2025/04/30 13:29:54 Requesting https://server4:443/nqhldrpppg. 2025/04/30 13:29:54 Increased receive buffer size to 14336 kiB 2025/04/30 13:29:54 Increased send buffer size to 14336 kiB 2025/04/30 13:29:54 Setting DF for IPv4 and IPv6. 2025/04/30 13:29:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:29:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:29:54 Created qlog file: /logs/qlog/e816921a0fa86b36.sqlog 2025/04/30 13:29:54 client Starting new connection to server4 ([::]:54568 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e816921a0fa86b36, version v1 2025/04/30 13:29:54 Adding connection ID (empty). 2025/04/30 13:29:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:29:54 client -> Sending packet 0 (1280 bytes) for connection e816921a0fa86b36, Initial 2025/04/30 13:29:54 client Long Header{Type: Initial, DestConnectionID: e816921a0fa86b36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:29:54 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:29:54 client -> Sending packet 1 (1280 bytes) for connection e816921a0fa86b36, Initial 2025/04/30 13:29:54 client Long Header{Type: Initial, DestConnectionID: e816921a0fa86b36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:29:54 client -> Sending packet 2 (1280 bytes) for connection e816921a0fa86b36, Initial 2025/04/30 13:29:54 client Long Header{Type: Initial, DestConnectionID: e816921a0fa86b36, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:29:54 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:29:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 572ef26340bf95478727cd8c74ee9a55, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:29:54 client Received first packet. Switching destination connection ID to: 572ef26340bf95478727cd8c74ee9a55 2025/04/30 13:29:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.176ms} 2025/04/30 13:29:55 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:29:55 client -> Sending packet 3 (1280 bytes) for connection e816921a0fa86b36, Initial 2025/04/30 13:29:55 client Long Header{Type: Initial, DestConnectionID: 572ef26340bf95478727cd8c74ee9a55, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:29:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:29:55 client -> Sending packet 4 (1280 bytes) for connection e816921a0fa86b36, Initial 2025/04/30 13:29:55 client Long Header{Type: Initial, DestConnectionID: 572ef26340bf95478727cd8c74ee9a55, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:29:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:29:55 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:29:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 572ef26340bf95478727cd8c74ee9a55, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:29:55 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 2.592ms} 2025/04/30 13:29:55 client newly acked packets (1): [4] 2025/04/30 13:29:55 client updated RTT: 34.77091ms (σ: 17.385455ms) 2025/04/30 13:29:55 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:29:55 client <- Reading packet 5 (147 bytes) for connection (empty), Initial 2025/04/30 13:29:55 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 572ef26340bf95478727cd8c74ee9a55, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:29:55 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 3.2306s} 2025/04/30 13:29:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:29:55 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:55 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:55 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:29:55 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:29:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 572ef26340bf95478727cd8c74ee9a55, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:29:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 684, Offset + Data length: 684} 2025/04/30 13:29:55 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:55 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:55 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e816921a0fa86b36, InitialSourceConnectionID: 572ef26340bf95478727cd8c74ee9a55, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:29:55 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e816921a0fa86b36 2025/04/30 13:29:55 client Long Header{Type: Initial, DestConnectionID: 572ef26340bf95478727cd8c74ee9a55, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:29:55 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client Long Header{Type: Handshake, DestConnectionID: 572ef26340bf95478727cd8c74ee9a55, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:29:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:29:55 client Dropping Initial keys. 2025/04/30 13:29:55 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:29:55 client Dropping %!s(logging.PacketType=0) packet (147 bytes) because we already dropped the keys. 2025/04/30 13:29:55 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:29:55 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:29:55 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 572ef26340bf95478727cd8c74ee9a55, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:29:55 client <- &wire.CryptoFrame{Offset: 0, Data length: 684, Offset + Data length: 684} 2025/04/30 13:29:55 client -> Sending packet 1 (107 bytes) for connection e816921a0fa86b36, Handshake 2025/04/30 13:29:55 client Long Header{Type: Handshake, DestConnectionID: 572ef26340bf95478727cd8c74ee9a55, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:29:55 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client Short Header{DestConnectionID: 572ef26340bf95478727cd8c74ee9a55, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:29:55 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:55 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:55 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.448ms} 2025/04/30 13:29:55 client Peer doesn't await address validation any longer. 2025/04/30 13:29:55 client newly acked packets (1): [0] 2025/04/30 13:29:55 client updated RTT: 34.654ms (σ: 13.269ms) 2025/04/30 13:29:55 client Canceling loss detection timer. 2025/04/30 13:29:55 client Dropping Handshake keys. 2025/04/30 13:29:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, StatelessResetToken: 0x1c79115b0e60f31b016e09ec2116de3c} 2025/04/30 13:29:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 45b36cb8dfa456fa62d6ed85cd1d641e, StatelessResetToken: 0xcef567924f309b17c27d4c1190e2b2b9} 2025/04/30 13:29:55 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: eb0ac62dbb9abbc61dd7fa9ccb2cb916, StatelessResetToken: 0xf7beb9f4990de276cc02e781b0dfd787} 2025/04/30 13:29:55 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:29:55 client -> Sending packet 1 (45 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 228.468µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:55 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:55 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:55 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:29:55 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:29:55 client -> Sending packet 2 (45 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72.656µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:29:55 client -> Sending packet 4 (37 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:55 client -> Sending packet 5 (37 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:55 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:55 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:55 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 86.888ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client <- &wire.PingFrame{} 2025/04/30 13:29:55 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:29:55 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:55 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:55 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 86.888ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client <- &wire.PingFrame{} 2025/04/30 13:29:55 client -> Sending packet 6 (49 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 121.307µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:55 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:55 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 400µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client newly acked packets (1): [5] 2025/04/30 13:29:55 client updated RTT: 34.283ms (σ: 10.692ms) 2025/04/30 13:29:55 client ECN capability confirmed. 2025/04/30 13:29:55 client Canceling loss detection timer. 2025/04/30 13:29:55 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:55 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:55 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 205.544ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client <- &wire.PingFrame{} 2025/04/30 13:29:55 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:29:55 client -> Sending packet 7 (1366 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.PingFrame{} 2025/04/30 13:29:55 client -> Sending packet 8 (51 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 181.88µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client <- Reading packet 13 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:55 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:55 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 872µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:55 client newly acked packets (1): [7] 2025/04/30 13:29:55 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:29:55 client Queuing ACK because the packet was ECN-CE marked. 2025/04/30 13:29:55 client -> Sending packet 9 (51 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 135.034µs, ECT0: 5, ECT1: 0, CE: 1} 2025/04/30 13:29:55 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:29:55 client -> Sending packet 10 (38 bytes) for connection e816921a0fa86b36, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:55 client Short Header{DestConnectionID: 0f0413b0a7b6eda5540e974ee786a0cb, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:55 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:29:55 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:29:55 client Connection e816921a0fa86b36 closed. 2025/04/30 13:29:55 Requesting https://server4:443/ulauxyrewt. 2025/04/30 13:29:55 Increased receive buffer size to 14336 kiB 2025/04/30 13:29:55 Increased send buffer size to 14336 kiB 2025/04/30 13:29:55 Setting DF for IPv4 and IPv6. 2025/04/30 13:29:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:29:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:29:55 Created qlog file: /logs/qlog/2279f2af804c1cad.sqlog 2025/04/30 13:29:55 client Starting new connection to server4 ([::]:50385 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2279f2af804c1cad, version v1 2025/04/30 13:29:55 Adding connection ID (empty). 2025/04/30 13:29:55 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:29:55 client -> Sending packet 0 (1280 bytes) for connection 2279f2af804c1cad, Initial 2025/04/30 13:29:55 client Long Header{Type: Initial, DestConnectionID: 2279f2af804c1cad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:55 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:29:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:29:56 client -> Sending packet 1 (1280 bytes) for connection 2279f2af804c1cad, Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: 2279f2af804c1cad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:29:56 client -> Sending packet 2 (1280 bytes) for connection 2279f2af804c1cad, Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: 2279f2af804c1cad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:29:56 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63fea596968934f47d0cdc1e710bf4d6, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:29:56 client Received first packet. Switching destination connection ID to: 63fea596968934f47d0cdc1e710bf4d6 2025/04/30 13:29:56 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 2.928ms} 2025/04/30 13:29:56 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63fea596968934f47d0cdc1e710bf4d6, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:29:56 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.48ms} 2025/04/30 13:29:56 client newly acked packets (1): [2] 2025/04/30 13:29:56 client updated RTT: 34.897343ms (σ: 17.448671ms) 2025/04/30 13:29:56 client -> Sending packet 3 (1280 bytes) for connection 2279f2af804c1cad, Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: 63fea596968934f47d0cdc1e710bf4d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:29:56 client -> &wire.PingFrame{} 2025/04/30 13:29:56 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:29:56 client -> Sending packet 4 (1280 bytes) for connection 2279f2af804c1cad, Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: 63fea596968934f47d0cdc1e710bf4d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:29:56 client -> &wire.PingFrame{} 2025/04/30 13:29:56 client -> Sending packet 5 (1280 bytes) for connection 2279f2af804c1cad, Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: 63fea596968934f47d0cdc1e710bf4d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:29:56 client -> &wire.PingFrame{} 2025/04/30 13:29:56 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63fea596968934f47d0cdc1e710bf4d6, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:29:56 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 2.544ms} 2025/04/30 13:29:56 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:29:56 client <- Reading packet 7 (147 bytes) for connection (empty), Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63fea596968934f47d0cdc1e710bf4d6, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:29:56 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 1.076648s} 2025/04/30 13:29:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:29:56 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:56 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:56 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:29:56 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:29:56 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 63fea596968934f47d0cdc1e710bf4d6, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:29:56 client <- &wire.CryptoFrame{Offset: 0, Data length: 685, Offset + Data length: 685} 2025/04/30 13:29:56 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:56 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:56 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2279f2af804c1cad, InitialSourceConnectionID: 63fea596968934f47d0cdc1e710bf4d6, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:29:56 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2279f2af804c1cad 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: 63fea596968934f47d0cdc1e710bf4d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:29:56 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:29:56 client Long Header{Type: Handshake, DestConnectionID: 63fea596968934f47d0cdc1e710bf4d6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:29:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:29:56 client Dropping Initial keys. 2025/04/30 13:29:56 client -> Sending packet 1 (51 bytes) for connection 2279f2af804c1cad, Handshake 2025/04/30 13:29:56 client Long Header{Type: Handshake, DestConnectionID: 63fea596968934f47d0cdc1e710bf4d6, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:56 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:56 client -> Sending packet 0 (54 bytes) for connection 2279f2af804c1cad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:56 client Short Header{DestConnectionID: 63fea596968934f47d0cdc1e710bf4d6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:56 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:29:56 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:56 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:56 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.208ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:56 client Peer doesn't await address validation any longer. 2025/04/30 13:29:56 client newly acked packets (1): [0] 2025/04/30 13:29:56 client updated RTT: 34.741ms (σ: 13.397ms) 2025/04/30 13:29:56 client ECN capability confirmed. 2025/04/30 13:29:56 client Canceling loss detection timer. 2025/04/30 13:29:56 client Dropping Handshake keys. 2025/04/30 13:29:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: b4b56233f9faeef4e2a62e1b1321c2fd, StatelessResetToken: 0x1a43014209c550f39a8e9e40660c1714} 2025/04/30 13:29:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: deebc448fe94dd7aee3e23b5b8f042a8, StatelessResetToken: 0xc2a48eeb679dcd47aa6dac2fd020f80e} 2025/04/30 13:29:56 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 9ad16c77aa17cb6d3d2ef029813ff439, StatelessResetToken: 0xf9536ba2f414893cb3a0bdc752dbc114} 2025/04/30 13:29:56 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:29:56 client -> Sending packet 1 (45 bytes) for connection 2279f2af804c1cad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:56 client Short Header{DestConnectionID: b4b56233f9faeef4e2a62e1b1321c2fd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:56 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.776µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:56 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:56 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:56 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:56 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:29:56 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:56 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:56 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:56 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:56 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:29:56 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:29:56 client -> Sending packet 2 (43 bytes) for connection 2279f2af804c1cad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:56 client Short Header{DestConnectionID: b4b56233f9faeef4e2a62e1b1321c2fd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:56 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 142.647µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:56 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:29:56 client -> Sending packet 3 (38 bytes) for connection 2279f2af804c1cad, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:56 client Short Header{DestConnectionID: b4b56233f9faeef4e2a62e1b1321c2fd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:56 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:29:56 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:29:56 client Connection 2279f2af804c1cad closed. 