingFrame{} 2025/04/30 13:31:22 client -> Sending packet 7 (1430 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:22 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:22 client -> &wire.PingFrame{} 2025/04/30 13:31:22 client -> Sending packet 8 (55 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:22 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:22 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 1, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 218.539µs, ECT0: 8, ECT1: 0, CE: 1} 2025/04/30 13:31:22 client <- Reading packet 18 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:22 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:22 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 856µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:22 client -> Sending packet 9 (38 bytes) for connection 99fc3d8de3b5dc19769a21ec, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:22 client Short Header{DestConnectionID: a8a54960e82c30faff176edd6c3e7dc3, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:22 client Connection 99fc3d8de3b5dc19769a21ec closed. 2025/04/30 13:31:22 Requesting https://server4:443/cjiclutjxa. 2025/04/30 13:31:22 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:22 Increased send buffer size to 14336 kiB 2025/04/30 13:31:22 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:22 Created qlog file: /logs/qlog/d6b2b01ce83510faa4e2afc240.sqlog 2025/04/30 13:31:22 client Starting new connection to server4 ([::]:32820 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d6b2b01ce83510faa4e2afc240, version v1 2025/04/30 13:31:22 Adding connection ID (empty). 2025/04/30 13:31:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:22 client -> Sending packet 0 (1280 bytes) for connection d6b2b01ce83510faa4e2afc240, Initial 2025/04/30 13:31:22 client Long Header{Type: Initial, DestConnectionID: d6b2b01ce83510faa4e2afc240, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:31:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 13:31:22 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:22 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b9f337771ac4b2175de77f5cf89c73e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:22 client Received first packet. Switching destination connection ID to: 5b9f337771ac4b2175de77f5cf89c73e 2025/04/30 13:31:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.784ms} 2025/04/30 13:31:22 client newly acked packets (1): [0] 2025/04/30 13:31:22 client updated RTT: 34.716635ms (σ: 17.358317ms) 2025/04/30 13:31:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:22 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:22 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5b9f337771ac4b2175de77f5cf89c73e, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/04/30 13:31:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d6b2b01ce83510faa4e2afc240, InitialSourceConnectionID: 5b9f337771ac4b2175de77f5cf89c73e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d6b2b01ce83510faa4e2afc240 2025/04/30 13:31:22 client Long Header{Type: Initial, DestConnectionID: 5b9f337771ac4b2175de77f5cf89c73e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:22 client Long Header{Type: Handshake, DestConnectionID: 5b9f337771ac4b2175de77f5cf89c73e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:22 client Dropping Initial keys. 2025/04/30 13:31:22 client -> Sending packet 1 (51 bytes) for connection d6b2b01ce83510faa4e2afc240, Handshake 2025/04/30 13:31:22 client Long Header{Type: Handshake, DestConnectionID: 5b9f337771ac4b2175de77f5cf89c73e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:22 client -> Sending packet 0 (54 bytes) for connection d6b2b01ce83510faa4e2afc240, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:22 client Short Header{DestConnectionID: 5b9f337771ac4b2175de77f5cf89c73e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:22 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:22 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:22 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.352ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:22 client Peer doesn't await address validation any longer. 2025/04/30 13:31:22 client newly acked packets (1): [0] 2025/04/30 13:31:22 client updated RTT: 34.62ms (σ: 13.208ms) 2025/04/30 13:31:22 client ECN capability confirmed. 2025/04/30 13:31:22 client Canceling loss detection timer. 2025/04/30 13:31:22 client Dropping Handshake keys. 2025/04/30 13:31:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: ac7212eadae60380e3094a7e9ed534b3, StatelessResetToken: 0x15e37e5fbfc2e4d3a735d27a20c55262} 2025/04/30 13:31:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: cc9cdb9afb7b3ac1d963c5baa75acc44, StatelessResetToken: 0x135109393bc22b526fb1e3156a37585e} 2025/04/30 13:31:22 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 26c7dd8a442c38c6b505ca3729ef5a1a, StatelessResetToken: 0x579854cd8323187679b268b7cd2f869b} 2025/04/30 13:31:22 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:22 client -> Sending packet 1 (45 bytes) for connection d6b2b01ce83510faa4e2afc240, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:22 client Short Header{DestConnectionID: ac7212eadae60380e3094a7e9ed534b3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 198.392µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:22 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:22 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:22 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:22 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:22 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:22 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:22 client -> Sending packet 2 (43 bytes) for connection d6b2b01ce83510faa4e2afc240, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:22 client Short Header{DestConnectionID: ac7212eadae60380e3094a7e9ed534b3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:22 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 99.823µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:22 client -> Sending packet 3 (38 bytes) for connection d6b2b01ce83510faa4e2afc240, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:22 client Short Header{DestConnectionID: ac7212eadae60380e3094a7e9ed534b3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:22 client Connection d6b2b01ce83510faa4e2afc240 closed. 2025/04/30 13:31:22 Requesting https://server4:443/ffppeolegy. 2025/04/30 13:31:22 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:22 Increased send buffer size to 14336 kiB 2025/04/30 13:31:22 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:22 Created qlog file: /logs/qlog/80000b1f5c60ab09c28f099fabf3bd.sqlog 2025/04/30 13:31:22 client Starting new connection to server4 ([::]:32804 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 80000b1f5c60ab09c28f099fabf3bd, version v1 2025/04/30 13:31:22 Adding connection ID (empty). 2025/04/30 13:31:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:22 client -> Sending packet 0 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:22 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:23 client -> Sending packet 1 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:23 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:23 client -> Sending packet 2 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:23 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:23 client -> Sending packet 3 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:23 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:23 client -> Sending packet 4 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:23 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:31:24 client -> Sending packet 5 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:24 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:24 client -> Sending packet 6 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:24 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:24 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 13:31:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 4 2025/04/30 13:31:25 client -> Sending packet 7 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:25 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:25 client -> Sending packet 8 (1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Initial 2025/04/30 13:31:25 client Long Header{Type: Initial, DestConnectionID: 80000b1f5c60ab09c28f099fabf3bd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:25 client <- Reading packet 6 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00f002bb17740e899676f17010c3c89e, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:25 client Received first packet. Switching destination connection ID to: 00f002bb17740e899676f17010c3c89e 2025/04/30 13:31:25 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 2.888ms} 2025/04/30 13:31:25 client <- Reading packet 7 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:25 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00f002bb17740e899676f17010c3c89e, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:25 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 1.552ms} 2025/04/30 13:31:25 client newly acked packets (1): [8] 2025/04/30 13:31:25 client updated RTT: 35.087995ms (σ: 17.543997ms) 2025/04/30 13:31:26 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 13:31:26 client <- Reading packet 9 (149 bytes) for connection (empty), Initial 2025/04/30 13:31:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 00f002bb17740e899676f17010c3c89e, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 13:31:26 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 1.595192s} 2025/04/30 13:31:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:26 client Parsed a coalesced packet. Part 2: 1051 bytes. Remaining: 0 bytes. 2025/04/30 13:31:26 client <- Reading packet 6 (1051 bytes) for connection (empty), Handshake 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 00f002bb17740e899676f17010c3c89e, PacketNumber: 6, PacketNumberLen: 1, Length: 1026, Version: v1} 2025/04/30 13:31:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 693, Offset + Data length: 693} 2025/04/30 13:31:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 80000b1f5c60ab09c28f099fabf3bd, InitialSourceConnectionID: 00f002bb17740e899676f17010c3c89e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:26 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd 2025/04/30 13:31:26 client Long Header{Type: Initial, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:26 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:26 client Dropping Initial keys. 2025/04/30 13:31:26 client -> Sending packet 1 (51 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Handshake 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:26 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:26 client -> Sending packet 0 (54 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:26 client Short Header{DestConnectionID: 00f002bb17740e899676f17010c3c89e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:26 client -> Sending packet 2 (82 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Handshake 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:26 client -> Sending packet 3 (82 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Handshake 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 13:31:26 client -> Sending packet 4 (82 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Handshake 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:26 client -> Sending packet 5 (82 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Handshake 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 13:31:26 client -> Sending packet 6 (82 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Handshake 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:26 client -> Sending packet 7 (82 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, Handshake 2025/04/30 13:31:26 client Long Header{Type: Handshake, DestConnectionID: 00f002bb17740e899676f17010c3c89e, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:26 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 13:31:27 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:27 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:27 client Dropping Handshake keys. 2025/04/30 13:31:27 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:27 client -> Sending packet 2 (59 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 00f002bb17740e899676f17010c3c89e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 104.596µs} 2025/04/30 13:31:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:27 client -> Sending packet 3 (54 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 00f002bb17740e899676f17010c3c89e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:27 client <- Reading packet 5 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:27 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:27 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 832µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:27 client newly acked packets (1): [3] 2025/04/30 13:31:27 client updated RTT: 34.847ms (σ: 13.635ms) 2025/04/30 13:31:27 client ECN capability confirmed. 2025/04/30 13:31:27 client Canceling loss detection timer. 2025/04/30 13:31:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:27 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:27 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:27 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:27 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:27 client -> Sending packet 4 (42 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 00f002bb17740e899676f17010c3c89e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 228.407µs} 2025/04/30 13:31:27 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:27 client -> Sending packet 5 (38 bytes) for connection 80000b1f5c60ab09c28f099fabf3bd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 00f002bb17740e899676f17010c3c89e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:27 client Connection 80000b1f5c60ab09c28f099fabf3bd closed. 2025/04/30 13:31:27 Requesting https://server4:443/vqwgexsifd. 2025/04/30 13:31:27 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:27 Increased send buffer size to 14336 kiB 2025/04/30 13:31:27 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:27 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:27 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:27 Created qlog file: /logs/qlog/fbe95c4d37a2a97d6e8c2c17d89ca72e.sqlog 2025/04/30 13:31:27 client Starting new connection to server4 ([::]:51897 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fbe95c4d37a2a97d6e8c2c17d89ca72e, version v1 2025/04/30 13:31:27 Adding connection ID (empty). 2025/04/30 13:31:27 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:27 client -> Sending packet 0 (1280 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, Initial 2025/04/30 13:31:27 client Long Header{Type: Initial, DestConnectionID: fbe95c4d37a2a97d6e8c2c17d89ca72e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:27 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:27 client -> Sending packet 1 (1280 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, Initial 2025/04/30 13:31:27 client Long Header{Type: Initial, DestConnectionID: fbe95c4d37a2a97d6e8c2c17d89ca72e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:27 client -> Sending packet 2 (1280 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, Initial 2025/04/30 13:31:27 client Long Header{Type: Initial, DestConnectionID: fbe95c4d37a2a97d6e8c2c17d89ca72e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:27 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:27 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:27 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:27 client Received first packet. Switching destination connection ID to: 7aa7d832e40f52640b0a2d2b0a73adcf 2025/04/30 13:31:27 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 10.264ms} 2025/04/30 13:31:27 client newly acked packets (1): [2] 2025/04/30 13:31:27 client updated RTT: 35.855068ms (σ: 17.927534ms) 2025/04/30 13:31:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:27 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:27 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:27 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:27 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:31:27 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:27 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:27 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fbe95c4d37a2a97d6e8c2c17d89ca72e, InitialSourceConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:27 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e 2025/04/30 13:31:27 client Long Header{Type: Initial, DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:27 client Long Header{Type: Handshake, DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:27 client Dropping Initial keys. 2025/04/30 13:31:27 client -> Sending packet 1 (51 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, Handshake 2025/04/30 13:31:27 client Long Header{Type: Handshake, DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:27 client -> Sending packet 0 (54 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:27 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:27 client -> Sending packet 2 (82 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, Handshake 2025/04/30 13:31:27 client Long Header{Type: Handshake, DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:27 client -> Sending packet 3 (82 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, Handshake 2025/04/30 13:31:27 client Long Header{Type: Handshake, DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:27 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:27 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:27 client Dropping Handshake keys. 2025/04/30 13:31:27 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:27 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:27 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:27 client -> Sending packet 2 (64 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 118.141µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:27 client -> Sending packet 3 (54 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:27 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:27 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:27 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:27 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:27 client -> Sending packet 4 (47 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 132.659µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:27 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:27 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:27 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 122.416ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:27 client newly acked packets (1): [3] 2025/04/30 13:31:27 client ECN capability confirmed. 2025/04/30 13:31:27 client Canceling loss detection timer. 2025/04/30 13:31:27 client <- &wire.PingFrame{} 2025/04/30 13:31:27 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:27 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:27 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:27 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 122.416ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:27 client <- &wire.PingFrame{} 2025/04/30 13:31:27 client -> Sending packet 5 (1366 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.PingFrame{} 2025/04/30 13:31:27 client -> Sending packet 6 (51 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:27 client Short Header{DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:27 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 217.844µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client <- Reading packet 15 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 103.384ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client newly acked packets (1): [5] 2025/04/30 13:31:28 client <- &wire.PingFrame{} 2025/04/30 13:31:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:28 client -> Sending packet 7 (53 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 7aa7d832e40f52640b0a2d2b0a73adcf, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 2, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 136.635µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client <- Reading packet 18 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 504µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 69feaafb037cf177ed3f24eb5061a8eb, StatelessResetToken: 0x77cd03cf132db49e40c65a591852be88} 2025/04/30 13:31:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: c87e42480eb923c9cc338cb602f9396e, StatelessResetToken: 0x69fa10b4d92ebf8df9432e1e382c6c5b} 2025/04/30 13:31:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 42312192e2b30b2c57da1c693ad525e1, StatelessResetToken: 0x9b96840ad974f810ba67f1f5e7e3c034} 2025/04/30 13:31:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:28 client -> Sending packet 8 (57 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 69feaafb037cf177ed3f24eb5061a8eb, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 2, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 134.822µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:28 client -> Sending packet 9 (38 bytes) for connection fbe95c4d37a2a97d6e8c2c17d89ca72e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 69feaafb037cf177ed3f24eb5061a8eb, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:28 client Connection fbe95c4d37a2a97d6e8c2c17d89ca72e closed. 