2025/04/30 13:29:56 Requesting https://server4:443/pumxhxqutz. 2025/04/30 13:29:56 Increased receive buffer size to 14336 kiB 2025/04/30 13:29:56 Increased send buffer size to 14336 kiB 2025/04/30 13:29:56 Setting DF for IPv4 and IPv6. 2025/04/30 13:29:56 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:29:56 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:29:56 Created qlog file: /logs/qlog/9ab0cd4bf77e956d0ebc830414fb1e.sqlog 2025/04/30 13:29:56 client Starting new connection to server4 ([::]:38538 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9ab0cd4bf77e956d0ebc830414fb1e, version v1 2025/04/30 13:29:56 Adding connection ID (empty). 2025/04/30 13:29:56 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:29:56 client -> Sending packet 0 (1280 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, Initial 2025/04/30 13:29:56 client Long Header{Type: Initial, DestConnectionID: 9ab0cd4bf77e956d0ebc830414fb1e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:29:56 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:29:57 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:29:57 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:29:57 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f7a624d1207ee1612e167ed1bdc1189a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:29:57 client Received first packet. Switching destination connection ID to: f7a624d1207ee1612e167ed1bdc1189a 2025/04/30 13:29:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.28ms} 2025/04/30 13:29:57 client newly acked packets (1): [0] 2025/04/30 13:29:57 client updated RTT: 34.267985ms (σ: 17.133992ms) 2025/04/30 13:29:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:29:57 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:57 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:57 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:29:57 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:29:57 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7a624d1207ee1612e167ed1bdc1189a, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:29:57 client <- &wire.CryptoFrame{Offset: 0, Data length: 692, Offset + Data length: 692} 2025/04/30 13:29:57 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:57 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:57 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9ab0cd4bf77e956d0ebc830414fb1e, InitialSourceConnectionID: f7a624d1207ee1612e167ed1bdc1189a, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:29:57 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e 2025/04/30 13:29:57 client Long Header{Type: Initial, DestConnectionID: f7a624d1207ee1612e167ed1bdc1189a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:29:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client Long Header{Type: Handshake, DestConnectionID: f7a624d1207ee1612e167ed1bdc1189a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:29:57 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:29:57 client Dropping Initial keys. 2025/04/30 13:29:57 client -> Sending packet 1 (51 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, Handshake 2025/04/30 13:29:57 client Long Header{Type: Handshake, DestConnectionID: f7a624d1207ee1612e167ed1bdc1189a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client -> Sending packet 0 (54 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: f7a624d1207ee1612e167ed1bdc1189a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:29:57 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:57 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:57 client Dropping Handshake keys. 2025/04/30 13:29:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, StatelessResetToken: 0x2fe01f47b391b66874b50f2073149760} 2025/04/30 13:29:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: ea2dcf8329eef0259ec7f0d489d3554c, StatelessResetToken: 0xc13c4d64bebc84cbae4cb714e7841f26} 2025/04/30 13:29:57 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 98a091d70e121ddf9e7dded2a459332c, StatelessResetToken: 0x3d025a1c54d1f61cc6f60deee6305710} 2025/04/30 13:29:57 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:29:57 client -> Sending packet 1 (45 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 137.709µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:57 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:57 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:57 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 624µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client newly acked packets (1): [0] 2025/04/30 13:29:57 client updated RTT: 34.335ms (σ: 12.986ms) 2025/04/30 13:29:57 client ECN capability confirmed. 2025/04/30 13:29:57 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:57 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:29:57 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:57 client Sending ACK because the ACK timer expired. 2025/04/30 13:29:57 client -> Sending packet 2 (44 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.304506ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:29:57 client -> Sending packet 4 (37 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:57 client -> Sending packet 5 (37 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:57 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:57 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:57 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 66.104ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client <- &wire.PingFrame{} 2025/04/30 13:29:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:29:57 client -> Sending packet 6 (45 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 92.103µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:29:57 client -> Sending packet 8 (37 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:57 client -> Sending packet 9 (37 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:57 client -> Sending packet 10 (1366 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.PingFrame{} 2025/04/30 13:29:57 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:57 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:57 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 2, Smallest: 1}}, DelayTime: 328µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client newly acked packets (1): [9] 2025/04/30 13:29:57 client updated RTT: 33.999ms (σ: 10.411ms) 2025/04/30 13:29:57 client Canceling loss detection timer. 2025/04/30 13:29:57 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:57 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:57 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 2, Smallest: 1}}, DelayTime: 2.928ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:57 client <- &wire.PingFrame{} 2025/04/30 13:29:57 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:29:57 client -> Sending packet 11 (47 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:57 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:57 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 91.301µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:58 client <- Reading packet 18 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:58 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:58 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 2, Smallest: 1}}, DelayTime: 1.47324s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:58 client <- &wire.PingFrame{} 2025/04/30 13:29:58 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:29:58 client <- Reading packet 20 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:58 client Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:58 client <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 2, Smallest: 1}}, DelayTime: 1.47324s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:58 client <- &wire.PingFrame{} 2025/04/30 13:29:58 client -> Sending packet 12 (51 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:58 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:58 client -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 0, AckRanges: {{Largest: 20, Smallest: 20}, {Largest: 18, Smallest: 18}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 193.362µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:29:58 client <- Reading packet 21 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:58 client Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:58 client <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 12, DelayTime: 656µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:29:58 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:29:58 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:58 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:29:58 client -> Sending packet 13 (38 bytes) for connection 9ab0cd4bf77e956d0ebc830414fb1e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:58 client Short Header{DestConnectionID: 0850d6f5fb6eaac6f8ea6cf14f9a0d00, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:58 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:29:58 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:29:58 client Connection 9ab0cd4bf77e956d0ebc830414fb1e closed. 2025/04/30 13:29:58 Requesting https://server4:443/abnbktnmca. 2025/04/30 13:29:58 Increased receive buffer size to 14336 kiB 2025/04/30 13:29:58 Increased send buffer size to 14336 kiB 2025/04/30 13:29:58 Setting DF for IPv4 and IPv6. 2025/04/30 13:29:58 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:29:58 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:29:58 Created qlog file: /logs/qlog/d12aae0bba1309f93c.sqlog 2025/04/30 13:29:58 client Starting new connection to server4 ([::]:46693 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d12aae0bba1309f93c, version v1 2025/04/30 13:29:58 Adding connection ID (empty). 2025/04/30 13:29:58 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:29:58 client -> Sending packet 0 (1280 bytes) for connection d12aae0bba1309f93c, Initial 2025/04/30 13:29:58 client Long Header{Type: Initial, DestConnectionID: d12aae0bba1309f93c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:29:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:29:58 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:29:58 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:29:58 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b57ffa6ba23e002c46d5e02f3389f687, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:29:58 client Received first packet. Switching destination connection ID to: b57ffa6ba23e002c46d5e02f3389f687 2025/04/30 13:29:58 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.664ms} 2025/04/30 13:29:58 client newly acked packets (1): [0] 2025/04/30 13:29:58 client updated RTT: 34.434066ms (σ: 17.217033ms) 2025/04/30 13:29:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:29:58 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:58 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:58 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:29:58 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:29:58 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b57ffa6ba23e002c46d5e02f3389f687, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:29:58 client <- &wire.CryptoFrame{Offset: 0, Data length: 686, Offset + Data length: 686} 2025/04/30 13:29:58 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:58 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:58 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d12aae0bba1309f93c, InitialSourceConnectionID: b57ffa6ba23e002c46d5e02f3389f687, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:29:58 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d12aae0bba1309f93c 2025/04/30 13:29:58 client Long Header{Type: Initial, DestConnectionID: b57ffa6ba23e002c46d5e02f3389f687, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:29:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:58 client Long Header{Type: Handshake, DestConnectionID: b57ffa6ba23e002c46d5e02f3389f687, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:29:58 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:29:58 client Dropping Initial keys. 2025/04/30 13:29:58 client -> Sending packet 1 (51 bytes) for connection d12aae0bba1309f93c, Handshake 2025/04/30 13:29:58 client Long Header{Type: Handshake, DestConnectionID: b57ffa6ba23e002c46d5e02f3389f687, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:58 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:58 client -> Sending packet 0 (54 bytes) for connection d12aae0bba1309f93c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:58 client Short Header{DestConnectionID: b57ffa6ba23e002c46d5e02f3389f687, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:58 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:29:59 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:59 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.024ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:59 client Peer doesn't await address validation any longer. 2025/04/30 13:29:59 client newly acked packets (1): [0] 2025/04/30 13:29:59 client updated RTT: 34.297ms (σ: 13.185ms) 2025/04/30 13:29:59 client ECN capability confirmed. 2025/04/30 13:29:59 client Canceling loss detection timer. 2025/04/30 13:29:59 client Dropping Handshake keys. 2025/04/30 13:29:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 7d15e6a4955baf8fbd5bfcee4fb93cc3, StatelessResetToken: 0x702a2a5dd617aab7cc6f1c729fb32102} 2025/04/30 13:29:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 3e783fbfbf8aa967dbe055f6e576618f, StatelessResetToken: 0x380220b3d7e9a97f76639826c5f247d2} 2025/04/30 13:29:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: fd3746dbd529bdc780e1805bcf5e7d72, StatelessResetToken: 0x4d455988952af83798a8ef64bbad68b2} 2025/04/30 13:29:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:29:59 client -> Sending packet 1 (45 bytes) for connection d12aae0bba1309f93c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 7d15e6a4955baf8fbd5bfcee4fb93cc3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208.15µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:59 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:29:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:59 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:59 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:29:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:29:59 client -> Sending packet 2 (43 bytes) for connection d12aae0bba1309f93c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 7d15e6a4955baf8fbd5bfcee4fb93cc3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 67.437µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:29:59 client -> Sending packet 3 (38 bytes) for connection d12aae0bba1309f93c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 7d15e6a4955baf8fbd5bfcee4fb93cc3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:29:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:29:59 client Connection d12aae0bba1309f93c closed. 2025/04/30 13:29:59 Requesting https://server4:443/lydfwdltzn. 2025/04/30 13:29:59 Increased receive buffer size to 14336 kiB 2025/04/30 13:29:59 Increased send buffer size to 14336 kiB 2025/04/30 13:29:59 Setting DF for IPv4 and IPv6. 2025/04/30 13:29:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:29:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:29:59 Created qlog file: /logs/qlog/8067a36d747f4dba.sqlog 2025/04/30 13:29:59 client Starting new connection to server4 ([::]:54499 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8067a36d747f4dba, version v1 2025/04/30 13:29:59 Adding connection ID (empty). 