2025/04/30 13:31:28 Requesting https://server4:443/eeuxpfqogy. 2025/04/30 13:31:28 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:28 Increased send buffer size to 14336 kiB 2025/04/30 13:31:28 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:28 Created qlog file: /logs/qlog/717145cd6089b307bae0ac9c4a842e7d.sqlog 2025/04/30 13:31:28 client Starting new connection to server4 ([::]:44390 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 717145cd6089b307bae0ac9c4a842e7d, version v1 2025/04/30 13:31:28 Adding connection ID (empty). 2025/04/30 13:31:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:28 client -> Sending packet 0 (1280 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d, Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 717145cd6089b307bae0ac9c4a842e7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:28 client -> Sending packet 1 (1280 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d, Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 717145cd6089b307bae0ac9c4a842e7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:28 client -> Sending packet 2 (1280 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d, Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 717145cd6089b307bae0ac9c4a842e7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:28 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:28 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:28 client Received first packet. Switching destination connection ID to: 076a2e359dc08b0f6bfd7eeae5765dae 2025/04/30 13:31:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.624ms} 2025/04/30 13:31:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:28 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:31:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 717145cd6089b307bae0ac9c4a842e7d, InitialSourceConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:28 client Dropping Initial keys. 2025/04/30 13:31:28 client -> Sending packet 1 (51 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d, Handshake 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client -> Sending packet 0 (54 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:28 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 13:31:28 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:28 client Dropping Handshake keys. 2025/04/30 13:31:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:28 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:28 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:28 client -> Sending packet 1 (1366 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.PingFrame{} 2025/04/30 13:31:28 client -> Sending packet 2 (43 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 163.326µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:28 client -> Sending packet 3 (38 bytes) for connection 717145cd6089b307bae0ac9c4a842e7d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 076a2e359dc08b0f6bfd7eeae5765dae, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:28 client Connection 717145cd6089b307bae0ac9c4a842e7d closed. 2025/04/30 13:31:28 Requesting https://server4:443/hmcpiqmdey. 2025/04/30 13:31:28 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:28 Increased send buffer size to 14336 kiB 2025/04/30 13:31:28 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:28 Created qlog file: /logs/qlog/10bdc59dd6f422cac719b1.sqlog 2025/04/30 13:31:28 client Starting new connection to server4 ([::]:49648 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 10bdc59dd6f422cac719b1, version v1 2025/04/30 13:31:28 Adding connection ID (empty). 2025/04/30 13:31:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:28 client -> Sending packet 0 (1280 bytes) for connection 10bdc59dd6f422cac719b1, Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 10bdc59dd6f422cac719b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:28 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:28 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 77e91fc9d120fc0a105af194a5b384f6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:28 client Received first packet. Switching destination connection ID to: 77e91fc9d120fc0a105af194a5b384f6 2025/04/30 13:31:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.056ms} 2025/04/30 13:31:28 client newly acked packets (1): [0] 2025/04/30 13:31:28 client updated RTT: 34.903575ms (σ: 17.451787ms) 2025/04/30 13:31:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:28 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 77e91fc9d120fc0a105af194a5b384f6, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:31:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 10bdc59dd6f422cac719b1, InitialSourceConnectionID: 77e91fc9d120fc0a105af194a5b384f6, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 10bdc59dd6f422cac719b1 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 77e91fc9d120fc0a105af194a5b384f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: 77e91fc9d120fc0a105af194a5b384f6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:28 client Dropping Initial keys. 2025/04/30 13:31:28 client -> Sending packet 1 (51 bytes) for connection 10bdc59dd6f422cac719b1, Handshake 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: 77e91fc9d120fc0a105af194a5b384f6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client -> Sending packet 0 (54 bytes) for connection 10bdc59dd6f422cac719b1, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 77e91fc9d120fc0a105af194a5b384f6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:28 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.28ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client Peer doesn't await address validation any longer. 2025/04/30 13:31:28 client newly acked packets (1): [0] 2025/04/30 13:31:28 client updated RTT: 34.737ms (σ: 13.42ms) 2025/04/30 13:31:28 client ECN capability confirmed. 2025/04/30 13:31:28 client Canceling loss detection timer. 2025/04/30 13:31:28 client Dropping Handshake keys. 2025/04/30 13:31:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0cdd23ee5944a75520acebcd5c7c575a, StatelessResetToken: 0x5524cbd0dd6548fff2d0208b52f311b3} 2025/04/30 13:31:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: ed3d7bf0d18c6c2552c9109beb90709c, StatelessResetToken: 0xfc25ade8ead070a9f1b629ae3a527c18} 2025/04/30 13:31:28 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: c7b999b6c3c743ecdcb54eb79b893b25, StatelessResetToken: 0xfe4adce96056c8e7c171c3c20e95c4fc} 2025/04/30 13:31:28 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:28 client -> Sending packet 1 (45 bytes) for connection 10bdc59dd6f422cac719b1, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 0cdd23ee5944a75520acebcd5c7c575a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.137µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:28 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:28 client -> Sending packet 2 (45 bytes) for connection 10bdc59dd6f422cac719b1, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 0cdd23ee5944a75520acebcd5c7c575a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 91.551µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 6.664ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client newly acked packets (1): [1] 2025/04/30 13:31:28 client Canceling loss detection timer. 2025/04/30 13:31:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:28 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:28 client Ignoring all packets below 1. 2025/04/30 13:31:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:28 client -> Sending packet 3 (38 bytes) for connection 10bdc59dd6f422cac719b1, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 0cdd23ee5944a75520acebcd5c7c575a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:28 client Connection 10bdc59dd6f422cac719b1 closed. 2025/04/30 13:31:28 Requesting https://server4:443/tagiqmsuqr. 2025/04/30 13:31:28 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:28 Increased send buffer size to 14336 kiB 2025/04/30 13:31:28 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:28 Created qlog file: /logs/qlog/03028019e4f4bb2d3e6e45.sqlog 2025/04/30 13:31:28 client Starting new connection to server4 ([::]:38490 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 03028019e4f4bb2d3e6e45, version v1 2025/04/30 13:31:28 Adding connection ID (empty). 2025/04/30 13:31:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:28 client -> Sending packet 0 (1280 bytes) for connection 03028019e4f4bb2d3e6e45, Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 03028019e4f4bb2d3e6e45, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:31:28 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:28 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1798092a61abdb347b388d2526d36bce, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:28 client Received first packet. Switching destination connection ID to: 1798092a61abdb347b388d2526d36bce 2025/04/30 13:31:28 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.736ms} 2025/04/30 13:31:28 client newly acked packets (1): [0] 2025/04/30 13:31:28 client updated RTT: 34.621131ms (σ: 17.310565ms) 2025/04/30 13:31:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:28 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:28 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1798092a61abdb347b388d2526d36bce, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:28 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:31:28 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:28 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 03028019e4f4bb2d3e6e45, InitialSourceConnectionID: 1798092a61abdb347b388d2526d36bce, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:28 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 03028019e4f4bb2d3e6e45 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 1798092a61abdb347b388d2526d36bce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: 1798092a61abdb347b388d2526d36bce, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:28 client Dropping Initial keys. 2025/04/30 13:31:28 client -> Sending packet 1 (51 bytes) for connection 03028019e4f4bb2d3e6e45, Handshake 2025/04/30 13:31:28 client Long Header{Type: Handshake, DestConnectionID: 1798092a61abdb347b388d2526d36bce, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client -> Sending packet 0 (54 bytes) for connection 03028019e4f4bb2d3e6e45, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 1798092a61abdb347b388d2526d36bce, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:28 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:28 client Dropping Handshake keys. 2025/04/30 13:31:28 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:28 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:28 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:28 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:28 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:28 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:28 client -> Sending packet 1 (43 bytes) for connection 03028019e4f4bb2d3e6e45, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 1798092a61abdb347b388d2526d36bce, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 179.926µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:28 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:28 client -> Sending packet 2 (38 bytes) for connection 03028019e4f4bb2d3e6e45, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:28 client Short Header{DestConnectionID: 1798092a61abdb347b388d2526d36bce, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:28 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:28 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:28 client Connection 03028019e4f4bb2d3e6e45 closed. 2025/04/30 13:31:28 Requesting https://server4:443/jdzmljqjso. 2025/04/30 13:31:28 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:28 Increased send buffer size to 14336 kiB 2025/04/30 13:31:28 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:28 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:28 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:28 Created qlog file: /logs/qlog/76c514a6db9aac27a707fecd79aab7.sqlog 2025/04/30 13:31:28 client Starting new connection to server4 ([::]:37801 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 76c514a6db9aac27a707fecd79aab7, version v1 2025/04/30 13:31:28 Adding connection ID (empty). 2025/04/30 13:31:28 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:28 client -> Sending packet 0 (1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 76c514a6db9aac27a707fecd79aab7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:28 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:28 client -> Sending packet 1 (1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 76c514a6db9aac27a707fecd79aab7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:28 client -> Sending packet 2 (1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: 76c514a6db9aac27a707fecd79aab7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:31:28 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:28 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:28 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4d97c4b54ee1f48d098f1d972751fed, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:28 client Received first packet. Switching destination connection ID to: c4d97c4b54ee1f48d098f1d972751fed 2025/04/30 13:31:28 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.76ms} 2025/04/30 13:31:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:29 client -> Sending packet 3 (1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Initial 2025/04/30 13:31:29 client Long Header{Type: Initial, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:29 client -> Sending packet 4 (1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Initial 2025/04/30 13:31:29 client Long Header{Type: Initial, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:31:29 client -> Sending packet 5 (1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Initial 2025/04/30 13:31:29 client Long Header{Type: Initial, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:29 client -> Sending packet 6 (1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Initial 2025/04/30 13:31:29 client Long Header{Type: Initial, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:30 client <- Reading packet 7 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4d97c4b54ee1f48d098f1d972751fed, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:30 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 2.656ms} 2025/04/30 13:31:30 client newly acked packets (1): [6] 2025/04/30 13:31:30 client updated RTT: 35.005951ms (σ: 17.502975ms) 2025/04/30 13:31:30 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 13:31:30 client -> Sending packet 7 (1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Initial 2025/04/30 13:31:30 client Long Header{Type: Initial, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:30 client -> &wire.PingFrame{} 2025/04/30 13:31:30 client <- Reading packet 8 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4d97c4b54ee1f48d098f1d972751fed, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:30 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 2.992ms} 2025/04/30 13:31:30 client newly acked packets (1): [7] 2025/04/30 13:31:30 client updated RTT: 34.875ms (σ: 13.386ms) 2025/04/30 13:31:31 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 13:31:31 client <- Reading packet 10 (149 bytes) for connection (empty), Initial 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4d97c4b54ee1f48d098f1d972751fed, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 13:31:31 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 5.779648s} 2025/04/30 13:31:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Parsed a coalesced packet. Part 2: 1051 bytes. Remaining: 0 bytes. 2025/04/30 13:31:31 client <- Reading packet 6 (1051 bytes) for connection (empty), Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c4d97c4b54ee1f48d098f1d972751fed, PacketNumber: 6, PacketNumberLen: 1, Length: 1026, Version: v1} 2025/04/30 13:31:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 692, Offset + Data length: 692} 2025/04/30 13:31:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 76c514a6db9aac27a707fecd79aab7, InitialSourceConnectionID: c4d97c4b54ee1f48d098f1d972751fed, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 76c514a6db9aac27a707fecd79aab7 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:31 client Dropping Initial keys. 2025/04/30 13:31:31 client -> Sending packet 1 (48 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s} 2025/04/30 13:31:31 client -> Sending packet 0 (54 bytes) for connection 76c514a6db9aac27a707fecd79aab7, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:31 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 13:31:31 client Dropping %!s(logging.PacketType=0) packet (149 bytes) because we already dropped the keys. 2025/04/30 13:31:31 client Parsed a coalesced packet. Part 2: 1051 bytes. Remaining: 0 bytes. 2025/04/30 13:31:31 client <- Reading packet 8 (1051 bytes) for connection (empty), Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c4d97c4b54ee1f48d098f1d972751fed, PacketNumber: 8, PacketNumberLen: 1, Length: 1026, Version: v1} 2025/04/30 13:31:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 692, Offset + Data length: 692} 2025/04/30 13:31:31 client -> Sending packet 2 (50 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 0s} 2025/04/30 13:31:31 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:31 client -> Sending packet 3 (82 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:31 client -> Sending packet 4 (82 bytes) for connection 76c514a6db9aac27a707fecd79aab7, Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: c4d97c4b54ee1f48d098f1d972751fed, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:31 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:31 client Dropping Handshake keys. 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: c0088e22247b5d6c5c5240905609399a, StatelessResetToken: 0x3c05f1bee717ee1a9cefa2bc164dd796} 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: b1df87c4b1a4d61e9d8e1bdabd8a6aeb, StatelessResetToken: 0xc5c9ded1e9ed520c7949d84ea746e56c} 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 7a921d2428ec01e8591dd77ed16ab6c4, StatelessResetToken: 0x60e0b54de1520a52451686e428e3f1df} 2025/04/30 13:31:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:31 client -> Sending packet 2 (61 bytes) for connection 76c514a6db9aac27a707fecd79aab7, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: c0088e22247b5d6c5c5240905609399a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 116.648µs} 2025/04/30 13:31:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:31 client -> Sending packet 3 (56 bytes) for connection 76c514a6db9aac27a707fecd79aab7, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: c0088e22247b5d6c5c5240905609399a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:31 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:31 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:31 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.224ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client newly acked packets (1): [3] 2025/04/30 13:31:31 client updated RTT: 34.664ms (σ: 10.46ms) 2025/04/30 13:31:31 client ECN capability confirmed. 2025/04/30 13:31:31 client Canceling loss detection timer. 2025/04/30 13:31:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:31 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:31 client -> Sending packet 4 (38 bytes) for connection 76c514a6db9aac27a707fecd79aab7, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: c0088e22247b5d6c5c5240905609399a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:31 client Connection 76c514a6db9aac27a707fecd79aab7 closed. 2025/04/30 13:31:31 Requesting https://server4:443/uaroondjuj. 2025/04/30 13:31:31 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:31 Increased send buffer size to 14336 kiB 2025/04/30 13:31:31 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:31 Created qlog file: /logs/qlog/3d2b712188c77e8bfef48c86.sqlog 2025/04/30 13:31:31 client Starting new connection to server4 ([::]:50182 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3d2b712188c77e8bfef48c86, version v1 2025/04/30 13:31:31 Adding connection ID (empty). 