2025/04/30 13:29:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:29:59 client -> Sending packet 0 (1280 bytes) for connection 8067a36d747f4dba, Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: 8067a36d747f4dba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:29:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:29:59 client -> Sending packet 1 (1280 bytes) for connection 8067a36d747f4dba, Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: 8067a36d747f4dba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:29:59 client -> Sending packet 2 (1280 bytes) for connection 8067a36d747f4dba, Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: 8067a36d747f4dba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:29:59 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:29:59 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5b03a25d4b284e4f400f96ca0290c687, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:29:59 client Received first packet. Switching destination connection ID to: 5b03a25d4b284e4f400f96ca0290c687 2025/04/30 13:29:59 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.064ms} 2025/04/30 13:29:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:29:59 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:59 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:59 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:29:59 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:29:59 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5b03a25d4b284e4f400f96ca0290c687, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:29:59 client <- &wire.CryptoFrame{Offset: 0, Data length: 685, Offset + Data length: 685} 2025/04/30 13:29:59 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:59 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:29:59 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8067a36d747f4dba, InitialSourceConnectionID: 5b03a25d4b284e4f400f96ca0290c687, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:29:59 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8067a36d747f4dba 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: 5b03a25d4b284e4f400f96ca0290c687, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:29:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:59 client Long Header{Type: Handshake, DestConnectionID: 5b03a25d4b284e4f400f96ca0290c687, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:29:59 client Dropping Initial keys. 2025/04/30 13:29:59 client -> Sending packet 1 (51 bytes) for connection 8067a36d747f4dba, Handshake 2025/04/30 13:29:59 client Long Header{Type: Handshake, DestConnectionID: 5b03a25d4b284e4f400f96ca0290c687, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:29:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:59 client -> Sending packet 0 (54 bytes) for connection 8067a36d747f4dba, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 5b03a25d4b284e4f400f96ca0290c687, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:29:59 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:29:59 client -> Sending packet 2 (82 bytes) for connection 8067a36d747f4dba, Handshake 2025/04/30 13:29:59 client Long Header{Type: Handshake, DestConnectionID: 5b03a25d4b284e4f400f96ca0290c687, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:29:59 client -> Sending packet 3 (82 bytes) for connection 8067a36d747f4dba, Handshake 2025/04/30 13:29:59 client Long Header{Type: Handshake, DestConnectionID: 5b03a25d4b284e4f400f96ca0290c687, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:29:59 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:59 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:59 client Dropping Handshake keys. 2025/04/30 13:29:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0b152bd34f819b7b6502686364ede0ac, StatelessResetToken: 0x4d4ab32673d41282e63bfd24d74c7c02} 2025/04/30 13:29:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 91d16a704c0c56027b40a4e0eb0206e5, StatelessResetToken: 0xf215e075b6753e79bb7709d7a82e602f} 2025/04/30 13:29:59 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 4c31ee0fd904ef42b8871c0982a1dbca, StatelessResetToken: 0x7a641ec3971cfcb0e3c1de809f1f3031} 2025/04/30 13:29:59 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:29:59 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:29:59 client -> Sending packet 2 (64 bytes) for connection 8067a36d747f4dba, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 0b152bd34f819b7b6502686364ede0ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 130.255µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:29:59 client -> Sending packet 3 (56 bytes) for connection 8067a36d747f4dba, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 0b152bd34f819b7b6502686364ede0ac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:29:59 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:29:59 client -> Sending packet 4 (1366 bytes) for connection 8067a36d747f4dba, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 0b152bd34f819b7b6502686364ede0ac, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.PingFrame{} 2025/04/30 13:29:59 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:59 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:59 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 784µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:29:59 client newly acked packets (1): [3] 2025/04/30 13:29:59 client updated RTT: 33.051449ms (σ: 16.525724ms) 2025/04/30 13:29:59 client ECN capability confirmed. 2025/04/30 13:29:59 client Canceling loss detection timer. 2025/04/30 13:29:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:59 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:29:59 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:29:59 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:29:59 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:29:59 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:29:59 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:29:59 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:29:59 client -> Sending packet 5 (43 bytes) for connection 8067a36d747f4dba, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 0b152bd34f819b7b6502686364ede0ac, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 104.408µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:29:59 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:29:59 client -> Sending packet 6 (38 bytes) for connection 8067a36d747f4dba, 1-RTT (ECN: ECT(0)) 2025/04/30 13:29:59 client Short Header{DestConnectionID: 0b152bd34f819b7b6502686364ede0ac, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:29:59 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:29:59 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:29:59 client Connection 8067a36d747f4dba closed. 2025/04/30 13:29:59 Requesting https://server4:443/vhsxmkenzn. 2025/04/30 13:29:59 Increased receive buffer size to 14336 kiB 2025/04/30 13:29:59 Increased send buffer size to 14336 kiB 2025/04/30 13:29:59 Setting DF for IPv4 and IPv6. 2025/04/30 13:29:59 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:29:59 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:29:59 Created qlog file: /logs/qlog/0d065aec9cc180f481195a38825633f5d10612.sqlog 2025/04/30 13:29:59 client Starting new connection to server4 ([::]:51083 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0d065aec9cc180f481195a38825633f5d10612, version v1 2025/04/30 13:29:59 Adding connection ID (empty). 2025/04/30 13:29:59 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:29:59 client -> Sending packet 0 (1280 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: 0d065aec9cc180f481195a38825633f5d10612, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:29:59 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:29:59 client -> Sending packet 1 (1280 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: 0d065aec9cc180f481195a38825633f5d10612, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:29:59 client -> Sending packet 2 (1280 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: 0d065aec9cc180f481195a38825633f5d10612, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:29:59 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:29:59 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f31442f2cbebf74fa3b94ffbfd365997, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:29:59 client Received first packet. Switching destination connection ID to: f31442f2cbebf74fa3b94ffbfd365997 2025/04/30 13:29:59 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.824ms} 2025/04/30 13:29:59 client newly acked packets (1): [2] 2025/04/30 13:29:59 client updated RTT: 34.631446ms (σ: 17.315723ms) 2025/04/30 13:29:59 client -> Sending packet 3 (1280 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Initial 2025/04/30 13:29:59 client Long Header{Type: Initial, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:29:59 client -> &wire.PingFrame{} 2025/04/30 13:30:00 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:30:00 client -> Sending packet 4 (1280 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Initial 2025/04/30 13:30:00 client Long Header{Type: Initial, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:00 client -> &wire.PingFrame{} 2025/04/30 13:30:00 client -> Sending packet 5 (1280 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Initial 2025/04/30 13:30:00 client Long Header{Type: Initial, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:00 client -> &wire.PingFrame{} 2025/04/30 13:30:00 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/04/30 13:30:00 client <- Reading packet 6 (145 bytes) for connection (empty), Initial 2025/04/30 13:30:00 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f31442f2cbebf74fa3b94ffbfd365997, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 13:30:00 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 1.129768s} 2025/04/30 13:30:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:00 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:00 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:00 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/04/30 13:30:00 client <- Reading packet 2 (1055 bytes) for connection (empty), Handshake 2025/04/30 13:30:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f31442f2cbebf74fa3b94ffbfd365997, PacketNumber: 2, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/04/30 13:30:00 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:30:00 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:00 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:00 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0d065aec9cc180f481195a38825633f5d10612, InitialSourceConnectionID: f31442f2cbebf74fa3b94ffbfd365997, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:00 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612 2025/04/30 13:30:00 client Long Header{Type: Initial, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:00 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:00 client Long Header{Type: Handshake, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:00 client Dropping Initial keys. 2025/04/30 13:30:00 client -> Sending packet 1 (51 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Handshake 2025/04/30 13:30:00 client Long Header{Type: Handshake, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:00 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:00 client -> Sending packet 0 (54 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:00 client Short Header{DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:00 client <- Reading packet 6 (61 bytes) for connection (empty), Handshake 2025/04/30 13:30:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f31442f2cbebf74fa3b94ffbfd365997, PacketNumber: 6, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 13:30:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 550.888ms} 2025/04/30 13:30:00 client Peer doesn't await address validation any longer. 2025/04/30 13:30:00 client <- &wire.PingFrame{} 2025/04/30 13:30:00 client <- Reading packet 8 (61 bytes) for connection (empty), Handshake 2025/04/30 13:30:00 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f31442f2cbebf74fa3b94ffbfd365997, PacketNumber: 8, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 13:30:00 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 550.888ms} 2025/04/30 13:30:00 client <- &wire.PingFrame{} 2025/04/30 13:30:00 client -> Sending packet 2 (55 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Handshake 2025/04/30 13:30:00 client Long Header{Type: Handshake, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 13:30:00 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:00 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:00 client -> Sending packet 3 (82 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Handshake 2025/04/30 13:30:00 client Long Header{Type: Handshake, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:00 client -> Sending packet 4 (82 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, Handshake 2025/04/30 13:30:00 client Long Header{Type: Handshake, DestConnectionID: f31442f2cbebf74fa3b94ffbfd365997, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:00 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:00 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:00 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:00 client Dropping Handshake keys. 2025/04/30 13:30:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e84d6fd8fc67945fdccdcea0b601b738, StatelessResetToken: 0xf12aad86c5f1419fb69cf6e1e5b5dfbe} 2025/04/30 13:30:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: fa0bd72681998c6c033546cb493f3a85, StatelessResetToken: 0x2bbbbe833110b7cd9571b895ba88c2d6} 2025/04/30 13:30:00 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 199faac6cdf7de53409014dcb3d52237, StatelessResetToken: 0x92f36b417fe103c79e07fdfecd1c3fd9} 2025/04/30 13:30:00 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:00 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:00 client -> Sending packet 2 (64 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:00 client Short Header{DestConnectionID: e84d6fd8fc67945fdccdcea0b601b738, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:00 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144.621µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:00 client -> Sending packet 3 (56 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:00 client Short Header{DestConnectionID: e84d6fd8fc67945fdccdcea0b601b738, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:00 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:00 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:00 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:00 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:00 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 712µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:00 client newly acked packets (1): [3] 2025/04/30 13:30:00 client updated RTT: 34.381ms (σ: 13.484ms) 2025/04/30 13:30:00 client ECN capability confirmed. 2025/04/30 13:30:00 client Canceling loss detection timer. 2025/04/30 13:30:00 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:00 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:00 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:00 client Sending ACK because the ACK timer expired. 2025/04/30 13:30:00 client -> Sending packet 4 (44 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:00 client Short Header{DestConnectionID: e84d6fd8fc67945fdccdcea0b601b738, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:00 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.370248ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:00 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:00 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:00 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 78.192ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:00 client <- &wire.PingFrame{} 2025/04/30 13:30:00 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:00 client -> Sending packet 5 (45 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:00 client Short Header{DestConnectionID: e84d6fd8fc67945fdccdcea0b601b738, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:00 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 140.794µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:00 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:01 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:01 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:01 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 346.688ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:01 client <- &wire.PingFrame{} 2025/04/30 13:30:01 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:01 client -> Sending packet 6 (1366 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:01 client Short Header{DestConnectionID: e84d6fd8fc67945fdccdcea0b601b738, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:01 client -> &wire.PingFrame{} 2025/04/30 13:30:01 client -> Sending packet 7 (47 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:01 client Short Header{DestConnectionID: e84d6fd8fc67945fdccdcea0b601b738, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:01 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 169.888µs, ECT0: 3, ECT1: 0, CE: 1} 2025/04/30 13:30:01 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:01 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:01 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 248µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:01 client newly acked packets (1): [6] 2025/04/30 13:30:01 client updated RTT: 34.154ms (σ: 10.565ms) 2025/04/30 13:30:01 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:01 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:01 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 488µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:01 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:01 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:01 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:01 client -> Sending packet 8 (38 bytes) for connection 0d065aec9cc180f481195a38825633f5d10612, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:01 client Short Header{DestConnectionID: e84d6fd8fc67945fdccdcea0b601b738, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:01 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:01 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:01 client Connection 0d065aec9cc180f481195a38825633f5d10612 closed. 