2025/04/30 13:31:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:31 client -> Sending packet 0 (1280 bytes) for connection 3d2b712188c77e8bfef48c86, Initial 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: 3d2b712188c77e8bfef48c86, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:31 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:31 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 29004bd2c3a97ddc511a178cd2ed84ef, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:31 client Received first packet. Switching destination connection ID to: 29004bd2c3a97ddc511a178cd2ed84ef 2025/04/30 13:31:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.56ms} 2025/04/30 13:31:31 client newly acked packets (1): [0] 2025/04/30 13:31:31 client updated RTT: 34.437087ms (σ: 17.218543ms) 2025/04/30 13:31:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:31 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 29004bd2c3a97ddc511a178cd2ed84ef, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:31:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3d2b712188c77e8bfef48c86, InitialSourceConnectionID: 29004bd2c3a97ddc511a178cd2ed84ef, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3d2b712188c77e8bfef48c86 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: 29004bd2c3a97ddc511a178cd2ed84ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: 29004bd2c3a97ddc511a178cd2ed84ef, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:31 client Dropping Initial keys. 2025/04/30 13:31:31 client -> Sending packet 1 (51 bytes) for connection 3d2b712188c77e8bfef48c86, Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: 29004bd2c3a97ddc511a178cd2ed84ef, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client -> Sending packet 0 (54 bytes) for connection 3d2b712188c77e8bfef48c86, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: 29004bd2c3a97ddc511a178cd2ed84ef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:31 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:31 client Dropping Handshake keys. 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e7eb1c71e99bd3821004c69bf2bf6b0a, StatelessResetToken: 0x9c52ae37351461171018a626a19048e2} 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 10734397083bb5ca169884eeb21356dd, StatelessResetToken: 0x792ebcce2b33fe8bb1071ce0915a3262} 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 87c916637d65ee0ebe942775f6d66ea2, StatelessResetToken: 0x2544e24635d3f264b296c29d08fed78a} 2025/04/30 13:31:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:31 client -> Sending packet 1 (45 bytes) for connection 3d2b712188c77e8bfef48c86, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: e7eb1c71e99bd3821004c69bf2bf6b0a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 131.607µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:31 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:31 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:31 client -> Sending packet 2 (45 bytes) for connection 3d2b712188c77e8bfef48c86, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: e7eb1c71e99bd3821004c69bf2bf6b0a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 62.177µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:31 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:31 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 7.648ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client newly acked packets (2): [0 1] 2025/04/30 13:31:31 client ECN capability confirmed. 2025/04/30 13:31:31 client Canceling loss detection timer. 2025/04/30 13:31:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:31 client Ignoring all packets below 1. 2025/04/30 13:31:31 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:31 client -> Sending packet 3 (38 bytes) for connection 3d2b712188c77e8bfef48c86, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: e7eb1c71e99bd3821004c69bf2bf6b0a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:31 client Connection 3d2b712188c77e8bfef48c86 closed. 2025/04/30 13:31:31 Requesting https://server4:443/luahpocmhm. 2025/04/30 13:31:31 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:31 Increased send buffer size to 14336 kiB 2025/04/30 13:31:31 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:31 Created qlog file: /logs/qlog/21095a5fe0470997c53adc.sqlog 2025/04/30 13:31:31 client Starting new connection to server4 ([::]:39895 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 21095a5fe0470997c53adc, version v1 2025/04/30 13:31:31 Adding connection ID (empty). 2025/04/30 13:31:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:31 client -> Sending packet 0 (1280 bytes) for connection 21095a5fe0470997c53adc, Initial 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: 21095a5fe0470997c53adc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:31:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 13:31:31 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:31 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 254b66f4398ad71870f04388820f96f4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:31 client Received first packet. Switching destination connection ID to: 254b66f4398ad71870f04388820f96f4 2025/04/30 13:31:31 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.472ms} 2025/04/30 13:31:31 client newly acked packets (1): [0] 2025/04/30 13:31:31 client updated RTT: 34.420105ms (σ: 17.210052ms) 2025/04/30 13:31:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:31 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:31 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 254b66f4398ad71870f04388820f96f4, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:31 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:31:31 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:31 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 21095a5fe0470997c53adc, InitialSourceConnectionID: 254b66f4398ad71870f04388820f96f4, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:31 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 21095a5fe0470997c53adc 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: 254b66f4398ad71870f04388820f96f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: 254b66f4398ad71870f04388820f96f4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:31 client Dropping Initial keys. 2025/04/30 13:31:31 client -> Sending packet 1 (51 bytes) for connection 21095a5fe0470997c53adc, Handshake 2025/04/30 13:31:31 client Long Header{Type: Handshake, DestConnectionID: 254b66f4398ad71870f04388820f96f4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client -> Sending packet 0 (54 bytes) for connection 21095a5fe0470997c53adc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: 254b66f4398ad71870f04388820f96f4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:31 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:31 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:31 client Dropping Handshake keys. 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e5ad2dac77bdb5c7dea1c8149b70f942, StatelessResetToken: 0x39c417336b9b2ca227aa87cb1ad222fc} 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: dd1b4e09332bc2126dbfd2e0bb3ab7f6, StatelessResetToken: 0x61fbfb1f7061cc121a80d70faba3fbed} 2025/04/30 13:31:31 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 17852ab93bf7de06f6f19d9046e5da92, StatelessResetToken: 0xaf2aefd529dc556ac9c7bd67e2f542e3} 2025/04/30 13:31:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:31 client -> Sending packet 1 (45 bytes) for connection 21095a5fe0470997c53adc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: e5ad2dac77bdb5c7dea1c8149b70f942, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 185.2µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:31 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:31 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:31 client -> Sending packet 2 (45 bytes) for connection 21095a5fe0470997c53adc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: e5ad2dac77bdb5c7dea1c8149b70f942, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 75.983µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:31 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:31 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 6.68ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:31 client newly acked packets (2): [0 1] 2025/04/30 13:31:31 client ECN capability confirmed. 2025/04/30 13:31:31 client Canceling loss detection timer. 2025/04/30 13:31:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:31 client Ignoring all packets below 1. 2025/04/30 13:31:31 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:31 client -> Sending packet 3 (38 bytes) for connection 21095a5fe0470997c53adc, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:31 client Short Header{DestConnectionID: e5ad2dac77bdb5c7dea1c8149b70f942, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:31 client Connection 21095a5fe0470997c53adc closed. 2025/04/30 13:31:31 Requesting https://server4:443/xmnehtsosb. 2025/04/30 13:31:31 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:31 Increased send buffer size to 14336 kiB 2025/04/30 13:31:31 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:31 Created qlog file: /logs/qlog/5e498a7739245d7d9307441610854ab340319c.sqlog 2025/04/30 13:31:31 client Starting new connection to server4 ([::]:35093 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5e498a7739245d7d9307441610854ab340319c, version v1 2025/04/30 13:31:31 Adding connection ID (empty). 2025/04/30 13:31:31 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:31 client -> Sending packet 0 (1280 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, Initial 2025/04/30 13:31:31 client Long Header{Type: Initial, DestConnectionID: 5e498a7739245d7d9307441610854ab340319c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:31 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:32 client -> Sending packet 1 (1280 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, Initial 2025/04/30 13:31:32 client Long Header{Type: Initial, DestConnectionID: 5e498a7739245d7d9307441610854ab340319c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:32 client -> Sending packet 2 (1280 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, Initial 2025/04/30 13:31:32 client Long Header{Type: Initial, DestConnectionID: 5e498a7739245d7d9307441610854ab340319c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:32 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:32 client Received first packet. Switching destination connection ID to: 494dc2d3cd5eaa7b7823634a4c9738c0 2025/04/30 13:31:32 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 2.664ms} 2025/04/30 13:31:32 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:32 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:32 client -> Sending packet 3 (1280 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, Initial 2025/04/30 13:31:32 client Long Header{Type: Initial, DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:32 client -> Sending packet 4 (1280 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, Initial 2025/04/30 13:31:32 client Long Header{Type: Initial, DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:32 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:32 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:32 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 2.832ms} 2025/04/30 13:31:32 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:32 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:32 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 1.784ms} 2025/04/30 13:31:32 client newly acked packets (1): [4] 2025/04/30 13:31:32 client updated RTT: 34.820675ms (σ: 17.410337ms) 2025/04/30 13:31:33 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:33 client <- Reading packet 5 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:33 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 3.188232s} 2025/04/30 13:31:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:33 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:33 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:33 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:33 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:33 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:33 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:31:33 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:33 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:33 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5e498a7739245d7d9307441610854ab340319c, InitialSourceConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:33 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5e498a7739245d7d9307441610854ab340319c 2025/04/30 13:31:33 client Long Header{Type: Initial, DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:33 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:33 client Long Header{Type: Handshake, DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:33 client Dropping Initial keys. 2025/04/30 13:31:33 client -> Sending packet 1 (51 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, Handshake 2025/04/30 13:31:33 client Long Header{Type: Handshake, DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:33 client -> Sending packet 0 (54 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:33 client Short Header{DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:33 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:33 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:33 client Dropping Handshake keys. 2025/04/30 13:31:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:33 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:33 client -> Sending packet 1 (40 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:33 client Short Header{DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:33 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 113.363µs} 2025/04/30 13:31:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:33 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:33 client -> Sending packet 3 (54 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:33 client Short Header{DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:33 client -> Sending packet 4 (54 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:33 client Short Header{DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:33 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:33 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:33 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:33 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 464µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:33 client newly acked packets (1): [4] 2025/04/30 13:31:33 client updated RTT: 34.461ms (σ: 13.774ms) 2025/04/30 13:31:33 client ECN capability confirmed. 2025/04/30 13:31:33 client Canceling loss detection timer. 2025/04/30 13:31:33 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:33 client Sending ACK because the ACK timer expired. 2025/04/30 13:31:33 client -> Sending packet 5 (41 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:33 client Short Header{DestConnectionID: 494dc2d3cd5eaa7b7823634a4c9738c0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:33 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.2943ms} 2025/04/30 13:31:33 client <- Reading packet 4 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:33 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:33 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 464µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d753481c576e931b2900e0d2eca026b9, StatelessResetToken: 0x82bcdba3a1a7a7f9593f3fc1d6bb4690} 2025/04/30 13:31:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5a3323e810edec8c96a992271e350fad, StatelessResetToken: 0x44dd78d463518fc03ae865fa5af065ed} 2025/04/30 13:31:33 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: aed6e9d4721d7084d9880cde5299b47e, StatelessResetToken: 0xc6b617998315c7fa789b3d74491be373} 2025/04/30 13:31:33 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:33 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:33 client -> Sending packet 6 (1366 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:33 client Short Header{DestConnectionID: d753481c576e931b2900e0d2eca026b9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:33 client -> &wire.PingFrame{} 2025/04/30 13:31:33 client -> Sending packet 7 (42 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:33 client Short Header{DestConnectionID: d753481c576e931b2900e0d2eca026b9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:33 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 189.825µs} 2025/04/30 13:31:33 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:33 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:33 client -> Sending packet 8 (38 bytes) for connection 5e498a7739245d7d9307441610854ab340319c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:33 client Short Header{DestConnectionID: d753481c576e931b2900e0d2eca026b9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:33 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:33 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:33 client Connection 5e498a7739245d7d9307441610854ab340319c closed. 2025/04/30 13:31:33 Requesting https://server4:443/rbgiobteii. 2025/04/30 13:31:33 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:33 Increased send buffer size to 14336 kiB 2025/04/30 13:31:33 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:33 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:33 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:33 Created qlog file: /logs/qlog/29180018a9e4090a4a9cd33d.sqlog 2025/04/30 13:31:33 client Starting new connection to server4 ([::]:43349 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 29180018a9e4090a4a9cd33d, version v1 2025/04/30 13:31:33 Adding connection ID (empty). 2025/04/30 13:31:33 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:33 client -> Sending packet 0 (1280 bytes) for connection 29180018a9e4090a4a9cd33d, Initial 2025/04/30 13:31:33 client Long Header{Type: Initial, DestConnectionID: 29180018a9e4090a4a9cd33d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:33 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:33 client -> Sending packet 1 (1280 bytes) for connection 29180018a9e4090a4a9cd33d, Initial 2025/04/30 13:31:33 client Long Header{Type: Initial, DestConnectionID: 29180018a9e4090a4a9cd33d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:33 client -> Sending packet 2 (1280 bytes) for connection 29180018a9e4090a4a9cd33d, Initial 2025/04/30 13:31:33 client Long Header{Type: Initial, DestConnectionID: 29180018a9e4090a4a9cd33d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:33 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:31:33 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 542d338dc7a8d279b20136b706f9eba7, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:33 client Received first packet. Switching destination connection ID to: 542d338dc7a8d279b20136b706f9eba7 2025/04/30 13:31:33 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2.944ms} 2025/04/30 13:31:33 client newly acked packets (1): [2] 2025/04/30 13:31:33 client updated RTT: 34.778157ms (σ: 17.389078ms) 2025/04/30 13:31:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:33 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:33 client -> Sending packet 3 (1280 bytes) for connection 29180018a9e4090a4a9cd33d, Initial 2025/04/30 13:31:33 client Long Header{Type: Initial, DestConnectionID: 542d338dc7a8d279b20136b706f9eba7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:33 client -> &wire.PingFrame{} 2025/04/30 13:31:33 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:33 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 542d338dc7a8d279b20136b706f9eba7, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:33 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2.648ms} 2025/04/30 13:31:33 client newly acked packets (1): [3] 2025/04/30 13:31:33 client updated RTT: 34.653ms (σ: 13.291ms) 2025/04/30 13:31:34 client -> Sending packet 4 (1280 bytes) for connection 29180018a9e4090a4a9cd33d, Initial 2025/04/30 13:31:34 client Long Header{Type: Initial, DestConnectionID: 542d338dc7a8d279b20136b706f9eba7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:34 client -> &wire.PingFrame{} 2025/04/30 13:31:34 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 542d338dc7a8d279b20136b706f9eba7, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 3.056ms} 2025/04/30 13:31:34 client newly acked packets (1): [4] 2025/04/30 13:31:34 client updated RTT: 34.56ms (σ: 10.154ms) 2025/04/30 13:31:34 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:34 client <- Reading packet 7 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 542d338dc7a8d279b20136b706f9eba7, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.364608s} 2025/04/30 13:31:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:34 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:34 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 542d338dc7a8d279b20136b706f9eba7, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:31:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 29180018a9e4090a4a9cd33d, InitialSourceConnectionID: 542d338dc7a8d279b20136b706f9eba7, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 29180018a9e4090a4a9cd33d 2025/04/30 13:31:34 client Long Header{Type: Initial, DestConnectionID: 542d338dc7a8d279b20136b706f9eba7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client Long Header{Type: Handshake, DestConnectionID: 542d338dc7a8d279b20136b706f9eba7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:34 client Dropping Initial keys. 2025/04/30 13:31:34 client -> Sending packet 1 (51 bytes) for connection 29180018a9e4090a4a9cd33d, Handshake 2025/04/30 13:31:34 client Long Header{Type: Handshake, DestConnectionID: 542d338dc7a8d279b20136b706f9eba7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client -> Sending packet 0 (54 bytes) for connection 29180018a9e4090a4a9cd33d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: 542d338dc7a8d279b20136b706f9eba7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:34 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 640µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client Peer doesn't await address validation any longer. 2025/04/30 13:31:34 client newly acked packets (1): [0] 2025/04/30 13:31:34 client updated RTT: 34.578ms (σ: 7.651ms) 2025/04/30 13:31:34 client ECN capability confirmed. 2025/04/30 13:31:34 client Canceling loss detection timer. 2025/04/30 13:31:34 client Dropping Handshake keys. 2025/04/30 13:31:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:34 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:34 client -> Sending packet 1 (40 bytes) for connection 29180018a9e4090a4a9cd33d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: 542d338dc7a8d279b20136b706f9eba7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 168.335µs} 2025/04/30 13:31:34 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:34 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:34 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:34 client -> Sending packet 2 (38 bytes) for connection 29180018a9e4090a4a9cd33d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: 542d338dc7a8d279b20136b706f9eba7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:34 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:34 client Connection 29180018a9e4090a4a9cd33d closed. 2025/04/30 13:31:34 Requesting https://server4:443/bxyealzxct. 2025/04/30 13:31:34 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:34 Increased send buffer size to 14336 kiB 2025/04/30 13:31:34 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:34 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:34 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:34 Created qlog file: /logs/qlog/1820b1433c7cf7cc5e563a42dd668433783245.sqlog 2025/04/30 13:31:34 client Starting new connection to server4 ([::]:58854 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1820b1433c7cf7cc5e563a42dd668433783245, version v1 2025/04/30 13:31:34 Adding connection ID (empty). 2025/04/30 13:31:34 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:34 client -> Sending packet 0 (1280 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, Initial 2025/04/30 13:31:34 client Long Header{Type: Initial, DestConnectionID: 1820b1433c7cf7cc5e563a42dd668433783245, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:31:34 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:34 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:34 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:34 client Received first packet. Switching destination connection ID to: a45b6a2277b5e741fbbe161c087e9ce4 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.432ms} 2025/04/30 13:31:34 client newly acked packets (1): [0] 2025/04/30 13:31:34 client updated RTT: 34.395232ms (σ: 17.197616ms) 2025/04/30 13:31:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:34 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:34 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:34 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:34 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:34 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:34 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:31:34 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:34 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:34 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1820b1433c7cf7cc5e563a42dd668433783245, InitialSourceConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:34 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245 2025/04/30 13:31:34 client Long Header{Type: Initial, DestConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client Long Header{Type: Handshake, DestConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:34 client Dropping Initial keys. 2025/04/30 13:31:34 client -> Sending packet 1 (51 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, Handshake 2025/04/30 13:31:34 client Long Header{Type: Handshake, DestConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client -> Sending packet 0 (54 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:34 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:34 client -> Sending packet 2 (82 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, Handshake 2025/04/30 13:31:34 client Long Header{Type: Handshake, DestConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:34 client -> Sending packet 3 (82 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, Handshake 2025/04/30 13:31:34 client Long Header{Type: Handshake, DestConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:34 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:34 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:34 client Dropping Handshake keys. 2025/04/30 13:31:34 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:34 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:34 client -> Sending packet 2 (64 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 110.266µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:34 client -> Sending packet 3 (54 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: a45b6a2277b5e741fbbe161c087e9ce4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:34 client <- Reading packet 5 (135 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 696µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client newly acked packets (1): [3] 2025/04/30 13:31:34 client updated RTT: 34.123ms (σ: 13.44ms) 2025/04/30 13:31:34 client ECN capability confirmed. 2025/04/30 13:31:34 client Canceling loss detection timer. 2025/04/30 13:31:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d1b8679d527fffc832afc869908bae2c, StatelessResetToken: 0xa879fd1fc05d56de6c2c8df8dd887456} 2025/04/30 13:31:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 27ee6092647f8b304d574b614b48b0bb, StatelessResetToken: 0xe9cec260e371210923342154118b5299} 2025/04/30 13:31:34 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: dc32a917827c4958ea17ada6c665fea3, StatelessResetToken: 0x872d0200cd7e42cf3af454ce3d402d7a} 2025/04/30 13:31:34 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:34 client -> Sending packet 4 (47 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 158.406µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:34 client -> Sending packet 6 (37 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:34 client -> Sending packet 7 (37 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:34 client <- Reading packet 9 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 116.952ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client <- &wire.PingFrame{} 2025/04/30 13:31:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:34 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 116.952ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client <- &wire.PingFrame{} 2025/04/30 13:31:34 client -> Sending packet 8 (49 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 116.658µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:31:34 client -> Sending packet 10 (37 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:34 client -> Sending packet 11 (37 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:34 client -> Sending packet 12 (1366 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.PingFrame{} 2025/04/30 13:31:34 client <- Reading packet 14 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 199.392ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client <- &wire.PingFrame{} 2025/04/30 13:31:34 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:34 client <- Reading packet 16 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 199.392ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client <- &wire.PingFrame{} 2025/04/30 13:31:34 client -> Sending packet 13 (53 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 2, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 128.74µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client <- Reading packet 17 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 192µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client <- Reading packet 18 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:34 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:34 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 160µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:34 client newly acked packets (1): [12] 2025/04/30 13:31:34 client updated RTT: 33.904ms (σ: 10.517ms) 2025/04/30 13:31:34 client setting loss timer for packet 11 (1-RTT) to 38.142ms (in 2025-04-30 13:31:34.92876943 +0000 UTC m=+34.957345746) 2025/04/30 13:31:34 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 13:31:34.92876943 +0000 UTC m=+34.957345746 2025/04/30 13:31:34 client lost packet 11 (time threshold) 2025/04/30 13:31:34 client Canceling loss detection timer. 2025/04/30 13:31:34 client -> Sending packet 14 (37 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:34 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:34 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:35 client -> Sending packet 16 (37 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:35 client -> Sending packet 17 (37 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:35 client <- Reading packet 19 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 17, LowestAcked: 2, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 272µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client newly acked packets (1): [17] 2025/04/30 13:31:35 client updated RTT: 33.643ms (σ: 8.409ms) 2025/04/30 13:31:35 client Canceling loss detection timer. 2025/04/30 13:31:35 client -> Sending packet 18 (1409 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.PingFrame{} 2025/04/30 13:31:35 client <- Reading packet 20 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 2, AckRanges: {{Largest: 18, Smallest: 17}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 26.592ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client newly acked packets (1): [18] 2025/04/30 13:31:35 client updated RTT: 33.688ms (σ: 6.396ms) 2025/04/30 13:31:35 client <- Reading packet 22 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 2, AckRanges: {{Largest: 18, Smallest: 17}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 256.848ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client <- &wire.PingFrame{} 2025/04/30 13:31:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:35 client <- Reading packet 24 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 2, AckRanges: {{Largest: 18, Smallest: 17}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 256.848ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client <- &wire.PingFrame{} 2025/04/30 13:31:35 client -> Sending packet 19 (1430 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.PingFrame{} 2025/04/30 13:31:35 client -> Sending packet 20 (57 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.AckFrame{LargestAcked: 24, LowestAcked: 2, AckRanges: {{Largest: 24, Smallest: 24}, {Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 200.355µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client <- Reading packet 27 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 20, LowestAcked: 19, DelayTime: 103.232ms, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client newly acked packets (1): [19] 2025/04/30 13:31:35 client <- &wire.PingFrame{} 2025/04/30 13:31:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:35 client <- Reading packet 29 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 20, LowestAcked: 19, DelayTime: 103.232ms, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client <- &wire.PingFrame{} 2025/04/30 13:31:35 client -> Sending packet 21 (61 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.AckFrame{LargestAcked: 29, LowestAcked: 2, AckRanges: {{Largest: 29, Smallest: 29}, {Largest: 27, Smallest: 27}, {Largest: 24, Smallest: 24}, {Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 167.253µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client <- Reading packet 32 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 21, LowestAcked: 21, DelayTime: 93.928ms, ECT0: 11, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client <- &wire.PingFrame{} 2025/04/30 13:31:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:35 client -> Sending packet 22 (1441 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.PingFrame{} 2025/04/30 13:31:35 client -> Sending packet 23 (63 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.AckFrame{LargestAcked: 32, LowestAcked: 2, AckRanges: {{Largest: 32, Smallest: 32}, {Largest: 29, Smallest: 29}, {Largest: 27, Smallest: 27}, {Largest: 24, Smallest: 24}, {Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 143.017µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client <- Reading packet 35 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 35, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 23, LowestAcked: 21, DelayTime: 1.096ms, ECT0: 13, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client newly acked packets (1): [22] 2025/04/30 13:31:35 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:35 client -> Sending packet 24 (65 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.AckFrame{LargestAcked: 35, LowestAcked: 2, AckRanges: {{Largest: 35, Smallest: 35}, {Largest: 32, Smallest: 32}, {Largest: 29, Smallest: 29}, {Largest: 27, Smallest: 27}, {Largest: 24, Smallest: 24}, {Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 160.17µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:35 client -> Sending packet 25 (38 bytes) for connection 1820b1433c7cf7cc5e563a42dd668433783245, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: d1b8679d527fffc832afc869908bae2c, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:35 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:35 client Connection 1820b1433c7cf7cc5e563a42dd668433783245 closed. 2025/04/30 13:31:35 Requesting https://server4:443/adgmlkxbiw. 2025/04/30 13:31:35 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:35 Increased send buffer size to 14336 kiB 2025/04/30 13:31:35 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:35 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:35 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:35 Created qlog file: /logs/qlog/f300f2e2a6368cd988271944.sqlog 2025/04/30 13:31:35 client Starting new connection to server4 ([::]:41448 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f300f2e2a6368cd988271944, version v1 2025/04/30 13:31:35 Adding connection ID (empty). 2025/04/30 13:31:35 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:35 client -> Sending packet 0 (1280 bytes) for connection f300f2e2a6368cd988271944, Initial 2025/04/30 13:31:35 client Long Header{Type: Initial, DestConnectionID: f300f2e2a6368cd988271944, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:31:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:31:35 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:35 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:35 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:35 client Received first packet. Switching destination connection ID to: f4a1d2621cc911f3faf880e850bb5e7f 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.744ms} 2025/04/30 13:31:35 client newly acked packets (1): [0] 2025/04/30 13:31:35 client updated RTT: 34.486516ms (σ: 17.243258ms) 2025/04/30 13:31:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:35 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:35 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:35 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:35 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:35 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:35 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:31:35 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:35 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:35 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f300f2e2a6368cd988271944, InitialSourceConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:35 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f300f2e2a6368cd988271944 2025/04/30 13:31:35 client Long Header{Type: Initial, DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client Long Header{Type: Handshake, DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:35 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:35 client Dropping Initial keys. 2025/04/30 13:31:35 client -> Sending packet 1 (105 bytes) for connection f300f2e2a6368cd988271944, Handshake 2025/04/30 13:31:35 client Long Header{Type: Handshake, DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:35 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client Short Header{DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:35 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:35 client Dropping Handshake keys. 2025/04/30 13:31:35 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:35 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:35 client -> Sending packet 1 (43 bytes) for connection f300f2e2a6368cd988271944, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 145.135µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:35 client -> Sending packet 3 (54 bytes) for connection f300f2e2a6368cd988271944, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:35 client -> Sending packet 4 (54 bytes) for connection f300f2e2a6368cd988271944, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:35 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:35 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:35 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 129.712ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:35 client newly acked packets (1): [4] 2025/04/30 13:31:35 client updated RTT: 47.257ms (σ: 38.475ms) 2025/04/30 13:31:35 client ECN capability confirmed. 2025/04/30 13:31:35 client Canceling loss detection timer. 2025/04/30 13:31:35 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:35 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:35 client -> Sending packet 5 (1366 bytes) for connection f300f2e2a6368cd988271944, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.PingFrame{} 2025/04/30 13:31:35 client -> Sending packet 6 (45 bytes) for connection f300f2e2a6368cd988271944, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:35 client Short Header{DestConnectionID: f4a1d2621cc911f3faf880e850bb5e7f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:35 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 1, Smallest: 1}}, DelayTime: 225.813µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:36 client <- Reading packet 8 (140 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:36 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:36 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 848µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:36 client newly acked packets (1): [5] 2025/04/30 13:31:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 290ba858ebf1287c7d7208612671d2ee, StatelessResetToken: 0x7919a53f5baa106c369bd0d09dc81cce} 2025/04/30 13:31:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: f5577675e06a2e6c1022f254371b5ee3, StatelessResetToken: 0x87821d4a1a47b732587893dcf27f871a} 2025/04/30 13:31:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 2c80d86336fac67932aa031985b28625, StatelessResetToken: 0xf156ff17f82bec06af8619390887f02c} 2025/04/30 13:31:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:36 client -> Sending packet 7 (47 bytes) for connection f300f2e2a6368cd988271944, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:36 client Short Header{DestConnectionID: 290ba858ebf1287c7d7208612671d2ee, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:36 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 1, Smallest: 1}}, DelayTime: 147.466µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:36 client -> Sending packet 8 (38 bytes) for connection f300f2e2a6368cd988271944, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:36 client Short Header{DestConnectionID: 290ba858ebf1287c7d7208612671d2ee, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:36 client Connection f300f2e2a6368cd988271944 closed. 