2025/04/30 13:30:01 Requesting https://server4:443/nsgopvyhwf. 2025/04/30 13:30:01 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:01 Increased send buffer size to 14336 kiB 2025/04/30 13:30:01 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:01 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:01 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:01 Created qlog file: /logs/qlog/adde59f359986908e218f937.sqlog 2025/04/30 13:30:01 client Starting new connection to server4 ([::]:56326 -> 193.167.100.100:443), source connection ID (empty), destination connection ID adde59f359986908e218f937, version v1 2025/04/30 13:30:01 Adding connection ID (empty). 2025/04/30 13:30:01 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:01 client -> Sending packet 0 (1280 bytes) for connection adde59f359986908e218f937, Initial 2025/04/30 13:30:01 client Long Header{Type: Initial, DestConnectionID: adde59f359986908e218f937, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:30:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:30:01 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:01 client -> Sending packet 1 (1280 bytes) for connection adde59f359986908e218f937, Initial 2025/04/30 13:30:01 client Long Header{Type: Initial, DestConnectionID: adde59f359986908e218f937, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:30:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:30:01 client -> Sending packet 2 (1280 bytes) for connection adde59f359986908e218f937, Initial 2025/04/30 13:30:01 client Long Header{Type: Initial, DestConnectionID: adde59f359986908e218f937, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 13:30:01 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:30:01 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7c972a6132290c73e95f3942fd3a9a70, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:01 client Received first packet. Switching destination connection ID to: 7c972a6132290c73e95f3942fd3a9a70 2025/04/30 13:30:01 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.568ms} 2025/04/30 13:30:01 client newly acked packets (1): [2] 2025/04/30 13:30:01 client updated RTT: 34.88719ms (σ: 17.443595ms) 2025/04/30 13:30:01 client -> Sending packet 3 (1280 bytes) for connection adde59f359986908e218f937, Initial 2025/04/30 13:30:01 client Long Header{Type: Initial, DestConnectionID: 7c972a6132290c73e95f3942fd3a9a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:01 client -> &wire.PingFrame{} 2025/04/30 13:30:01 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:01 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7c972a6132290c73e95f3942fd3a9a70, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:01 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 2.92ms} 2025/04/30 13:30:01 client newly acked packets (1): [3] 2025/04/30 13:30:01 client updated RTT: 34.786ms (σ: 13.283ms) 2025/04/30 13:30:01 client -> Sending packet 4 (1280 bytes) for connection adde59f359986908e218f937, Initial 2025/04/30 13:30:01 client Long Header{Type: Initial, DestConnectionID: 7c972a6132290c73e95f3942fd3a9a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:01 client -> &wire.PingFrame{} 2025/04/30 13:30:01 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:02 client <- Reading packet 4 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7c972a6132290c73e95f3942fd3a9a70, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:02 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 3.048ms} 2025/04/30 13:30:02 client newly acked packets (1): [4] 2025/04/30 13:30:02 client updated RTT: 34.692ms (σ: 10.148ms) 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/04/30 13:30:02 client <- Reading packet 6 (145 bytes) for connection (empty), Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7c972a6132290c73e95f3942fd3a9a70, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 13:30:02 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 1.348656s} 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/04/30 13:30:02 client <- Reading packet 2 (1055 bytes) for connection (empty), Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7c972a6132290c73e95f3942fd3a9a70, PacketNumber: 2, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/04/30 13:30:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: adde59f359986908e218f937, InitialSourceConnectionID: 7c972a6132290c73e95f3942fd3a9a70, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection adde59f359986908e218f937 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: 7c972a6132290c73e95f3942fd3a9a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: 7c972a6132290c73e95f3942fd3a9a70, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:02 client Dropping Initial keys. 2025/04/30 13:30:02 client -> Sending packet 1 (51 bytes) for connection adde59f359986908e218f937, Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: 7c972a6132290c73e95f3942fd3a9a70, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client -> Sending packet 0 (54 bytes) for connection adde59f359986908e218f937, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 7c972a6132290c73e95f3942fd3a9a70, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/04/30 13:30:02 client Dropping %!s(logging.PacketType=0) packet (145 bytes) because we already dropped the keys. 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/04/30 13:30:02 client <- Reading packet 4 (1055 bytes) for connection (empty), Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7c972a6132290c73e95f3942fd3a9a70, PacketNumber: 4, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/04/30 13:30:02 client -> Sending packet 2 (53 bytes) for connection adde59f359986908e218f937, Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: 7c972a6132290c73e95f3942fd3a9a70, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.384ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Peer doesn't await address validation any longer. 2025/04/30 13:30:02 client newly acked packets (1): [0] 2025/04/30 13:30:02 client updated RTT: 34.591ms (σ: 7.812ms) 2025/04/30 13:30:02 client ECN capability confirmed. 2025/04/30 13:30:02 client Canceling loss detection timer. 2025/04/30 13:30:02 client Dropping Handshake keys. 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 9a4cd9c10bb2843d584258fb0df18281, StatelessResetToken: 0xbf11edd2698b305a7004f484c269ccd4} 2025/04/30 13:30:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 1bc4f2c73f8040de7d134b272fe27db2, StatelessResetToken: 0x1597c56f560c952b23d7ac406124972c} 2025/04/30 13:30:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 647f6c821ae4fdfef795919b29515e14, StatelessResetToken: 0xc6d44af0e1a4b3911cd4bb9d07767abf} 2025/04/30 13:30:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:02 client -> Sending packet 1 (45 bytes) for connection adde59f359986908e218f937, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 9a4cd9c10bb2843d584258fb0df18281, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 169.538µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:02 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:02 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:02 client -> Sending packet 2 (43 bytes) for connection adde59f359986908e218f937, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 9a4cd9c10bb2843d584258fb0df18281, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 64.041µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:02 client -> Sending packet 3 (38 bytes) for connection adde59f359986908e218f937, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 9a4cd9c10bb2843d584258fb0df18281, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:02 client Connection adde59f359986908e218f937 closed. 2025/04/30 13:30:02 Requesting https://server4:443/ulukzozlsp. 2025/04/30 13:30:02 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:02 Increased send buffer size to 14336 kiB 2025/04/30 13:30:02 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:02 Created qlog file: /logs/qlog/abc17ad6092d637285e5380b1d.sqlog 2025/04/30 13:30:02 client Starting new connection to server4 ([::]:36095 -> 193.167.100.100:443), source connection ID (empty), destination connection ID abc17ad6092d637285e5380b1d, version v1 2025/04/30 13:30:02 Adding connection ID (empty). 2025/04/30 13:30:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:02 client -> Sending packet 0 (1280 bytes) for connection abc17ad6092d637285e5380b1d, Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: abc17ad6092d637285e5380b1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:30:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:02 client -> Sending packet 1 (1280 bytes) for connection abc17ad6092d637285e5380b1d, Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: abc17ad6092d637285e5380b1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:30:02 client -> Sending packet 2 (1280 bytes) for connection abc17ad6092d637285e5380b1d, Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: abc17ad6092d637285e5380b1d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:02 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:02 client Received first packet. Switching destination connection ID to: 0b3f8da3d4de3008c08ed796040b3e4d 2025/04/30 13:30:02 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 11.784ms} 2025/04/30 13:30:02 client newly acked packets (1): [2] 2025/04/30 13:30:02 client updated RTT: 35.967343ms (σ: 17.983671ms) 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:02 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/04/30 13:30:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: abc17ad6092d637285e5380b1d, InitialSourceConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection abc17ad6092d637285e5380b1d 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:02 client Dropping Initial keys. 2025/04/30 13:30:02 client -> Sending packet 1 (51 bytes) for connection abc17ad6092d637285e5380b1d, Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client -> Sending packet 0 (54 bytes) for connection abc17ad6092d637285e5380b1d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:02 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client Dropping Handshake keys. 2025/04/30 13:30:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:02 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:02 client -> Sending packet 1 (43 bytes) for connection abc17ad6092d637285e5380b1d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 182.237µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:02 client -> Sending packet 2 (38 bytes) for connection abc17ad6092d637285e5380b1d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 0b3f8da3d4de3008c08ed796040b3e4d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:02 client Connection abc17ad6092d637285e5380b1d closed. 2025/04/30 13:30:02 Requesting https://server4:443/qetojzptzp. 2025/04/30 13:30:02 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:02 Increased send buffer size to 14336 kiB 2025/04/30 13:30:02 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:02 Created qlog file: /logs/qlog/252e76fb519529c0350e.sqlog 2025/04/30 13:30:02 client Starting new connection to server4 ([::]:36679 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 252e76fb519529c0350e, version v1 2025/04/30 13:30:02 Adding connection ID (empty). 2025/04/30 13:30:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:02 client -> Sending packet 0 (1280 bytes) for connection 252e76fb519529c0350e, Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: 252e76fb519529c0350e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:02 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:02 client Received first packet. Switching destination connection ID to: 6832a09fc5fa3f119e5ece418faf36b8 2025/04/30 13:30:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.096ms} 2025/04/30 13:30:02 client newly acked packets (1): [0] 2025/04/30 13:30:02 client updated RTT: 34.301083ms (σ: 17.150541ms) 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:02 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 686, Offset + Data length: 686} 2025/04/30 13:30:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 252e76fb519529c0350e, InitialSourceConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 252e76fb519529c0350e 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:02 client Dropping Initial keys. 2025/04/30 13:30:02 client -> Sending packet 1 (51 bytes) for connection 252e76fb519529c0350e, Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client -> Sending packet 0 (54 bytes) for connection 252e76fb519529c0350e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:02 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 624µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Peer doesn't await address validation any longer. 2025/04/30 13:30:02 client newly acked packets (1): [0] 2025/04/30 13:30:02 client updated RTT: 34.337ms (σ: 12.935ms) 2025/04/30 13:30:02 client ECN capability confirmed. 2025/04/30 13:30:02 client Canceling loss detection timer. 2025/04/30 13:30:02 client Dropping Handshake keys. 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:02 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:02 client -> Sending packet 1 (43 bytes) for connection 252e76fb519529c0350e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 223.422µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:02 client -> Sending packet 2 (38 bytes) for connection 252e76fb519529c0350e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 6832a09fc5fa3f119e5ece418faf36b8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:02 client Connection 252e76fb519529c0350e closed. 2025/04/30 13:30:02 Requesting https://server4:443/zfxgtjqxox. 2025/04/30 13:30:02 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:02 Increased send buffer size to 14336 kiB 2025/04/30 13:30:02 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:02 Created qlog file: /logs/qlog/ba795e9af198694449f9bd1cc1bb83.sqlog 2025/04/30 13:30:02 client Starting new connection to server4 ([::]:50154 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ba795e9af198694449f9bd1cc1bb83, version v1 2025/04/30 13:30:02 Adding connection ID (empty). 2025/04/30 13:30:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:02 client -> Sending packet 0 (1280 bytes) for connection ba795e9af198694449f9bd1cc1bb83, Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: ba795e9af198694449f9bd1cc1bb83, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:02 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:02 client -> Sending packet 1 (1280 bytes) for connection ba795e9af198694449f9bd1cc1bb83, Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: ba795e9af198694449f9bd1cc1bb83, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:02 client -> Sending packet 2 (1280 bytes) for connection ba795e9af198694449f9bd1cc1bb83, Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: ba795e9af198694449f9bd1cc1bb83, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:02 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cc23f83d4cb984bbf03e3bca1cd0ede7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:02 client Received first packet. Switching destination connection ID to: cc23f83d4cb984bbf03e3bca1cd0ede7 2025/04/30 13:30:02 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.816ms} 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:02 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:02 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cc23f83d4cb984bbf03e3bca1cd0ede7, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:02 client <- &wire.CryptoFrame{Offset: 0, Data length: 692, Offset + Data length: 692} 2025/04/30 13:30:02 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:02 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ba795e9af198694449f9bd1cc1bb83, InitialSourceConnectionID: cc23f83d4cb984bbf03e3bca1cd0ede7, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:02 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ba795e9af198694449f9bd1cc1bb83 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: cc23f83d4cb984bbf03e3bca1cd0ede7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: cc23f83d4cb984bbf03e3bca1cd0ede7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:02 client Dropping Initial keys. 2025/04/30 13:30:02 client -> Sending packet 1 (51 bytes) for connection ba795e9af198694449f9bd1cc1bb83, Handshake 2025/04/30 13:30:02 client Long Header{Type: Handshake, DestConnectionID: cc23f83d4cb984bbf03e3bca1cd0ede7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client -> Sending packet 0 (54 bytes) for connection ba795e9af198694449f9bd1cc1bb83, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: cc23f83d4cb984bbf03e3bca1cd0ede7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:02 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.144ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Peer doesn't await address validation any longer. 2025/04/30 13:30:02 client newly acked packets (1): [0] 2025/04/30 13:30:02 client updated RTT: 33.360427ms (σ: 16.680213ms) 2025/04/30 13:30:02 client ECN capability confirmed. 2025/04/30 13:30:02 client Canceling loss detection timer. 2025/04/30 13:30:02 client Dropping Handshake keys. 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 7ce8fecad66302a8ee8cda33f0993139, StatelessResetToken: 0x624787473924c00c7205e9b92eef55bc} 2025/04/30 13:30:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 49231bd5cbcc66555d15afeeb331935b, StatelessResetToken: 0x9ddaf3541e23c8156cfbc3d92fbba605} 2025/04/30 13:30:02 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 518b16614644976f2545164ef8f71148, StatelessResetToken: 0xc67d923057f5a68cbbb855dd05809cd8} 2025/04/30 13:30:02 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:02 client -> Sending packet 1 (45 bytes) for connection ba795e9af198694449f9bd1cc1bb83, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 7ce8fecad66302a8ee8cda33f0993139, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 160.891µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:02 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:02 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:02 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:02 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:02 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:02 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:02 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:02 client -> Sending packet 2 (43 bytes) for connection ba795e9af198694449f9bd1cc1bb83, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 7ce8fecad66302a8ee8cda33f0993139, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 57.007µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:02 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:02 client -> Sending packet 3 (38 bytes) for connection ba795e9af198694449f9bd1cc1bb83, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:02 client Short Header{DestConnectionID: 7ce8fecad66302a8ee8cda33f0993139, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:02 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:02 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:02 client Connection ba795e9af198694449f9bd1cc1bb83 closed. 2025/04/30 13:30:02 Requesting https://server4:443/adsiscunyj. 2025/04/30 13:30:02 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:02 Increased send buffer size to 14336 kiB 2025/04/30 13:30:02 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:02 Created qlog file: /logs/qlog/b286d925916db72ba9b5b83414.sqlog 2025/04/30 13:30:02 client Starting new connection to server4 ([::]:53858 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b286d925916db72ba9b5b83414, version v1 2025/04/30 13:30:02 Adding connection ID (empty). 2025/04/30 13:30:02 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:02 client -> Sending packet 0 (1280 bytes) for connection b286d925916db72ba9b5b83414, Initial 2025/04/30 13:30:02 client Long Header{Type: Initial, DestConnectionID: b286d925916db72ba9b5b83414, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:02 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:03 client -> Sending packet 1 (1280 bytes) for connection b286d925916db72ba9b5b83414, Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: b286d925916db72ba9b5b83414, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:03 client -> Sending packet 2 (1280 bytes) for connection b286d925916db72ba9b5b83414, Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: b286d925916db72ba9b5b83414, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:03 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8700d8e6787314fc7335b91524f0630, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:03 client Received first packet. Switching destination connection ID to: f8700d8e6787314fc7335b91524f0630 2025/04/30 13:30:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.072ms} 2025/04/30 13:30:03 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8700d8e6787314fc7335b91524f0630, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:03 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.856ms} 2025/04/30 13:30:03 client newly acked packets (1): [2] 2025/04/30 13:30:03 client updated RTT: 34.98092ms (σ: 17.49046ms) 2025/04/30 13:30:03 client -> Sending packet 3 (1280 bytes) for connection b286d925916db72ba9b5b83414, Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: f8700d8e6787314fc7335b91524f0630, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:03 client -> &wire.PingFrame{} 2025/04/30 13:30:03 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:30:03 client -> Sending packet 4 (1280 bytes) for connection b286d925916db72ba9b5b83414, Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: f8700d8e6787314fc7335b91524f0630, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:03 client -> &wire.PingFrame{} 2025/04/30 13:30:03 client -> Sending packet 5 (1280 bytes) for connection b286d925916db72ba9b5b83414, Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: f8700d8e6787314fc7335b91524f0630, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:03 client -> &wire.PingFrame{} 2025/04/30 13:30:03 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8700d8e6787314fc7335b91524f0630, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:03 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 3.016ms} 2025/04/30 13:30:03 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:03 client <- Reading packet 6 (147 bytes) for connection (empty), Initial 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f8700d8e6787314fc7335b91524f0630, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:30:03 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 1.058608s} 2025/04/30 13:30:03 client newly acked packets (1): [5] 2025/04/30 13:30:03 client updated RTT: 51.53ms (σ: 46.219ms) 2025/04/30 13:30:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:03 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:03 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:03 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:03 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:03 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f8700d8e6787314fc7335b91524f0630, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:03 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:30:03 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:03 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:03 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b286d925916db72ba9b5b83414, InitialSourceConnectionID: f8700d8e6787314fc7335b91524f0630, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:03 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b286d925916db72ba9b5b83414 2025/04/30 13:30:03 client Long Header{Type: Initial, DestConnectionID: f8700d8e6787314fc7335b91524f0630, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:03 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:03 client Long Header{Type: Handshake, DestConnectionID: f8700d8e6787314fc7335b91524f0630, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:03 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:03 client Dropping Initial keys. 2025/04/30 13:30:03 client -> Sending packet 1 (51 bytes) for connection b286d925916db72ba9b5b83414, Handshake 2025/04/30 13:30:03 client Long Header{Type: Handshake, DestConnectionID: f8700d8e6787314fc7335b91524f0630, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:03 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:03 client -> Sending packet 0 (54 bytes) for connection b286d925916db72ba9b5b83414, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:03 client Short Header{DestConnectionID: f8700d8e6787314fc7335b91524f0630, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:03 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:03 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:03 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:03 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:03 client Dropping Handshake keys. 2025/04/30 13:30:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 86600375a0157118d114c2d07367b1af, StatelessResetToken: 0xd63a21b9eb22a0c0bc617344aedc9d4a} 2025/04/30 13:30:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 85713454258a723196afbbca4fda4b58, StatelessResetToken: 0xb70553215ff4e921654dda6157f0e6d3} 2025/04/30 13:30:03 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 428d0fe05a21c9891312d1a09051774a, StatelessResetToken: 0xbe6258317d74dbef7cf0d2317632eda0} 2025/04/30 13:30:03 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:03 client -> Sending packet 1 (45 bytes) for connection b286d925916db72ba9b5b83414, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:03 client Short Header{DestConnectionID: 86600375a0157118d114c2d07367b1af, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:03 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 132.528µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:03 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:03 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:03 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:03 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:03 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.624ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:03 client newly acked packets (2): [0 1] 2025/04/30 13:30:03 client updated RTT: 52.192ms (σ: 35.989ms) 2025/04/30 13:30:03 client ECN capability confirmed. 2025/04/30 13:30:03 client Canceling loss detection timer. 2025/04/30 13:30:03 client Ignoring all packets below 1. 2025/04/30 13:30:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:04 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:04 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:04 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 89.416ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:04 client <- &wire.PingFrame{} 2025/04/30 13:30:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:04 client -> Sending packet 2 (45 bytes) for connection b286d925916db72ba9b5b83414, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:04 client Short Header{DestConnectionID: 86600375a0157118d114c2d07367b1af, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:04 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 74.118µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:04 client <- Reading packet 8 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:04 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:04 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 448µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:04 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:04 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:04 client -> Sending packet 3 (47 bytes) for connection b286d925916db72ba9b5b83414, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:04 client Short Header{DestConnectionID: 86600375a0157118d114c2d07367b1af, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:04 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 146.886µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:04 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:04 client -> Sending packet 4 (38 bytes) for connection b286d925916db72ba9b5b83414, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:04 client Short Header{DestConnectionID: 86600375a0157118d114c2d07367b1af, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:04 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:04 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:04 client Connection b286d925916db72ba9b5b83414 closed. 2025/04/30 13:30:04 Requesting https://server4:443/damcgcfqbi. 2025/04/30 13:30:04 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:04 Increased send buffer size to 14336 kiB 2025/04/30 13:30:04 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:04 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:04 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:04 Created qlog file: /logs/qlog/9ac604b782b57b03380c681e2e5ee7c888225c.sqlog 2025/04/30 13:30:04 client Starting new connection to server4 ([::]:40447 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9ac604b782b57b03380c681e2e5ee7c888225c, version v1 2025/04/30 13:30:04 Adding connection ID (empty). 2025/04/30 13:30:04 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:04 client -> Sending packet 0 (1280 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, Initial 2025/04/30 13:30:04 client Long Header{Type: Initial, DestConnectionID: 9ac604b782b57b03380c681e2e5ee7c888225c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:30:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:04 client -> Sending packet 1 (1280 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, Initial 2025/04/30 13:30:04 client Long Header{Type: Initial, DestConnectionID: 9ac604b782b57b03380c681e2e5ee7c888225c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:30:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:04 client -> Sending packet 2 (1280 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, Initial 2025/04/30 13:30:04 client Long Header{Type: Initial, DestConnectionID: 9ac604b782b57b03380c681e2e5ee7c888225c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:30:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:04 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:04 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:30:04 client -> Sending packet 3 (1280 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, Initial 2025/04/30 13:30:04 client Long Header{Type: Initial, DestConnectionID: 9ac604b782b57b03380c681e2e5ee7c888225c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:30:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:04 client -> Sending packet 4 (1280 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, Initial 2025/04/30 13:30:04 client Long Header{Type: Initial, DestConnectionID: 9ac604b782b57b03380c681e2e5ee7c888225c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:30:04 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:04 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:04 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:04 client Received first packet. Switching destination connection ID to: e8ee1dcf13b0197c1e4962fe6a51f65b 2025/04/30 13:30:04 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 3.416ms} 2025/04/30 13:30:04 client newly acked packets (1): [4] 2025/04/30 13:30:04 client updated RTT: 34.862012ms (σ: 17.431006ms) 2025/04/30 13:30:05 client -> Sending packet 5 (1280 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:05 client -> &wire.PingFrame{} 2025/04/30 13:30:05 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:05 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 2.872ms} 2025/04/30 13:30:05 client newly acked packets (1): [5] 2025/04/30 13:30:05 client updated RTT: 34.744ms (σ: 13.309ms) 2025/04/30 13:30:05 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:05 client <- Reading packet 6 (147 bytes) for connection (empty), Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:30:05 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 1.180208s} 2025/04/30 13:30:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:05 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 13:30:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9ac604b782b57b03380c681e2e5ee7c888225c, InitialSourceConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:05 client Dropping Initial keys. 2025/04/30 13:30:05 client -> Sending packet 1 (105 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client Short Header{DestConnectionID: e8ee1dcf13b0197c1e4962fe6a51f65b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:05 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.24ms} 2025/04/30 13:30:05 client Peer doesn't await address validation any longer. 2025/04/30 13:30:05 client newly acked packets (1): [0] 2025/04/30 13:30:05 client updated RTT: 34.596ms (σ: 10.277ms) 2025/04/30 13:30:05 client Canceling loss detection timer. 2025/04/30 13:30:05 client Dropping Handshake keys. 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 5bdc1af694fa2e60497d2590e187ccd7, StatelessResetToken: 0xcfb34ae4a0a42bc84a787ffa82d71e0c} 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: bd8842d656aa64882bf1330b72cfa003, StatelessResetToken: 0x174160cb62a4cb637f1781544a757355} 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a1041f12993b55a098231e5a1fe7d61f, StatelessResetToken: 0xc5b59bb8e3916835fac9eb3055415907} 2025/04/30 13:30:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:05 client -> Sending packet 1 (45 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 5bdc1af694fa2e60497d2590e187ccd7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 180.838µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:05 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:05 client -> Sending packet 2 (45 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 5bdc1af694fa2e60497d2590e187ccd7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 76.303µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client <- Reading packet 3 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 7.608ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client newly acked packets (1): [1] 2025/04/30 13:30:05 client ECN capability confirmed. 2025/04/30 13:30:05 client Canceling loss detection timer. 2025/04/30 13:30:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:05 client Ignoring all packets below 1. 