2025/04/30 13:31:36 Requesting https://server4:443/qmaznmlsfd. 2025/04/30 13:31:36 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:36 Increased send buffer size to 14336 kiB 2025/04/30 13:31:36 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:36 Created qlog file: /logs/qlog/0505365f44caceb5271057a0d1.sqlog 2025/04/30 13:31:36 client Starting new connection to server4 ([::]:60226 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0505365f44caceb5271057a0d1, version v1 2025/04/30 13:31:36 Adding connection ID (empty). 2025/04/30 13:31:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:36 client -> Sending packet 0 (1280 bytes) for connection 0505365f44caceb5271057a0d1, Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: 0505365f44caceb5271057a0d1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:31:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:31:36 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:36 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 80384b6da440c075143f58d317c2c190, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:36 client Received first packet. Switching destination connection ID to: 80384b6da440c075143f58d317c2c190 2025/04/30 13:31:36 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.048ms} 2025/04/30 13:31:36 client newly acked packets (1): [0] 2025/04/30 13:31:36 client updated RTT: 34.140221ms (σ: 17.07011ms) 2025/04/30 13:31:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:36 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:36 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:36 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:36 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:36 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 80384b6da440c075143f58d317c2c190, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:36 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:31:36 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:36 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:36 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0505365f44caceb5271057a0d1, InitialSourceConnectionID: 80384b6da440c075143f58d317c2c190, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:36 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0505365f44caceb5271057a0d1 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: 80384b6da440c075143f58d317c2c190, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:36 client Long Header{Type: Handshake, DestConnectionID: 80384b6da440c075143f58d317c2c190, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:36 client Dropping Initial keys. 2025/04/30 13:31:36 client -> Sending packet 1 (51 bytes) for connection 0505365f44caceb5271057a0d1, Handshake 2025/04/30 13:31:36 client Long Header{Type: Handshake, DestConnectionID: 80384b6da440c075143f58d317c2c190, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:36 client -> Sending packet 0 (54 bytes) for connection 0505365f44caceb5271057a0d1, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:36 client Short Header{DestConnectionID: 80384b6da440c075143f58d317c2c190, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:36 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:36 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:36 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:36 client Dropping Handshake keys. 2025/04/30 13:31:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: cfb38342eaeffd76922144dabb602239, StatelessResetToken: 0x1cc25e9811e7dbd5d12e7415f0c96622} 2025/04/30 13:31:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 4f201fad3f1888c004135ec5070cc003, StatelessResetToken: 0x9561a5e4091e331d31074fd600e8af4c} 2025/04/30 13:31:36 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 4b135bfd3ca49e5aa2a71a836a87e439, StatelessResetToken: 0xc6b8e4ed37d15ff794b6aab88cf80edd} 2025/04/30 13:31:36 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:36 client -> Sending packet 1 (45 bytes) for connection 0505365f44caceb5271057a0d1, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:36 client Short Header{DestConnectionID: cfb38342eaeffd76922144dabb602239, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:36 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 145.132µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:36 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:36 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:36 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:36 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:36 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:36 client -> Sending packet 2 (45 bytes) for connection 0505365f44caceb5271057a0d1, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:36 client Short Header{DestConnectionID: cfb38342eaeffd76922144dabb602239, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:36 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 57.317µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:36 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:36 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:36 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 6.744ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:36 client newly acked packets (2): [0 1] 2025/04/30 13:31:36 client ECN capability confirmed. 2025/04/30 13:31:36 client Canceling loss detection timer. 2025/04/30 13:31:36 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:36 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:36 client Ignoring all packets below 1. 2025/04/30 13:31:36 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:36 client -> Sending packet 3 (38 bytes) for connection 0505365f44caceb5271057a0d1, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:36 client Short Header{DestConnectionID: cfb38342eaeffd76922144dabb602239, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:36 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:36 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:36 client Connection 0505365f44caceb5271057a0d1 closed. 2025/04/30 13:31:36 Requesting https://server4:443/quaqdyebpl. 2025/04/30 13:31:36 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:36 Increased send buffer size to 14336 kiB 2025/04/30 13:31:36 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:36 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:36 Created qlog file: /logs/qlog/651b2fac92bcc2de.sqlog 2025/04/30 13:31:36 client Starting new connection to server4 ([::]:50144 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 651b2fac92bcc2de, version v1 2025/04/30 13:31:36 Adding connection ID (empty). 2025/04/30 13:31:36 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:36 client -> Sending packet 0 (1280 bytes) for connection 651b2fac92bcc2de, Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: 651b2fac92bcc2de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:36 client -> Sending packet 1 (1280 bytes) for connection 651b2fac92bcc2de, Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: 651b2fac92bcc2de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:36 client -> Sending packet 2 (1280 bytes) for connection 651b2fac92bcc2de, Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: 651b2fac92bcc2de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:31:36 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:31:36 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a051d9c2ffe3491c0b5e79e495e28770, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:36 client Received first packet. Switching destination connection ID to: a051d9c2ffe3491c0b5e79e495e28770 2025/04/30 13:31:36 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.144ms} 2025/04/30 13:31:36 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a051d9c2ffe3491c0b5e79e495e28770, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:36 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.512ms} 2025/04/30 13:31:36 client newly acked packets (1): [2] 2025/04/30 13:31:36 client updated RTT: 35.047358ms (σ: 17.523679ms) 2025/04/30 13:31:36 client -> Sending packet 3 (1280 bytes) for connection 651b2fac92bcc2de, Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: a051d9c2ffe3491c0b5e79e495e28770, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:36 client -> &wire.PingFrame{} 2025/04/30 13:31:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:36 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:31:36 client -> Sending packet 4 (1280 bytes) for connection 651b2fac92bcc2de, Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: a051d9c2ffe3491c0b5e79e495e28770, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:36 client -> &wire.PingFrame{} 2025/04/30 13:31:36 client -> Sending packet 5 (1280 bytes) for connection 651b2fac92bcc2de, Initial 2025/04/30 13:31:36 client Long Header{Type: Initial, DestConnectionID: a051d9c2ffe3491c0b5e79e495e28770, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:36 client -> &wire.PingFrame{} 2025/04/30 13:31:36 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:37 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a051d9c2ffe3491c0b5e79e495e28770, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 1.488ms} 2025/04/30 13:31:37 client newly acked packets (1): [5] 2025/04/30 13:31:37 client updated RTT: 35.04ms (σ: 13.155ms) 2025/04/30 13:31:37 client <- &wire.PingFrame{} 2025/04/30 13:31:37 client -> Sending packet 6 (1280 bytes) for connection 651b2fac92bcc2de, Initial 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: a051d9c2ffe3491c0b5e79e495e28770, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client Queueing packet (733 bytes) for later decryption 2025/04/30 13:31:37 client <- Reading packet 10 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a051d9c2ffe3491c0b5e79e495e28770, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 816.552ms} 2025/04/30 13:31:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client -> Sending packet 7 (1280 bytes) for connection 651b2fac92bcc2de, Initial 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: a051d9c2ffe3491c0b5e79e495e28770, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- Reading packet 2 (733 bytes) for connection (empty), Handshake 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a051d9c2ffe3491c0b5e79e495e28770, PacketNumber: 2, PacketNumberLen: 1, Length: 708, Version: v1} 2025/04/30 13:31:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 687, Offset + Data length: 687} 2025/04/30 13:31:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 651b2fac92bcc2de, InitialSourceConnectionID: a051d9c2ffe3491c0b5e79e495e28770, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:37 client -> Sending packet 0 (90 bytes) for connection 651b2fac92bcc2de, Handshake 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: a051d9c2ffe3491c0b5e79e495e28770, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 65, Version: v1} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:37 client Dropping Initial keys. 2025/04/30 13:31:37 client -> Sending packet 0 (54 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: a051d9c2ffe3491c0b5e79e495e28770, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:37 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.008ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client Peer doesn't await address validation any longer. 2025/04/30 13:31:37 client newly acked packets (1): [0] 2025/04/30 13:31:37 client updated RTT: 34.787ms (σ: 10.372ms) 2025/04/30 13:31:37 client ECN capability confirmed. 2025/04/30 13:31:37 client Canceling loss detection timer. 2025/04/30 13:31:37 client Dropping Handshake keys. 2025/04/30 13:31:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 321834356a497bf2a70ab3942d0cf26d, StatelessResetToken: 0x33fceabce7dd9c603a912ccff3e0b3f7} 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 69ab94f147bace94b8626690e6fc149e, StatelessResetToken: 0x0b7ee0552c9af7fe10f5ea0253e539ca} 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 03f5d7cfba274c759abb65141c0439ef, StatelessResetToken: 0xc5aecc4c79563f2340c3905e75a30f16} 2025/04/30 13:31:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:37 client -> Sending packet 1 (45 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 176.36µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:37 client -> Sending packet 3 (37 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:37 client -> Sending packet 4 (37 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:37 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 118.216ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:37 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 118.216ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:37 client -> Sending packet 5 (47 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 139.311µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 504µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client newly acked packets (1): [4] 2025/04/30 13:31:37 client updated RTT: 34.427ms (σ: 8.498ms) 2025/04/30 13:31:37 client Canceling loss detection timer. 2025/04/30 13:31:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:37 client Sending ACK because the ACK timer expired. 2025/04/30 13:31:37 client -> Sending packet 6 (48 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 25.327127ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 74.456ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- &wire.PingFrame{} 2025/04/30 13:31:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:37 client -> Sending packet 7 (1366 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.PingFrame{} 2025/04/30 13:31:37 client -> Sending packet 8 (49 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 177.913µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- Reading packet 15 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 105.584ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client newly acked packets (1): [7] 2025/04/30 13:31:37 client <- &wire.PingFrame{} 2025/04/30 13:31:37 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:37 client <- Reading packet 17 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 105.584ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- &wire.PingFrame{} 2025/04/30 13:31:37 client -> Sending packet 9 (53 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 0, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 151.814µs, ECT0: 6, ECT1: 0, CE: 1} 2025/04/30 13:31:37 client <- Reading packet 18 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 504µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:37 client -> Sending packet 10 (38 bytes) for connection 651b2fac92bcc2de, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 321834356a497bf2a70ab3942d0cf26d, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:37 client Connection 651b2fac92bcc2de closed. 2025/04/30 13:31:37 Requesting https://server4:443/zxrkocbuih. 2025/04/30 13:31:37 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:37 Increased send buffer size to 14336 kiB 2025/04/30 13:31:37 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:37 Created qlog file: /logs/qlog/d4c8fea28331833e3577d1f13bd065e5c2b301.sqlog 2025/04/30 13:31:37 client Starting new connection to server4 ([::]:44507 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d4c8fea28331833e3577d1f13bd065e5c2b301, version v1 2025/04/30 13:31:37 Adding connection ID (empty). 2025/04/30 13:31:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:37 client -> Sending packet 0 (1280 bytes) for connection d4c8fea28331833e3577d1f13bd065e5c2b301, Initial 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: d4c8fea28331833e3577d1f13bd065e5c2b301, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:31:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:37 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:37 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 920a9c7fd95cb21c2a15d67cc0dffd27, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:37 client Received first packet. Switching destination connection ID to: 920a9c7fd95cb21c2a15d67cc0dffd27 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.968ms} 2025/04/30 13:31:37 client newly acked packets (1): [0] 2025/04/30 13:31:37 client updated RTT: 34.496143ms (σ: 17.248071ms) 2025/04/30 13:31:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:37 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 920a9c7fd95cb21c2a15d67cc0dffd27, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:31:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d4c8fea28331833e3577d1f13bd065e5c2b301, InitialSourceConnectionID: 920a9c7fd95cb21c2a15d67cc0dffd27, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d4c8fea28331833e3577d1f13bd065e5c2b301 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: 920a9c7fd95cb21c2a15d67cc0dffd27, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: 920a9c7fd95cb21c2a15d67cc0dffd27, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:37 client Dropping Initial keys. 2025/04/30 13:31:37 client -> Sending packet 1 (51 bytes) for connection d4c8fea28331833e3577d1f13bd065e5c2b301, Handshake 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: 920a9c7fd95cb21c2a15d67cc0dffd27, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client -> Sending packet 0 (54 bytes) for connection d4c8fea28331833e3577d1f13bd065e5c2b301, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 920a9c7fd95cb21c2a15d67cc0dffd27, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:37 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:37 client Dropping Handshake keys. 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 37095f4e401a8cba67c70fa84a0bcad3, StatelessResetToken: 0x3fb06ed1287bc27ce897c18b77872e2d} 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: a7c353fdcd931477e508e7bb78e29573, StatelessResetToken: 0x55f01f17d3f671d007e36d2a751072b0} 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 84c75da71b422356a3ba2c77b68d7243, StatelessResetToken: 0xffd52cb5359398259341516f0522a6c5} 2025/04/30 13:31:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:37 client -> Sending packet 1 (45 bytes) for connection d4c8fea28331833e3577d1f13bd065e5c2b301, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 37095f4e401a8cba67c70fa84a0bcad3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 143.077µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:37 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 768µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client newly acked packets (1): [0] 2025/04/30 13:31:37 client updated RTT: 34.58ms (σ: 13.104ms) 2025/04/30 13:31:37 client ECN capability confirmed. 2025/04/30 13:31:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:37 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:37 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:37 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:37 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:37 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:37 client -> Sending packet 2 (43 bytes) for connection d4c8fea28331833e3577d1f13bd065e5c2b301, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 37095f4e401a8cba67c70fa84a0bcad3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 153.918µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:37 client -> Sending packet 3 (38 bytes) for connection d4c8fea28331833e3577d1f13bd065e5c2b301, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 37095f4e401a8cba67c70fa84a0bcad3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:37 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:37 client Connection d4c8fea28331833e3577d1f13bd065e5c2b301 closed. 2025/04/30 13:31:37 Requesting https://server4:443/pfqobkjrbq. 2025/04/30 13:31:37 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:37 Increased send buffer size to 14336 kiB 2025/04/30 13:31:37 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:37 Created qlog file: /logs/qlog/7230ed289bc6f235affa274b8b287b76.sqlog 2025/04/30 13:31:37 client Starting new connection to server4 ([::]:34551 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7230ed289bc6f235affa274b8b287b76, version v1 2025/04/30 13:31:37 Adding connection ID (empty). 