2025/04/30 13:30:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:05 client -> Sending packet 3 (38 bytes) for connection 9ac604b782b57b03380c681e2e5ee7c888225c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 5bdc1af694fa2e60497d2590e187ccd7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:05 client Connection 9ac604b782b57b03380c681e2e5ee7c888225c closed. 2025/04/30 13:30:05 Requesting https://server4:443/jzvbqtdzte. 2025/04/30 13:30:05 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:05 Increased send buffer size to 14336 kiB 2025/04/30 13:30:05 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:05 Created qlog file: /logs/qlog/35b10ab302a7029c7afd.sqlog 2025/04/30 13:30:05 client Starting new connection to server4 ([::]:42233 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 35b10ab302a7029c7afd, version v1 2025/04/30 13:30:05 Adding connection ID (empty). 2025/04/30 13:30:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:05 client -> Sending packet 0 (1280 bytes) for connection 35b10ab302a7029c7afd, Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: 35b10ab302a7029c7afd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:30:05 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:05 client -> Sending packet 1 (1280 bytes) for connection 35b10ab302a7029c7afd, Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: 35b10ab302a7029c7afd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:30:05 client -> Sending packet 2 (1280 bytes) for connection 35b10ab302a7029c7afd, Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: 35b10ab302a7029c7afd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:30:05 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:05 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c623e24f944d7c5c2535691d41d0c97, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:05 client Received first packet. Switching destination connection ID to: 2c623e24f944d7c5c2535691d41d0c97 2025/04/30 13:30:05 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.88ms} 2025/04/30 13:30:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:05 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c623e24f944d7c5c2535691d41d0c97, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 687, Offset + Data length: 687} 2025/04/30 13:30:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 35b10ab302a7029c7afd, InitialSourceConnectionID: 2c623e24f944d7c5c2535691d41d0c97, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 35b10ab302a7029c7afd 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: 2c623e24f944d7c5c2535691d41d0c97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: 2c623e24f944d7c5c2535691d41d0c97, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:05 client Dropping Initial keys. 2025/04/30 13:30:05 client -> Sending packet 1 (51 bytes) for connection 35b10ab302a7029c7afd, Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: 2c623e24f944d7c5c2535691d41d0c97, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client -> Sending packet 0 (54 bytes) for connection 35b10ab302a7029c7afd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 2c623e24f944d7c5c2535691d41d0c97, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:05 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 13:30:05 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client Dropping Handshake keys. 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 129c8542cad3188f54ab3307a5cc6621, StatelessResetToken: 0xe0d00780f2557a5b851e5353631db68f} 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 885d97f460121a0d2adbbddefb8d1ad6, StatelessResetToken: 0xe605e285dfe58ddff4a9f5ad546bc85b} 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 1111f8ee5cac517590d163018019620e, StatelessResetToken: 0x8ef1bfc2d1a3ef0ad08d89e03cc90381} 2025/04/30 13:30:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:05 client -> Sending packet 1 (1366 bytes) for connection 35b10ab302a7029c7afd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 129c8542cad3188f54ab3307a5cc6621, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.PingFrame{} 2025/04/30 13:30:05 client -> Sending packet 2 (45 bytes) for connection 35b10ab302a7029c7afd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 129c8542cad3188f54ab3307a5cc6621, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 137.247µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:05 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 672µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client newly acked packets (1): [0] 2025/04/30 13:30:05 client updated RTT: 35.180618ms (σ: 17.590309ms) 2025/04/30 13:30:05 client ECN capability confirmed. 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:05 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:05 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:05 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:05 client -> Sending packet 3 (43 bytes) for connection 35b10ab302a7029c7afd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 129c8542cad3188f54ab3307a5cc6621, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 192.971µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:05 client -> Sending packet 4 (38 bytes) for connection 35b10ab302a7029c7afd, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 129c8542cad3188f54ab3307a5cc6621, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:05 client Connection 35b10ab302a7029c7afd closed. 2025/04/30 13:30:05 Requesting https://server4:443/umuqvflkbu. 2025/04/30 13:30:05 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:05 Increased send buffer size to 14336 kiB 2025/04/30 13:30:05 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:05 Created qlog file: /logs/qlog/98c2ee26dce095f7bf22767f5cf0d9fc60.sqlog 2025/04/30 13:30:05 client Starting new connection to server4 ([::]:53551 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 98c2ee26dce095f7bf22767f5cf0d9fc60, version v1 2025/04/30 13:30:05 Adding connection ID (empty). 2025/04/30 13:30:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:05 client -> Sending packet 0 (1280 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: 98c2ee26dce095f7bf22767f5cf0d9fc60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:30:05 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:05 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5a7c71371daa73b3dc367e60eb530502, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:05 client Received first packet. Switching destination connection ID to: 5a7c71371daa73b3dc367e60eb530502 2025/04/30 13:30:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 7.504ms} 2025/04/30 13:30:05 client newly acked packets (1): [0] 2025/04/30 13:30:05 client updated RTT: 33.901091ms (σ: 16.950545ms) 2025/04/30 13:30:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:05 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5a7c71371daa73b3dc367e60eb530502, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:30:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 98c2ee26dce095f7bf22767f5cf0d9fc60, InitialSourceConnectionID: 5a7c71371daa73b3dc367e60eb530502, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:05 client Dropping Initial keys. 2025/04/30 13:30:05 client -> Sending packet 1 (51 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client -> Sending packet 0 (54 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:05 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:05 client -> Sending packet 2 (82 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:05 client -> Sending packet 3 (82 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:05 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client Dropping Handshake keys. 2025/04/30 13:30:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:05 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:05 client -> Sending packet 2 (62 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 124.683µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:05 client -> Sending packet 3 (54 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:05 client <- Reading packet 6 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:05 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:05 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:05 client -> Sending packet 4 (45 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 167.754µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:05 client -> Sending packet 5 (38 bytes) for connection 98c2ee26dce095f7bf22767f5cf0d9fc60, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 5a7c71371daa73b3dc367e60eb530502, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:05 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:05 client Connection 98c2ee26dce095f7bf22767f5cf0d9fc60 closed. 2025/04/30 13:30:05 Requesting https://server4:443/jmdtoxzqfc. 2025/04/30 13:30:05 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:05 Increased send buffer size to 14336 kiB 2025/04/30 13:30:05 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:05 Created qlog file: /logs/qlog/0c494af3f8bd2a128067dc7c14a45d211de3.sqlog 2025/04/30 13:30:05 client Starting new connection to server4 ([::]:41761 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0c494af3f8bd2a128067dc7c14a45d211de3, version v1 2025/04/30 13:30:05 Adding connection ID (empty). 2025/04/30 13:30:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:05 client -> Sending packet 0 (1280 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: 0c494af3f8bd2a128067dc7c14a45d211de3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:05 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:05 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c6b98424735ee900bd7aa04b09aad031, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:05 client Received first packet. Switching destination connection ID to: c6b98424735ee900bd7aa04b09aad031 2025/04/30 13:30:05 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.16ms} 2025/04/30 13:30:05 client newly acked packets (1): [0] 2025/04/30 13:30:05 client updated RTT: 34.236945ms (σ: 17.118472ms) 2025/04/30 13:30:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:05 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:05 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c6b98424735ee900bd7aa04b09aad031, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:05 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:30:05 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:05 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0c494af3f8bd2a128067dc7c14a45d211de3, InitialSourceConnectionID: c6b98424735ee900bd7aa04b09aad031, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:05 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3 2025/04/30 13:30:05 client Long Header{Type: Initial, DestConnectionID: c6b98424735ee900bd7aa04b09aad031, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: c6b98424735ee900bd7aa04b09aad031, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:05 client Dropping Initial keys. 2025/04/30 13:30:05 client -> Sending packet 1 (51 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, Handshake 2025/04/30 13:30:05 client Long Header{Type: Handshake, DestConnectionID: c6b98424735ee900bd7aa04b09aad031, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client -> Sending packet 0 (54 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: c6b98424735ee900bd7aa04b09aad031, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:05 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:05 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:05 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:05 client Dropping Handshake keys. 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 4a1feb021f056b588d0067969ead845a, StatelessResetToken: 0x6c51e672b0b1cda0672ee8498a51f2e8} 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 102b41d3c5c6fe567480c89d7b0d763a, StatelessResetToken: 0xe7cbd1aaf8822257ede329f91fe8be3d} 2025/04/30 13:30:05 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 28a2371b93103bc6e87b7481c402b369, StatelessResetToken: 0x9b2a1a2564cdc879776838f9bef2f550} 2025/04/30 13:30:05 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:05 client -> Sending packet 1 (45 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:05 client Short Header{DestConnectionID: 4a1feb021f056b588d0067969ead845a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:05 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 145.272µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:05 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:06 client <- Reading packet 1 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:06 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:06 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 24.784ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:06 client newly acked packets (1): [1] 2025/04/30 13:30:06 client updated RTT: 36.961ms (σ: 18.29ms) 2025/04/30 13:30:06 client ECN capability confirmed. 2025/04/30 13:30:06 client lost packet 0 (time threshold) 2025/04/30 13:30:06 client Canceling loss detection timer. 2025/04/30 13:30:06 client Ignoring all packets below 1. 2025/04/30 13:30:06 client -> Sending packet 2 (54 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:06 client Short Header{DestConnectionID: 4a1feb021f056b588d0067969ead845a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:06 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:06 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:06 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:06 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 856µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:06 client newly acked packets (1): [2] 2025/04/30 13:30:06 client updated RTT: 36.472ms (σ: 14.694ms) 2025/04/30 13:30:06 client Canceling loss detection timer. 2025/04/30 13:30:06 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:06 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:06 client Sending ACK because the ACK timer expired. 2025/04/30 13:30:06 client -> Sending packet 3 (44 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:06 client Short Header{DestConnectionID: 4a1feb021f056b588d0067969ead845a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:06 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.388389ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:06 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:06 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:06 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:06 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 66.072ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:06 client <- &wire.PingFrame{} 2025/04/30 13:30:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:06 client -> Sending packet 4 (1366 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:06 client Short Header{DestConnectionID: 4a1feb021f056b588d0067969ead845a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:06 client -> &wire.PingFrame{} 2025/04/30 13:30:06 client -> Sending packet 5 (45 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:06 client Short Header{DestConnectionID: 4a1feb021f056b588d0067969ead845a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:06 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 178.093µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:06 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:06 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:06 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 672µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:06 client newly acked packets (1): [4] 2025/04/30 13:30:06 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:06 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:06 client -> Sending packet 6 (47 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:06 client Short Header{DestConnectionID: 4a1feb021f056b588d0067969ead845a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:06 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 106.85µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:06 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:06 client -> Sending packet 7 (38 bytes) for connection 0c494af3f8bd2a128067dc7c14a45d211de3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:06 client Short Header{DestConnectionID: 4a1feb021f056b588d0067969ead845a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:06 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:06 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:06 client Connection 0c494af3f8bd2a128067dc7c14a45d211de3 closed. 2025/04/30 13:30:06 Requesting https://server4:443/kmfnawhzww. 2025/04/30 13:30:06 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:06 Increased send buffer size to 14336 kiB 2025/04/30 13:30:06 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:06 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:06 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:06 Created qlog file: /logs/qlog/d843627c436b5ffb34b3a3bcb4e2069ec92c.sqlog 2025/04/30 13:30:06 client Starting new connection to server4 ([::]:53739 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d843627c436b5ffb34b3a3bcb4e2069ec92c, version v1 2025/04/30 13:30:06 Adding connection ID (empty). 