2025/04/30 13:31:37 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:37 client -> Sending packet 0 (1280 bytes) for connection 7230ed289bc6f235affa274b8b287b76, Initial 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: 7230ed289bc6f235affa274b8b287b76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:31:37 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:37 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 579612a30b2466b48f3348205510734d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:37 client Received first packet. Switching destination connection ID to: 579612a30b2466b48f3348205510734d 2025/04/30 13:31:37 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.648ms} 2025/04/30 13:31:37 client newly acked packets (1): [0] 2025/04/30 13:31:37 client updated RTT: 34.298795ms (σ: 17.149397ms) 2025/04/30 13:31:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:37 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:37 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 579612a30b2466b48f3348205510734d, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:37 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:31:37 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:37 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7230ed289bc6f235affa274b8b287b76, InitialSourceConnectionID: 579612a30b2466b48f3348205510734d, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:37 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7230ed289bc6f235affa274b8b287b76 2025/04/30 13:31:37 client Long Header{Type: Initial, DestConnectionID: 579612a30b2466b48f3348205510734d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: 579612a30b2466b48f3348205510734d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:37 client Dropping Initial keys. 2025/04/30 13:31:37 client -> Sending packet 1 (51 bytes) for connection 7230ed289bc6f235affa274b8b287b76, Handshake 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: 579612a30b2466b48f3348205510734d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client -> Sending packet 0 (54 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: 579612a30b2466b48f3348205510734d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:37 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:37 client -> Sending packet 2 (82 bytes) for connection 7230ed289bc6f235affa274b8b287b76, Handshake 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: 579612a30b2466b48f3348205510734d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:37 client -> Sending packet 3 (82 bytes) for connection 7230ed289bc6f235affa274b8b287b76, Handshake 2025/04/30 13:31:37 client Long Header{Type: Handshake, DestConnectionID: 579612a30b2466b48f3348205510734d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:37 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:37 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:37 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:37 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:37 client Dropping Handshake keys. 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: ecc1900338a768c5f8772902d4b05442, StatelessResetToken: 0xd399e6f20fa22514e622c60906e6c3e8} 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 7b552128471c658ba0d025f64b04659d, StatelessResetToken: 0x34bdde5c6fe3603c1ea522a8c1c24e0f} 2025/04/30 13:31:37 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: eaba8c33fe3a0f399b4b5a7543263593, StatelessResetToken: 0xfe2e78be0177b0823e79a91e809ad558} 2025/04/30 13:31:37 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:37 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:37 client -> Sending packet 2 (64 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 148.748µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:37 client -> Sending packet 3 (56 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:37 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:37 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:37 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:38 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:38 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:38 client -> Sending packet 4 (47 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 110.817µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:31:38 client -> Sending packet 6 (56 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:38 client -> Sending packet 7 (56 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:38 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:38 client -> Sending packet 8 (1366 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.PingFrame{} 2025/04/30 13:31:38 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:38 client <- Reading packet 9 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 114.616ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client newly acked packets (2): [7 8] 2025/04/30 13:31:38 client updated RTT: 45.386ms (σ: 35.038ms) 2025/04/30 13:31:38 client ECN capability confirmed. 2025/04/30 13:31:38 client Canceling loss detection timer. 2025/04/30 13:31:38 client <- &wire.PingFrame{} 2025/04/30 13:31:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:38 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 114.616ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- &wire.PingFrame{} 2025/04/30 13:31:38 client -> Sending packet 9 (51 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 179.937µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- Reading packet 14 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 103.088ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- &wire.PingFrame{} 2025/04/30 13:31:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:38 client <- Reading packet 16 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 103.088ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- &wire.PingFrame{} 2025/04/30 13:31:38 client -> Sending packet 10 (1409 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.PingFrame{} 2025/04/30 13:31:38 client -> Sending packet 11 (55 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 0, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 183.032µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- Reading packet 17 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 26.704ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client newly acked packets (1): [10] 2025/04/30 13:31:38 client updated RTT: 47.123ms (σ: 29.752ms) 2025/04/30 13:31:38 client <- Reading packet 19 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 170.832ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- &wire.PingFrame{} 2025/04/30 13:31:38 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:38 client <- Reading packet 21 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 170.832ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- &wire.PingFrame{} 2025/04/30 13:31:38 client -> Sending packet 12 (59 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.AckFrame{LargestAcked: 21, LowestAcked: 0, AckRanges: {{Largest: 21, Smallest: 21}, {Largest: 19, Smallest: 19}, {Largest: 17, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 170.58µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- Reading packet 22 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:38 client Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:38 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 12, DelayTime: 664µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:38 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:38 client Queuing ACK because the packet was ECN-CE marked. 2025/04/30 13:31:38 client -> Sending packet 13 (1430 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.PingFrame{} 2025/04/30 13:31:38 client -> Sending packet 14 (59 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 0, AckRanges: {{Largest: 22, Smallest: 21}, {Largest: 19, Smallest: 19}, {Largest: 17, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 162.484µs, ECT0: 10, ECT1: 0, CE: 1} 2025/04/30 13:31:38 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:38 client -> Sending packet 15 (38 bytes) for connection 7230ed289bc6f235affa274b8b287b76, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:38 client Short Header{DestConnectionID: ecc1900338a768c5f8772902d4b05442, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:38 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:38 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:38 client Connection 7230ed289bc6f235affa274b8b287b76 closed. 2025/04/30 13:31:38 Requesting https://server4:443/krwvebsfyl. 2025/04/30 13:31:38 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:38 Increased send buffer size to 14336 kiB 2025/04/30 13:31:38 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:38 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:38 Created qlog file: /logs/qlog/dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7.sqlog 2025/04/30 13:31:38 client Starting new connection to server4 ([::]:54110 -> 193.167.100.100:443), source connection ID (empty), destination connection ID dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, version v1 2025/04/30 13:31:38 Adding connection ID (empty). 2025/04/30 13:31:38 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:38 client -> Sending packet 0 (1280 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, Initial 2025/04/30 13:31:38 client Long Header{Type: Initial, DestConnectionID: dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:38 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:38 client -> Sending packet 1 (1280 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, Initial 2025/04/30 13:31:38 client Long Header{Type: Initial, DestConnectionID: dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:38 client -> Sending packet 2 (1280 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, Initial 2025/04/30 13:31:38 client Long Header{Type: Initial, DestConnectionID: dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:38 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:39 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:39 client -> Sending packet 3 (1280 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, Initial 2025/04/30 13:31:39 client Long Header{Type: Initial, DestConnectionID: dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:39 client -> Sending packet 4 (1280 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, Initial 2025/04/30 13:31:39 client Long Header{Type: Initial, DestConnectionID: dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:39 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:39 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:39 client <- Reading packet 4 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:39 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a0923264cdaeab14c5fe92cfbd8d73d7, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:39 client Received first packet. Switching destination connection ID to: a0923264cdaeab14c5fe92cfbd8d73d7 2025/04/30 13:31:39 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 4.795768s} 2025/04/30 13:31:39 client newly acked packets (1): [4] 2025/04/30 13:31:39 client updated RTT: 634.364422ms (σ: 317.182211ms) 2025/04/30 13:31:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:39 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:39 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:39 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:39 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:39 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a0923264cdaeab14c5fe92cfbd8d73d7, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:39 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 13:31:39 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:39 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:39 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, InitialSourceConnectionID: a0923264cdaeab14c5fe92cfbd8d73d7, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:39 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7 2025/04/30 13:31:39 client Long Header{Type: Initial, DestConnectionID: a0923264cdaeab14c5fe92cfbd8d73d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:39 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:39 client Long Header{Type: Handshake, DestConnectionID: a0923264cdaeab14c5fe92cfbd8d73d7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:39 client Dropping Initial keys. 2025/04/30 13:31:39 client -> Sending packet 1 (51 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, Handshake 2025/04/30 13:31:39 client Long Header{Type: Handshake, DestConnectionID: a0923264cdaeab14c5fe92cfbd8d73d7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:39 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:39 client -> Sending packet 0 (54 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:39 client Short Header{DestConnectionID: a0923264cdaeab14c5fe92cfbd8d73d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:39 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:39 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:39 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:39 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 616µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:39 client Peer doesn't await address validation any longer. 2025/04/30 13:31:39 client newly acked packets (1): [0] 2025/04/30 13:31:39 client updated RTT: 559.468ms (σ: 387.677ms) 2025/04/30 13:31:39 client ECN capability confirmed. 2025/04/30 13:31:39 client Canceling loss detection timer. 2025/04/30 13:31:39 client Dropping Handshake keys. 2025/04/30 13:31:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:39 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:39 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:39 client -> Sending packet 1 (43 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:39 client Short Header{DestConnectionID: a0923264cdaeab14c5fe92cfbd8d73d7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:39 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 179.49µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:39 client <- Reading packet 3 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:39 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:39 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.672ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:39 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 29955efd5d06c3a9cff55c702511a55f, StatelessResetToken: 0x80412a8f174249c298bed72f93347c96} 2025/04/30 13:31:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 0420f4a8357b5706876801ce9a6a60ee, StatelessResetToken: 0xcc333343d2d5badd1755fb7a3278218c} 2025/04/30 13:31:39 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 7e33255a4d5b4d9f1a90f4220e7b3225, StatelessResetToken: 0x2b33d9f0417abe15e81195ea8050d57d} 2025/04/30 13:31:39 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:39 client -> Sending packet 2 (47 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:39 client Short Header{DestConnectionID: 29955efd5d06c3a9cff55c702511a55f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:39 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 109.915µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:39 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:39 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:39 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:39 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 440µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:39 client newly acked packets (1): [2] 2025/04/30 13:31:39 client updated RTT: 493.487ms (σ: 422.717ms) 2025/04/30 13:31:39 client Canceling loss detection timer. 2025/04/30 13:31:39 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:39 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:39 client Ignoring all packets below 4. 2025/04/30 13:31:39 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:39 client -> Sending packet 3 (38 bytes) for connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:39 client Short Header{DestConnectionID: 29955efd5d06c3a9cff55c702511a55f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:39 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:39 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:39 client Connection dfa21ebc959314ea1d905087c2fc8c2d8f6fa9c7 closed. 2025/04/30 13:31:39 Requesting https://server4:443/fjjhkfefou. 2025/04/30 13:31:39 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:39 Increased send buffer size to 14336 kiB 2025/04/30 13:31:39 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:39 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:39 Created qlog file: /logs/qlog/fdca70f15749348570.sqlog 2025/04/30 13:31:39 client Starting new connection to server4 ([::]:53070 -> 193.167.100.100:443), source connection ID (empty), destination connection ID fdca70f15749348570, version v1 2025/04/30 13:31:39 Adding connection ID (empty). 2025/04/30 13:31:39 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:39 client -> Sending packet 0 (1280 bytes) for connection fdca70f15749348570, Initial 2025/04/30 13:31:39 client Long Header{Type: Initial, DestConnectionID: fdca70f15749348570, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:39 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:40 client -> Sending packet 1 (1280 bytes) for connection fdca70f15749348570, Initial 2025/04/30 13:31:40 client Long Header{Type: Initial, DestConnectionID: fdca70f15749348570, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:40 client -> Sending packet 2 (1280 bytes) for connection fdca70f15749348570, Initial 2025/04/30 13:31:40 client Long Header{Type: Initial, DestConnectionID: fdca70f15749348570, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:40 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:40 client -> Sending packet 3 (1280 bytes) for connection fdca70f15749348570, Initial 2025/04/30 13:31:40 client Long Header{Type: Initial, DestConnectionID: fdca70f15749348570, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:40 client -> Sending packet 4 (1280 bytes) for connection fdca70f15749348570, Initial 2025/04/30 13:31:40 client Long Header{Type: Initial, DestConnectionID: fdca70f15749348570, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:40 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:31:40 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:40 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23945af91ec94beeaf84f5694f299280, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:40 client Received first packet. Switching destination connection ID to: 23945af91ec94beeaf84f5694f299280 2025/04/30 13:31:40 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 3.08ms} 2025/04/30 13:31:40 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:41 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:41 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:41 client <- Reading packet 5 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23945af91ec94beeaf84f5694f299280, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:41 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 4.807856s} 2025/04/30 13:31:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:41 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:41 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23945af91ec94beeaf84f5694f299280, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 687, Offset + Data length: 687} 2025/04/30 13:31:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: fdca70f15749348570, InitialSourceConnectionID: 23945af91ec94beeaf84f5694f299280, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection fdca70f15749348570 2025/04/30 13:31:41 client Long Header{Type: Initial, DestConnectionID: 23945af91ec94beeaf84f5694f299280, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:41 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:41 client Long Header{Type: Handshake, DestConnectionID: 23945af91ec94beeaf84f5694f299280, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:41 client Dropping Initial keys. 2025/04/30 13:31:41 client -> Sending packet 1 (105 bytes) for connection fdca70f15749348570, Handshake 2025/04/30 13:31:41 client Long Header{Type: Handshake, DestConnectionID: 23945af91ec94beeaf84f5694f299280, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:41 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:41 client Short Header{DestConnectionID: 23945af91ec94beeaf84f5694f299280, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:41 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:41 client -> Sending packet 2 (82 bytes) for connection fdca70f15749348570, Handshake 2025/04/30 13:31:41 client Long Header{Type: Handshake, DestConnectionID: 23945af91ec94beeaf84f5694f299280, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:41 client -> Sending packet 3 (82 bytes) for connection fdca70f15749348570, Handshake 2025/04/30 13:31:41 client Long Header{Type: Handshake, DestConnectionID: 23945af91ec94beeaf84f5694f299280, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:41 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:41 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:41 client Dropping Handshake keys. 2025/04/30 13:31:41 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:41 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:41 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:41 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:41 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:41 client -> Sending packet 2 (61 bytes) for connection fdca70f15749348570, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:41 client Short Header{DestConnectionID: 23945af91ec94beeaf84f5694f299280, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:41 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 119.313µs} 2025/04/30 13:31:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:41 client -> Sending packet 3 (54 bytes) for connection fdca70f15749348570, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:41 client Short Header{DestConnectionID: 23945af91ec94beeaf84f5694f299280, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:41 client -> Sending packet 4 (1366 bytes) for connection fdca70f15749348570, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:41 client Short Header{DestConnectionID: 23945af91ec94beeaf84f5694f299280, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:41 client -> &wire.PingFrame{} 2025/04/30 13:31:41 client <- Reading packet 10 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:41 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:41 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 520µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:41 client newly acked packets (2): [3 4] 2025/04/30 13:31:41 client updated RTT: 34.158247ms (σ: 17.079123ms) 2025/04/30 13:31:41 client ECN capability confirmed. 