2025/04/30 13:30:06 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:06 client -> Sending packet 0 (1280 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Initial 2025/04/30 13:30:06 client Long Header{Type: Initial, DestConnectionID: d843627c436b5ffb34b3a3bcb4e2069ec92c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:30:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:06 client -> Sending packet 1 (1280 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Initial 2025/04/30 13:30:06 client Long Header{Type: Initial, DestConnectionID: d843627c436b5ffb34b3a3bcb4e2069ec92c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:30:06 client -> Sending packet 2 (1280 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Initial 2025/04/30 13:30:06 client Long Header{Type: Initial, DestConnectionID: d843627c436b5ffb34b3a3bcb4e2069ec92c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:30:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:30:06 client -> Sending packet 3 (1280 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Initial 2025/04/30 13:30:06 client Long Header{Type: Initial, DestConnectionID: d843627c436b5ffb34b3a3bcb4e2069ec92c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:30:06 client -> Sending packet 4 (1280 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Initial 2025/04/30 13:30:06 client Long Header{Type: Initial, DestConnectionID: d843627c436b5ffb34b3a3bcb4e2069ec92c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:30:06 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:06 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16cf368559002915913d4bdddd8ccea0, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:06 client Received first packet. Switching destination connection ID to: 16cf368559002915913d4bdddd8ccea0 2025/04/30 13:30:06 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 2.936ms} 2025/04/30 13:30:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:07 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:07 client <- Reading packet 3 (147 bytes) for connection (empty), Initial 2025/04/30 13:30:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16cf368559002915913d4bdddd8ccea0, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:30:07 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 4.802832s} 2025/04/30 13:30:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:07 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:07 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cf368559002915913d4bdddd8ccea0, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:30:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d843627c436b5ffb34b3a3bcb4e2069ec92c, InitialSourceConnectionID: 16cf368559002915913d4bdddd8ccea0, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c 2025/04/30 13:30:07 client Long Header{Type: Initial, DestConnectionID: 16cf368559002915913d4bdddd8ccea0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:07 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: 16cf368559002915913d4bdddd8ccea0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:07 client Dropping Initial keys. 2025/04/30 13:30:07 client -> Sending packet 1 (105 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: 16cf368559002915913d4bdddd8ccea0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:07 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:07 client Short Header{DestConnectionID: 16cf368559002915913d4bdddd8ccea0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:07 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:07 client Dropping %!s(logging.PacketType=0) packet (147 bytes) because we already dropped the keys. 2025/04/30 13:30:07 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:07 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cf368559002915913d4bdddd8ccea0, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:30:07 client -> Sending packet 2 (53 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: 16cf368559002915913d4bdddd8ccea0, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:30:07 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:07 client <- Reading packet 6 (61 bytes) for connection (empty), Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cf368559002915913d4bdddd8ccea0, PacketNumber: 6, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 13:30:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 555.44ms} 2025/04/30 13:30:07 client Peer doesn't await address validation any longer. 2025/04/30 13:30:07 client <- &wire.PingFrame{} 2025/04/30 13:30:07 client <- Reading packet 8 (61 bytes) for connection (empty), Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cf368559002915913d4bdddd8ccea0, PacketNumber: 8, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 13:30:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 555.44ms} 2025/04/30 13:30:07 client <- &wire.PingFrame{} 2025/04/30 13:30:07 client -> Sending packet 3 (57 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: 16cf368559002915913d4bdddd8ccea0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 32, Version: v1} 2025/04/30 13:30:07 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:07 client -> Sending packet 4 (82 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: 16cf368559002915913d4bdddd8ccea0, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:07 client -> Sending packet 5 (82 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, Handshake 2025/04/30 13:30:07 client Long Header{Type: Handshake, DestConnectionID: 16cf368559002915913d4bdddd8ccea0, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:07 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:07 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:07 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:07 client Dropping Handshake keys. 2025/04/30 13:30:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e0bc615fed58eab261793bc33fd99516, StatelessResetToken: 0xbb17cc0908fef432304102aa27b91804} 2025/04/30 13:30:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 9a4800aca8379747fa848e438504835e, StatelessResetToken: 0x781864f65bea2148c870fa07ba1b8901} 2025/04/30 13:30:07 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: dac0046d82e364ba202376a89b3a7f41, StatelessResetToken: 0x4b7d8a29fcfebd19103de392c1de951e} 2025/04/30 13:30:07 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:07 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:07 client -> Sending packet 2 (64 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:07 client Short Header{DestConnectionID: e0bc615fed58eab261793bc33fd99516, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 142.887µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:07 client -> Sending packet 3 (56 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:07 client Short Header{DestConnectionID: e0bc615fed58eab261793bc33fd99516, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:07 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:07 client -> Sending packet 4 (1366 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:07 client Short Header{DestConnectionID: e0bc615fed58eab261793bc33fd99516, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:07 client -> &wire.PingFrame{} 2025/04/30 13:30:07 client <- Reading packet 1 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:07 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:07 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 432µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:07 client newly acked packets (2): [3 4] 2025/04/30 13:30:07 client updated RTT: 33.80712ms (σ: 16.90356ms) 2025/04/30 13:30:07 client ECN capability confirmed. 2025/04/30 13:30:07 client Canceling loss detection timer. 2025/04/30 13:30:07 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:07 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:07 client Sending ACK because the ACK timer expired. 2025/04/30 13:30:07 client -> Sending packet 5 (44 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:07 client Short Header{DestConnectionID: e0bc615fed58eab261793bc33fd99516, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:07 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.359264ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:07 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:08 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 344.888ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- &wire.PingFrame{} 2025/04/30 13:30:08 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:08 client -> Sending packet 6 (1409 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: e0bc615fed58eab261793bc33fd99516, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.PingFrame{} 2025/04/30 13:30:08 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 344.888ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- &wire.PingFrame{} 2025/04/30 13:30:08 client -> Sending packet 7 (47 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: e0bc615fed58eab261793bc33fd99516, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 1, Smallest: 0}}, DelayTime: 97.733µs, ECT0: 3, ECT1: 0, CE: 1} 2025/04/30 13:30:08 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 712µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client newly acked packets (1): [6] 2025/04/30 13:30:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:08 client -> Sending packet 8 (38 bytes) for connection d843627c436b5ffb34b3a3bcb4e2069ec92c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: e0bc615fed58eab261793bc33fd99516, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:08 client Connection d843627c436b5ffb34b3a3bcb4e2069ec92c closed. 2025/04/30 13:30:08 Requesting https://server4:443/lntcvuxchv. 2025/04/30 13:30:08 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:08 Increased send buffer size to 14336 kiB 2025/04/30 13:30:08 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:08 Created qlog file: /logs/qlog/e0487d6057db045ae2b0.sqlog 2025/04/30 13:30:08 client Starting new connection to server4 ([::]:40410 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e0487d6057db045ae2b0, version v1 2025/04/30 13:30:08 Adding connection ID (empty). 2025/04/30 13:30:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:08 client -> Sending packet 0 (1280 bytes) for connection e0487d6057db045ae2b0, Initial 2025/04/30 13:30:08 client Long Header{Type: Initial, DestConnectionID: e0487d6057db045ae2b0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:08 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:08 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:08 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 15bc2a8f5028e583c48e5ed69ffb2545, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:08 client Received first packet. Switching destination connection ID to: 15bc2a8f5028e583c48e5ed69ffb2545 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.2ms} 2025/04/30 13:30:08 client newly acked packets (1): [0] 2025/04/30 13:30:08 client updated RTT: 34.257964ms (σ: 17.128982ms) 2025/04/30 13:30:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:08 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:08 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:08 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:08 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 15bc2a8f5028e583c48e5ed69ffb2545, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 687, Offset + Data length: 687} 2025/04/30 13:30:08 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:08 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:08 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e0487d6057db045ae2b0, InitialSourceConnectionID: 15bc2a8f5028e583c48e5ed69ffb2545, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:08 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e0487d6057db045ae2b0 2025/04/30 13:30:08 client Long Header{Type: Initial, DestConnectionID: 15bc2a8f5028e583c48e5ed69ffb2545, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client Long Header{Type: Handshake, DestConnectionID: 15bc2a8f5028e583c48e5ed69ffb2545, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:08 client Dropping Initial keys. 2025/04/30 13:30:08 client -> Sending packet 1 (51 bytes) for connection e0487d6057db045ae2b0, Handshake 2025/04/30 13:30:08 client Long Header{Type: Handshake, DestConnectionID: 15bc2a8f5028e583c48e5ed69ffb2545, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client -> Sending packet 0 (54 bytes) for connection e0487d6057db045ae2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: 15bc2a8f5028e583c48e5ed69ffb2545, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:08 client <- Reading packet 0 (136 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.136ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client Peer doesn't await address validation any longer. 2025/04/30 13:30:08 client newly acked packets (1): [0] 2025/04/30 13:30:08 client updated RTT: 34.172ms (σ: 13.014ms) 2025/04/30 13:30:08 client ECN capability confirmed. 2025/04/30 13:30:08 client Canceling loss detection timer. 2025/04/30 13:30:08 client Dropping Handshake keys. 2025/04/30 13:30:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: dc4ebd4ecc6eb9762ebfa31b9af5e037, StatelessResetToken: 0xf7f03593af4fcc5d85a187ea8acba041} 2025/04/30 13:30:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: f94a8c352b4e80f9940bf957564b99d1, StatelessResetToken: 0xb488cc699783c09842bde1f62f154bca} 2025/04/30 13:30:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 9f26429f73648a0e3d4926d26b5a2917, StatelessResetToken: 0x7fa290d1def78516a77789d1c76085b4} 2025/04/30 13:30:08 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:08 client -> Sending packet 1 (45 bytes) for connection e0487d6057db045ae2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: dc4ebd4ecc6eb9762ebfa31b9af5e037, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 198.772µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:08 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:08 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:08 client Sending ACK because the ACK timer expired. 2025/04/30 13:30:08 client -> Sending packet 2 (44 bytes) for connection e0487d6057db045ae2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: dc4ebd4ecc6eb9762ebfa31b9af5e037, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.24333ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.8ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client newly acked packets (1): [1] 2025/04/30 13:30:08 client updated RTT: 37.053ms (σ: 15.522ms) 2025/04/30 13:30:08 client Canceling loss detection timer. 2025/04/30 13:30:08 client Ignoring all packets below 1. 2025/04/30 13:30:08 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 83.8ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- &wire.PingFrame{} 2025/04/30 13:30:08 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:08 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 83.8ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- &wire.PingFrame{} 2025/04/30 13:30:08 client -> Sending packet 3 (49 bytes) for connection e0487d6057db045ae2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: dc4ebd4ecc6eb9762ebfa31b9af5e037, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 133.19µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 310.864ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- &wire.PingFrame{} 2025/04/30 13:30:08 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:08 client -> Sending packet 4 (1366 bytes) for connection e0487d6057db045ae2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: dc4ebd4ecc6eb9762ebfa31b9af5e037, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.PingFrame{} 2025/04/30 13:30:08 client -> Sending packet 5 (51 bytes) for connection e0487d6057db045ae2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: dc4ebd4ecc6eb9762ebfa31b9af5e037, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 160.481µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:08 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:08 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 632µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:08 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:08 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:08 client -> Sending packet 6 (38 bytes) for connection e0487d6057db045ae2b0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:08 client Short Header{DestConnectionID: dc4ebd4ecc6eb9762ebfa31b9af5e037, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:08 client Connection e0487d6057db045ae2b0 closed. 2025/04/30 13:30:08 Requesting https://server4:443/dywypkedsm. 2025/04/30 13:30:08 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:08 Increased send buffer size to 14336 kiB 2025/04/30 13:30:08 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:08 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:08 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:08 Created qlog file: /logs/qlog/f45dcc9be3ffbc22a47bc3.sqlog 2025/04/30 13:30:08 client Starting new connection to server4 ([::]:48943 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f45dcc9be3ffbc22a47bc3, version v1 2025/04/30 13:30:08 Adding connection ID (empty). 