2025/04/30 13:31:41 client Canceling loss detection timer. 2025/04/30 13:31:41 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:41 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:41 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:41 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:41 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:41 client -> Sending packet 5 (44 bytes) for connection fdca70f15749348570, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:41 client Short Header{DestConnectionID: 23945af91ec94beeaf84f5694f299280, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:41 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 180.467µs} 2025/04/30 13:31:41 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:41 client -> Sending packet 6 (38 bytes) for connection fdca70f15749348570, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:41 client Short Header{DestConnectionID: 23945af91ec94beeaf84f5694f299280, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:41 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:41 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:41 client Connection fdca70f15749348570 closed. 2025/04/30 13:31:41 Requesting https://server4:443/xtiwnhscbu. 2025/04/30 13:31:41 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:41 Increased send buffer size to 14336 kiB 2025/04/30 13:31:41 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:41 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:41 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:41 Created qlog file: /logs/qlog/23fc5d41f7bbbf6e94a2ee9b96af179f.sqlog 2025/04/30 13:31:41 client Starting new connection to server4 ([::]:57217 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 23fc5d41f7bbbf6e94a2ee9b96af179f, version v1 2025/04/30 13:31:41 Adding connection ID (empty). 2025/04/30 13:31:41 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:41 client -> Sending packet 0 (1280 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Initial 2025/04/30 13:31:41 client Long Header{Type: Initial, DestConnectionID: 23fc5d41f7bbbf6e94a2ee9b96af179f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:31:41 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:41 client -> Sending packet 1 (1280 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Initial 2025/04/30 13:31:41 client Long Header{Type: Initial, DestConnectionID: 23fc5d41f7bbbf6e94a2ee9b96af179f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:31:41 client -> Sending packet 2 (1280 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Initial 2025/04/30 13:31:41 client Long Header{Type: Initial, DestConnectionID: 23fc5d41f7bbbf6e94a2ee9b96af179f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:31:41 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:41 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:41 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:41 client Received first packet. Switching destination connection ID to: 29e7ef6d0ae3685a0e0e8fc3ea127252 2025/04/30 13:31:41 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.416ms} 2025/04/30 13:31:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:41 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:41 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:41 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:41 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:41 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:41 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:31:41 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:41 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:41 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 23fc5d41f7bbbf6e94a2ee9b96af179f, InitialSourceConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:41 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f 2025/04/30 13:31:41 client Long Header{Type: Initial, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:41 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:41 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:41 client Dropping Initial keys. 2025/04/30 13:31:41 client -> Sending packet 1 (105 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:41 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:41 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:41 client Short Header{DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:41 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:42 client -> Sending packet 2 (82 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:42 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:42 client -> Sending packet 3 (82 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:42 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:42 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 13:31:42 client -> Sending packet 4 (82 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:42 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:42 client -> Sending packet 5 (82 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:42 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:42 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:42 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:43 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 13:31:43 client -> Sending packet 6 (82 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:43 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:43 client -> Sending packet 7 (82 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:43 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:43 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:43 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:43 Tracking 1 connection IDs and 0 reset tokens. 2025/04/30 13:31:44 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 13:31:44 client -> Sending packet 8 (82 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:44 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:44 client -> Sending packet 9 (82 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, Handshake 2025/04/30 13:31:44 client Long Header{Type: Handshake, DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:44 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:44 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:45 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:45 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:45 client Dropping Handshake keys. 2025/04/30 13:31:45 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:45 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:45 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:45 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:45 client -> Sending packet 2 (64 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 116.418µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:45 client -> Sending packet 3 (54 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:45 client -> Sending packet 4 (1366 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.PingFrame{} 2025/04/30 13:31:45 client <- Reading packet 9 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:45 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:45 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 832µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client newly acked packets (1): [3] 2025/04/30 13:31:45 client updated RTT: 33.110316ms (σ: 16.555158ms) 2025/04/30 13:31:45 client ECN capability confirmed. 2025/04/30 13:31:45 client Canceling loss detection timer. 2025/04/30 13:31:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:45 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:45 client Sending ACK because the ACK timer expired. 2025/04/30 13:31:45 client -> Sending packet 5 (46 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 25.307505ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:45 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:45 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 26.432ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client newly acked packets (1): [4] 2025/04/30 13:31:45 client updated RTT: 33.284ms (σ: 12.766ms) 2025/04/30 13:31:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:45 client -> Sending packet 6 (47 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 29e7ef6d0ae3685a0e0e8fc3ea127252, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 71.914µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client <- Reading packet 12 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:45 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:45 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 672µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 1d836f59b697bc9c5e5df034f1ea02ae, StatelessResetToken: 0x668ffcd9719241f8c32163a5d10b3a51} 2025/04/30 13:31:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: a547e6ca69b584f247a6619136cbdba5, StatelessResetToken: 0xd57ade41732d5ed19e86c0be3f95d9fe} 2025/04/30 13:31:45 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 4ab76679b5fb9fdc3ecea2be40e47da0, StatelessResetToken: 0x8daee20f76c012107a01ef9ce2dbcc54} 2025/04/30 13:31:45 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:45 client -> Sending packet 7 (49 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 1d836f59b697bc9c5e5df034f1ea02ae, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 86.892µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:45 client <- Reading packet 14 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:45 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:45 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 25.736ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client newly acked packets (1): [7] 2025/04/30 13:31:45 client updated RTT: 36.231ms (σ: 15.469ms) 2025/04/30 13:31:45 client Canceling loss detection timer. 2025/04/30 13:31:45 client Ignoring all packets below 13. 2025/04/30 13:31:45 client <- Reading packet 16 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:45 client Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:45 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 157.92ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client <- &wire.PingFrame{} 2025/04/30 13:31:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:45 client -> Sending packet 8 (1409 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 1d836f59b697bc9c5e5df034f1ea02ae, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.PingFrame{} 2025/04/30 13:31:45 client -> Sending packet 9 (45 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 1d836f59b697bc9c5e5df034f1ea02ae, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 14, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}}, DelayTime: 126.767µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client <- Reading packet 19 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:45 client Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:45 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 448µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:45 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:45 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:45 client -> Sending packet 10 (38 bytes) for connection 23fc5d41f7bbbf6e94a2ee9b96af179f, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 1d836f59b697bc9c5e5df034f1ea02ae, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:45 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:45 client Connection 23fc5d41f7bbbf6e94a2ee9b96af179f closed. 2025/04/30 13:31:45 Requesting https://server4:443/wjtrkxnuco. 2025/04/30 13:31:45 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:45 Increased send buffer size to 14336 kiB 2025/04/30 13:31:45 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:45 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:45 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:45 Created qlog file: /logs/qlog/5d04e185d1b66528b95869391498c8b1fc343aee.sqlog 2025/04/30 13:31:45 client Starting new connection to server4 ([::]:47595 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 5d04e185d1b66528b95869391498c8b1fc343aee, version v1 2025/04/30 13:31:45 Adding connection ID (empty). 2025/04/30 13:31:45 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:45 client -> Sending packet 0 (1280 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, Initial 2025/04/30 13:31:45 client Long Header{Type: Initial, DestConnectionID: 5d04e185d1b66528b95869391498c8b1fc343aee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:31:45 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:45 client -> Sending packet 1 (1280 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, Initial 2025/04/30 13:31:45 client Long Header{Type: Initial, DestConnectionID: 5d04e185d1b66528b95869391498c8b1fc343aee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:31:45 client -> Sending packet 2 (1280 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, Initial 2025/04/30 13:31:45 client Long Header{Type: Initial, DestConnectionID: 5d04e185d1b66528b95869391498c8b1fc343aee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:31:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:31:45 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:45 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:45 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 790fae386687be108d6756d73e440c5b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:45 client Received first packet. Switching destination connection ID to: 790fae386687be108d6756d73e440c5b 2025/04/30 13:31:45 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 10.944ms} 2025/04/30 13:31:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:45 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:45 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:45 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:45 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:45 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 790fae386687be108d6756d73e440c5b, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:45 client <- &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 13:31:45 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:45 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:45 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 5d04e185d1b66528b95869391498c8b1fc343aee, InitialSourceConnectionID: 790fae386687be108d6756d73e440c5b, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:45 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee 2025/04/30 13:31:45 client Long Header{Type: Initial, DestConnectionID: 790fae386687be108d6756d73e440c5b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client Long Header{Type: Handshake, DestConnectionID: 790fae386687be108d6756d73e440c5b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:45 client Dropping Initial keys. 2025/04/30 13:31:45 client -> Sending packet 1 (51 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, Handshake 2025/04/30 13:31:45 client Long Header{Type: Handshake, DestConnectionID: 790fae386687be108d6756d73e440c5b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:45 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:45 client -> Sending packet 0 (54 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:45 client Short Header{DestConnectionID: 790fae386687be108d6756d73e440c5b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:45 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:45 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:45 client -> Sending packet 2 (82 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, Handshake 2025/04/30 13:31:45 client Long Header{Type: Handshake, DestConnectionID: 790fae386687be108d6756d73e440c5b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:45 client -> Sending packet 3 (82 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, Handshake 2025/04/30 13:31:45 client Long Header{Type: Handshake, DestConnectionID: 790fae386687be108d6756d73e440c5b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:45 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:46 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:46 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:46 client Dropping Handshake keys. 2025/04/30 13:31:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:46 client -> Sending packet 2 (62 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: 790fae386687be108d6756d73e440c5b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 116.979µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:46 client -> Sending packet 3 (54 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: 790fae386687be108d6756d73e440c5b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:46 client -> Sending packet 4 (1366 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: 790fae386687be108d6756d73e440c5b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.PingFrame{} 2025/04/30 13:31:46 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:46 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 160µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client newly acked packets (1): [4] 2025/04/30 13:31:46 client updated RTT: 32.583379ms (σ: 16.291689ms) 2025/04/30 13:31:46 client ECN capability confirmed. 2025/04/30 13:31:46 client setting loss timer for packet 3 (1-RTT) to 36.656301ms (in 2025-04-30 13:31:46.189130361 +0000 UTC m=+46.217706678) 2025/04/30 13:31:46 client <- Reading packet 7 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:46 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:46 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 704µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:46 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:46 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:46 client -> Sending packet 5 (45 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: 790fae386687be108d6756d73e440c5b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 120.496µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:46 client -> Sending packet 6 (38 bytes) for connection 5d04e185d1b66528b95869391498c8b1fc343aee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: 790fae386687be108d6756d73e440c5b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:46 client Connection 5d04e185d1b66528b95869391498c8b1fc343aee closed. 2025/04/30 13:31:46 Requesting https://server4:443/hdnltclwvv. 2025/04/30 13:31:46 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:46 Increased send buffer size to 14336 kiB 2025/04/30 13:31:46 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:46 Created qlog file: /logs/qlog/46306239228f0dccac0925c60dd2f627.sqlog 2025/04/30 13:31:46 client Starting new connection to server4 ([::]:46996 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 46306239228f0dccac0925c60dd2f627, version v1 2025/04/30 13:31:46 Adding connection ID (empty). 2025/04/30 13:31:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:46 client -> Sending packet 0 (1280 bytes) for connection 46306239228f0dccac0925c60dd2f627, Initial 2025/04/30 13:31:46 client Long Header{Type: Initial, DestConnectionID: 46306239228f0dccac0925c60dd2f627, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:46 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:46 client -> Sending packet 1 (1280 bytes) for connection 46306239228f0dccac0925c60dd2f627, Initial 2025/04/30 13:31:46 client Long Header{Type: Initial, DestConnectionID: 46306239228f0dccac0925c60dd2f627, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:46 client -> Sending packet 2 (1280 bytes) for connection 46306239228f0dccac0925c60dd2f627, Initial 2025/04/30 13:31:46 client Long Header{Type: Initial, DestConnectionID: 46306239228f0dccac0925c60dd2f627, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:31:46 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:46 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:46 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3df0315acaee101b9e1115e9969cd3f0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:46 client Received first packet. Switching destination connection ID to: 3df0315acaee101b9e1115e9969cd3f0 2025/04/30 13:31:46 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 9.816ms} 2025/04/30 13:31:46 client newly acked packets (1): [2] 2025/04/30 13:31:46 client updated RTT: 35.612836ms (σ: 17.806418ms) 2025/04/30 13:31:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:46 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:46 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:46 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:46 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:46 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3df0315acaee101b9e1115e9969cd3f0, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:46 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:31:46 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:46 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:46 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 46306239228f0dccac0925c60dd2f627, InitialSourceConnectionID: 3df0315acaee101b9e1115e9969cd3f0, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:46 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 46306239228f0dccac0925c60dd2f627 2025/04/30 13:31:46 client Long Header{Type: Initial, DestConnectionID: 3df0315acaee101b9e1115e9969cd3f0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client Long Header{Type: Handshake, DestConnectionID: 3df0315acaee101b9e1115e9969cd3f0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:46 client Dropping Initial keys. 2025/04/30 13:31:46 client -> Sending packet 1 (51 bytes) for connection 46306239228f0dccac0925c60dd2f627, Handshake 2025/04/30 13:31:46 client Long Header{Type: Handshake, DestConnectionID: 3df0315acaee101b9e1115e9969cd3f0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client -> Sending packet 0 (54 bytes) for connection 46306239228f0dccac0925c60dd2f627, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: 3df0315acaee101b9e1115e9969cd3f0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:46 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:31:46 client -> Sending packet 2 (82 bytes) for connection 46306239228f0dccac0925c60dd2f627, Handshake 2025/04/30 13:31:46 client Long Header{Type: Handshake, DestConnectionID: 3df0315acaee101b9e1115e9969cd3f0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:46 client -> Sending packet 3 (82 bytes) for connection 46306239228f0dccac0925c60dd2f627, Handshake 2025/04/30 13:31:46 client Long Header{Type: Handshake, DestConnectionID: 3df0315acaee101b9e1115e9969cd3f0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:46 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:46 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:46 client Dropping Handshake keys. 2025/04/30 13:31:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d3668c4f3c2bd27eb7e4ec6427696c5c, StatelessResetToken: 0x03c3a2717047729bb22f6391e0dfb5f2} 2025/04/30 13:31:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 1cbf6d65db8aff5893d9e6d7e8d000c7, StatelessResetToken: 0xf7284f738c7b6559122f6cd150c3fa7b} 2025/04/30 13:31:46 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 1a58978657c208873ca372b44106a494, StatelessResetToken: 0x782d3a2c3a2c74d3da5e5e88971c3c5d} 2025/04/30 13:31:46 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:31:46 client -> Sending packet 2 (64 bytes) for connection 46306239228f0dccac0925c60dd2f627, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: d3668c4f3c2bd27eb7e4ec6427696c5c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 121.627µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:46 client -> Sending packet 3 (56 bytes) for connection 46306239228f0dccac0925c60dd2f627, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: d3668c4f3c2bd27eb7e4ec6427696c5c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:46 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:31:46 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:31:46 client -> Sending packet 5 (56 bytes) for connection 46306239228f0dccac0925c60dd2f627, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: d3668c4f3c2bd27eb7e4ec6427696c5c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:46 client -> Sending packet 6 (56 bytes) for connection 46306239228f0dccac0925c60dd2f627, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: d3668c4f3c2bd27eb7e4ec6427696c5c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:46 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:46 client -> Sending packet 7 (1366 bytes) for connection 46306239228f0dccac0925c60dd2f627, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: d3668c4f3c2bd27eb7e4ec6427696c5c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.PingFrame{} 2025/04/30 13:31:46 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:46 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:46 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 960µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client newly acked packets (1): [6] 2025/04/30 13:31:46 client updated RTT: 35.329ms (σ: 13.92ms) 2025/04/30 13:31:46 client ECN capability confirmed. 2025/04/30 13:31:46 client Canceling loss detection timer. 2025/04/30 13:31:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:46 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:46 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:46 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:46 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:46 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:46 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:46 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:31:46 client -> Sending packet 8 (43 bytes) for connection 46306239228f0dccac0925c60dd2f627, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: d3668c4f3c2bd27eb7e4ec6427696c5c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 225.488µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:46 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:46 client -> Sending packet 9 (38 bytes) for connection 46306239228f0dccac0925c60dd2f627, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:46 client Short Header{DestConnectionID: d3668c4f3c2bd27eb7e4ec6427696c5c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:46 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:46 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:46 client Connection 46306239228f0dccac0925c60dd2f627 closed. 2025/04/30 13:31:46 Requesting https://server4:443/zbnrslocvl. 2025/04/30 13:31:46 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:46 Increased send buffer size to 14336 kiB 2025/04/30 13:31:46 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:46 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:46 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:46 Created qlog file: /logs/qlog/6a8ab1d588503cc20a.sqlog 2025/04/30 13:31:46 client Starting new connection to server4 ([::]:35438 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6a8ab1d588503cc20a, version v1 2025/04/30 13:31:46 Adding connection ID (empty). 2025/04/30 13:31:46 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:46 client -> Sending packet 0 (1280 bytes) for connection 6a8ab1d588503cc20a, Initial 2025/04/30 13:31:46 client Long Header{Type: Initial, DestConnectionID: 6a8ab1d588503cc20a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:46 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:31:47 client -> Sending packet 1 (1280 bytes) for connection 6a8ab1d588503cc20a, Initial 2025/04/30 13:31:47 client Long Header{Type: Initial, DestConnectionID: 6a8ab1d588503cc20a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:47 client -> Sending packet 2 (1280 bytes) for connection 6a8ab1d588503cc20a, Initial 2025/04/30 13:31:47 client Long Header{Type: Initial, DestConnectionID: 6a8ab1d588503cc20a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:47 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:31:47 client -> Sending packet 3 (1280 bytes) for connection 6a8ab1d588503cc20a, Initial 2025/04/30 13:31:47 client Long Header{Type: Initial, DestConnectionID: 6a8ab1d588503cc20a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:47 client -> Sending packet 4 (1280 bytes) for connection 6a8ab1d588503cc20a, Initial 2025/04/30 13:31:47 client Long Header{Type: Initial, DestConnectionID: 6a8ab1d588503cc20a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:31:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:31:47 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:31:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 97b5a372ca555cca38087fa9a16da6c3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:31:47 client Received first packet. Switching destination connection ID to: 97b5a372ca555cca38087fa9a16da6c3 2025/04/30 13:31:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 2.912ms} 2025/04/30 13:31:47 client newly acked packets (1): [4] 2025/04/30 13:31:47 client updated RTT: 34.804321ms (σ: 17.40216ms) 2025/04/30 13:31:47 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:47 client <- Reading packet 4 (147 bytes) for connection (empty), Initial 2025/04/30 13:31:47 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 97b5a372ca555cca38087fa9a16da6c3, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:31:47 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 3.187496s} 2025/04/30 13:31:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:47 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:47 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:47 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:47 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 97b5a372ca555cca38087fa9a16da6c3, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:31:47 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:47 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:47 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6a8ab1d588503cc20a, InitialSourceConnectionID: 97b5a372ca555cca38087fa9a16da6c3, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:47 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6a8ab1d588503cc20a 2025/04/30 13:31:47 client Long Header{Type: Initial, DestConnectionID: 97b5a372ca555cca38087fa9a16da6c3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:47 client Long Header{Type: Handshake, DestConnectionID: 97b5a372ca555cca38087fa9a16da6c3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:47 client Dropping Initial keys. 2025/04/30 13:31:47 client -> Sending packet 1 (105 bytes) for connection 6a8ab1d588503cc20a, Handshake 2025/04/30 13:31:47 client Long Header{Type: Handshake, DestConnectionID: 97b5a372ca555cca38087fa9a16da6c3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:47 client Short Header{DestConnectionID: 97b5a372ca555cca38087fa9a16da6c3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:47 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:47 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:31:47 client Dropping %!s(logging.PacketType=0) packet (147 bytes) because we already dropped the keys. 2025/04/30 13:31:47 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:31:47 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:31:47 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 97b5a372ca555cca38087fa9a16da6c3, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:31:47 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:31:47 client -> Sending packet 2 (53 bytes) for connection 6a8ab1d588503cc20a, Handshake 2025/04/30 13:31:47 client Long Header{Type: Handshake, DestConnectionID: 97b5a372ca555cca38087fa9a16da6c3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:31:47 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:47 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:47 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:47 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.232ms} 2025/04/30 13:31:47 client Peer doesn't await address validation any longer. 2025/04/30 13:31:47 client newly acked packets (1): [0] 2025/04/30 13:31:47 client updated RTT: 34.649ms (σ: 13.36ms) 2025/04/30 13:31:47 client Canceling loss detection timer. 2025/04/30 13:31:47 client Dropping Handshake keys. 2025/04/30 13:31:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 91571a6ab72d08e6fa4a2d5d51ec471f, StatelessResetToken: 0x5cb45b8697d9073d1b2a35bf9f9a6471} 2025/04/30 13:31:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 49a6e94fe91c1d8039b136d7914c267e, StatelessResetToken: 0xae4b891b42711e7cac44ce782cdae2f8} 2025/04/30 13:31:47 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 584ca298025598d6e3cecdd394d9fa4b, StatelessResetToken: 0x52577255b25dbaa6cdb1fc345b5337dd} 2025/04/30 13:31:47 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:47 client -> Sending packet 1 (45 bytes) for connection 6a8ab1d588503cc20a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:47 client Short Header{DestConnectionID: 91571a6ab72d08e6fa4a2d5d51ec471f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:47 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 180.038µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:47 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:47 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:47 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:47 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:47 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:47 client -> Sending packet 2 (45 bytes) for connection 6a8ab1d588503cc20a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:47 client Short Header{DestConnectionID: 91571a6ab72d08e6fa4a2d5d51ec471f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:47 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 66.845µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:47 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:47 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:47 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 6.752ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:47 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:47 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:47 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:47 client -> Sending packet 3 (38 bytes) for connection 6a8ab1d588503cc20a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:47 client Short Header{DestConnectionID: 91571a6ab72d08e6fa4a2d5d51ec471f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:47 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:47 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:47 client Connection 6a8ab1d588503cc20a closed. 2025/04/30 13:31:47 Requesting https://server4:443/cymtqjrzib. 2025/04/30 13:31:47 Increased receive buffer size to 14336 kiB 2025/04/30 13:31:47 Increased send buffer size to 14336 kiB 2025/04/30 13:31:47 Setting DF for IPv4 and IPv6. 2025/04/30 13:31:47 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:31:47 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:31:47 Created qlog file: /logs/qlog/7165bf2f3753582c3a0f810350756827.sqlog 2025/04/30 13:31:47 client Starting new connection to server4 ([::]:35320 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7165bf2f3753582c3a0f810350756827, version v1 2025/04/30 13:31:47 Adding connection ID (empty). 2025/04/30 13:31:47 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:31:47 client -> Sending packet 0 (1280 bytes) for connection 7165bf2f3753582c3a0f810350756827, Initial 2025/04/30 13:31:47 client Long Header{Type: Initial, DestConnectionID: 7165bf2f3753582c3a0f810350756827, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:31:47 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:31:48 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:31:48 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:31:48 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c7a6d1ca7e45cab3c272cf713831fc2a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:31:48 client Received first packet. Switching destination connection ID to: c7a6d1ca7e45cab3c272cf713831fc2a 2025/04/30 13:31:48 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.04ms} 2025/04/30 13:31:48 client newly acked packets (1): [0] 2025/04/30 13:31:48 client updated RTT: 34.269912ms (σ: 17.134956ms) 2025/04/30 13:31:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:31:48 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:48 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:48 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:31:48 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:31:48 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c7a6d1ca7e45cab3c272cf713831fc2a, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:31:48 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:31:48 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:48 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:31:48 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7165bf2f3753582c3a0f810350756827, InitialSourceConnectionID: c7a6d1ca7e45cab3c272cf713831fc2a, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:31:48 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7165bf2f3753582c3a0f810350756827 2025/04/30 13:31:48 client Long Header{Type: Initial, DestConnectionID: c7a6d1ca7e45cab3c272cf713831fc2a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:31:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:48 client Long Header{Type: Handshake, DestConnectionID: c7a6d1ca7e45cab3c272cf713831fc2a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:31:48 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:31:48 client Dropping Initial keys. 2025/04/30 13:31:48 client -> Sending packet 1 (51 bytes) for connection 7165bf2f3753582c3a0f810350756827, Handshake 2025/04/30 13:31:48 client Long Header{Type: Handshake, DestConnectionID: c7a6d1ca7e45cab3c272cf713831fc2a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:31:48 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:48 client -> Sending packet 0 (54 bytes) for connection 7165bf2f3753582c3a0f810350756827, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:48 client Short Header{DestConnectionID: c7a6d1ca7e45cab3c272cf713831fc2a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:48 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:31:48 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:48 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:48 client Dropping Handshake keys. 2025/04/30 13:31:48 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:31:48 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:31:48 client -> Sending packet 1 (43 bytes) for connection 7165bf2f3753582c3a0f810350756827, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:48 client Short Header{DestConnectionID: c7a6d1ca7e45cab3c272cf713831fc2a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:48 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 108.814µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:31:48 client <- Reading packet 3 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:48 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:48 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 5.832ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:48 client newly acked packets (1): [0] 2025/04/30 13:31:48 client ECN capability confirmed. 2025/04/30 13:31:48 client Canceling loss detection timer. 2025/04/30 13:31:48 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:31:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: ec9d0731ed24e1f92c525990ff0d5bc5, StatelessResetToken: 0x265785afde80fbf7d354034d8a4bb3b3} 2025/04/30 13:31:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 26414b4dd1ed7f92ac1b7271f74b61df, StatelessResetToken: 0x1134a59949f9b1303ef932732b17b14d} 2025/04/30 13:31:48 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 894f873de453ccce1a0d573276aa3496, StatelessResetToken: 0x32dfe2acf1c912a545655509afb17684} 2025/04/30 13:31:48 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:31:48 client -> Sending packet 2 (47 bytes) for connection 7165bf2f3753582c3a0f810350756827, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:48 client Short Header{DestConnectionID: ec9d0731ed24e1f92c525990ff0d5bc5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:48 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 166.371µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:31:48 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:31:48 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:31:48 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:31:48 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 568µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:31:48 client newly acked packets (1): [2] 2025/04/30 13:31:48 client updated RTT: 33.961ms (σ: 13.464ms) 2025/04/30 13:31:48 client Canceling loss detection timer. 2025/04/30 13:31:48 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:31:48 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:31:48 client Ignoring all packets below 4. 2025/04/30 13:31:48 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:31:48 client -> Sending packet 3 (38 bytes) for connection 7165bf2f3753582c3a0f810350756827, 1-RTT (ECN: ECT(0)) 2025/04/30 13:31:48 client Short Header{DestConnectionID: ec9d0731ed24e1f92c525990ff0d5bc5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:31:48 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:31:48 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:31:48 client Connection 7165bf2f3753582c3a0f810350756827 closed.