2025/04/30 13:30:08 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:08 client -> Sending packet 0 (1280 bytes) for connection f45dcc9be3ffbc22a47bc3, Initial 2025/04/30 13:30:08 client Long Header{Type: Initial, DestConnectionID: f45dcc9be3ffbc22a47bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:30:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:08 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:08 client -> Sending packet 1 (1280 bytes) for connection f45dcc9be3ffbc22a47bc3, Initial 2025/04/30 13:30:08 client Long Header{Type: Initial, DestConnectionID: f45dcc9be3ffbc22a47bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:30:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:08 client -> Sending packet 2 (1280 bytes) for connection f45dcc9be3ffbc22a47bc3, Initial 2025/04/30 13:30:08 client Long Header{Type: Initial, DestConnectionID: f45dcc9be3ffbc22a47bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:30:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:09 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:09 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:30:09 client -> Sending packet 3 (1280 bytes) for connection f45dcc9be3ffbc22a47bc3, Initial 2025/04/30 13:30:09 client Long Header{Type: Initial, DestConnectionID: f45dcc9be3ffbc22a47bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:30:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:09 client -> Sending packet 4 (1280 bytes) for connection f45dcc9be3ffbc22a47bc3, Initial 2025/04/30 13:30:09 client Long Header{Type: Initial, DestConnectionID: f45dcc9be3ffbc22a47bc3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:30:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:09 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f820eb47274a2423d029d11d66e99518, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:09 client Received first packet. Switching destination connection ID to: f820eb47274a2423d029d11d66e99518 2025/04/30 13:30:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2.864ms} 2025/04/30 13:30:09 client newly acked packets (1): [4] 2025/04/30 13:30:09 client updated RTT: 34.836712ms (σ: 17.418356ms) 2025/04/30 13:30:09 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 13:30:09 client <- Reading packet 4 (149 bytes) for connection (empty), Initial 2025/04/30 13:30:09 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f820eb47274a2423d029d11d66e99518, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 13:30:09 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 3.190664s} 2025/04/30 13:30:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:09 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:09 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:09 client Parsed a coalesced packet. Part 2: 1051 bytes. Remaining: 0 bytes. 2025/04/30 13:30:09 client <- Reading packet 2 (1051 bytes) for connection (empty), Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 2, PacketNumberLen: 1, Length: 1026, Version: v1} 2025/04/30 13:30:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:30:09 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:09 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:09 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f45dcc9be3ffbc22a47bc3, InitialSourceConnectionID: f820eb47274a2423d029d11d66e99518, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:09 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f45dcc9be3ffbc22a47bc3 2025/04/30 13:30:09 client Long Header{Type: Initial, DestConnectionID: f820eb47274a2423d029d11d66e99518, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:09 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: f820eb47274a2423d029d11d66e99518, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:09 client Dropping Initial keys. 2025/04/30 13:30:09 client -> Sending packet 1 (51 bytes) for connection f45dcc9be3ffbc22a47bc3, Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: f820eb47274a2423d029d11d66e99518, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:09 client -> Sending packet 0 (54 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:09 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:09 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 13:30:09 client Dropping %!s(logging.PacketType=0) packet (149 bytes) because we already dropped the keys. 2025/04/30 13:30:09 client Parsed a coalesced packet. Part 2: 1051 bytes. Remaining: 0 bytes. 2025/04/30 13:30:09 client <- Reading packet 4 (1051 bytes) for connection (empty), Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 4, PacketNumberLen: 1, Length: 1026, Version: v1} 2025/04/30 13:30:09 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:30:09 client -> Sending packet 2 (53 bytes) for connection f45dcc9be3ffbc22a47bc3, Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: f820eb47274a2423d029d11d66e99518, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:30:09 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:09 client <- Reading packet 6 (61 bytes) for connection (empty), Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 6, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 13:30:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 559.56ms} 2025/04/30 13:30:09 client Peer doesn't await address validation any longer. 2025/04/30 13:30:09 client <- &wire.PingFrame{} 2025/04/30 13:30:09 client -> Sending packet 3 (55 bytes) for connection f45dcc9be3ffbc22a47bc3, Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: f820eb47274a2423d029d11d66e99518, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 13:30:09 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:09 client <- Reading packet 8 (61 bytes) for connection (empty), Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 8, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 13:30:09 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 559.56ms} 2025/04/30 13:30:09 client <- &wire.PingFrame{} 2025/04/30 13:30:09 client -> Sending packet 4 (57 bytes) for connection f45dcc9be3ffbc22a47bc3, Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: f820eb47274a2423d029d11d66e99518, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 32, Version: v1} 2025/04/30 13:30:09 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:09 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:09 client -> Sending packet 5 (82 bytes) for connection f45dcc9be3ffbc22a47bc3, Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: f820eb47274a2423d029d11d66e99518, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:09 client -> Sending packet 6 (82 bytes) for connection f45dcc9be3ffbc22a47bc3, Handshake 2025/04/30 13:30:09 client Long Header{Type: Handshake, DestConnectionID: f820eb47274a2423d029d11d66e99518, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:09 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:09 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:09 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:09 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:09 client Dropping Handshake keys. 2025/04/30 13:30:09 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:09 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:09 client -> Sending packet 2 (62 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:09 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:09 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 120.295µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:09 client -> Sending packet 3 (54 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:09 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:09 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:10 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:10 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:10 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:10 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:30:10 client -> Sending packet 5 (64 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:10 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:10 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 119.314µs, ECT0: 1, ECT1: 0, CE: 1} 2025/04/30 13:30:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:10 client -> Sending packet 6 (54 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:10 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:10 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:10 client -> Sending packet 7 (1366 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:10 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:10 client -> &wire.PingFrame{} 2025/04/30 13:30:10 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:10 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:10 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 192µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:10 client newly acked packets (1): [7] 2025/04/30 13:30:10 client updated RTT: 34.596ms (σ: 13.541ms) 2025/04/30 13:30:10 client ECN capability confirmed. 2025/04/30 13:30:10 client setting loss timer for packet 6 (1-RTT) to 38.9205ms (in 2025-04-30 13:30:10.128532077 +0000 UTC m=+15.663484039) 2025/04/30 13:30:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:10 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:10 client -> Sending packet 8 (47 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:10 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:10 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 141.605µs, ECT0: 2, ECT1: 0, CE: 1} 2025/04/30 13:30:10 client <- Reading packet 11 (1058 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:10 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:10 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 856µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:10 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:10 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:10 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:10 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:10 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:10 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:10 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:10 client -> Sending packet 9 (47 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:10 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:10 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 151.14µs, ECT0: 4, ECT1: 0, CE: 1} 2025/04/30 13:30:10 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:10 client -> Sending packet 10 (38 bytes) for connection f45dcc9be3ffbc22a47bc3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:10 client Short Header{DestConnectionID: f820eb47274a2423d029d11d66e99518, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:10 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:10 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:10 client Connection f45dcc9be3ffbc22a47bc3 closed. 2025/04/30 13:30:10 Requesting https://server4:443/tbhnxglbpk. 2025/04/30 13:30:10 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:10 Increased send buffer size to 14336 kiB 2025/04/30 13:30:10 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:10 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:10 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:10 Created qlog file: /logs/qlog/0f772310f4640e398323845459.sqlog 2025/04/30 13:30:10 client Starting new connection to server4 ([::]:33520 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 0f772310f4640e398323845459, version v1 2025/04/30 13:30:10 Adding connection ID (empty). 2025/04/30 13:30:10 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:10 client -> Sending packet 0 (1280 bytes) for connection 0f772310f4640e398323845459, Initial 2025/04/30 13:30:10 client Long Header{Type: Initial, DestConnectionID: 0f772310f4640e398323845459, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:30:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:10 client -> Sending packet 1 (1280 bytes) for connection 0f772310f4640e398323845459, Initial 2025/04/30 13:30:10 client Long Header{Type: Initial, DestConnectionID: 0f772310f4640e398323845459, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:30:10 client -> Sending packet 2 (1280 bytes) for connection 0f772310f4640e398323845459, Initial 2025/04/30 13:30:10 client Long Header{Type: Initial, DestConnectionID: 0f772310f4640e398323845459, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:30:10 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90f39095b1a5d4f7fd67090570baf5be, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:10 client Received first packet. Switching destination connection ID to: 90f39095b1a5d4f7fd67090570baf5be 2025/04/30 13:30:10 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 2.936ms} 2025/04/30 13:30:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:10 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:30:10 client -> Sending packet 3 (1280 bytes) for connection 0f772310f4640e398323845459, Initial 2025/04/30 13:30:10 client Long Header{Type: Initial, DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:30:10 client -> Sending packet 4 (1280 bytes) for connection 0f772310f4640e398323845459, Initial 2025/04/30 13:30:10 client Long Header{Type: Initial, DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:10 client -> &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 13:30:10 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:10 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90f39095b1a5d4f7fd67090570baf5be, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:10 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 2.696ms} 2025/04/30 13:30:10 client newly acked packets (1): [4] 2025/04/30 13:30:10 client updated RTT: 34.789051ms (σ: 17.394525ms) 2025/04/30 13:30:10 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:11 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:11 client <- Reading packet 5 (147 bytes) for connection (empty), Initial 2025/04/30 13:30:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90f39095b1a5d4f7fd67090570baf5be, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 3.182176s} 2025/04/30 13:30:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:11 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/04/30 13:30:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 0f772310f4640e398323845459, InitialSourceConnectionID: 90f39095b1a5d4f7fd67090570baf5be, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0f772310f4640e398323845459 2025/04/30 13:30:11 client Long Header{Type: Initial, DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:11 client Dropping Initial keys. 2025/04/30 13:30:11 client -> Sending packet 1 (51 bytes) for connection 0f772310f4640e398323845459, Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client -> Sending packet 0 (54 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:11 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:11 client Dropping %!s(logging.PacketType=0) packet (147 bytes) because we already dropped the keys. 2025/04/30 13:30:11 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:11 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/04/30 13:30:11 client -> Sending packet 2 (53 bytes) for connection 0f772310f4640e398323845459, Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:11 client Dropping Handshake keys. 2025/04/30 13:30:11 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:11 client -> Sending packet 1 (40 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 128.701µs} 2025/04/30 13:30:11 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:11 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:11 client -> Sending packet 3 (54 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:11 client -> Sending packet 4 (54 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:11 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 408µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client newly acked packets (1): [4] 2025/04/30 13:30:11 client updated RTT: 34.427ms (σ: 13.769ms) 2025/04/30 13:30:11 client ECN capability confirmed. 2025/04/30 13:30:11 client Canceling loss detection timer. 2025/04/30 13:30:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:11 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:11 client -> Sending packet 5 (42 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 145.373µs} 2025/04/30 13:30:11 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 129.488ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:11 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:11 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 129.488ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:11 client -> Sending packet 6 (1366 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.PingFrame{} 2025/04/30 13:30:11 client -> Sending packet 7 (46 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 90f39095b1a5d4f7fd67090570baf5be, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 198.159µs} 2025/04/30 13:30:11 client <- Reading packet 8 (140 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 552µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 7079e06f038be54efd84a715a75ecf0c, StatelessResetToken: 0x183724a450230a951cd53e6639122456} 2025/04/30 13:30:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 424de9d5338e20e7278c9028ddf6d56b, StatelessResetToken: 0xfb0ce8c7a8a8ac35dfd956651fc215dd} 2025/04/30 13:30:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 0cf40217e332ed022a82d88066e556c7, StatelessResetToken: 0x81d6751a3bbdd961906611eacb0a0691} 2025/04/30 13:30:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:11 client -> Sending packet 8 (48 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 7079e06f038be54efd84a715a75ecf0c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 124.802µs} 2025/04/30 13:30:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:11 client -> Sending packet 9 (38 bytes) for connection 0f772310f4640e398323845459, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 7079e06f038be54efd84a715a75ecf0c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:11 client Connection 0f772310f4640e398323845459 closed. 2025/04/30 13:30:11 Requesting https://server4:443/yffzpfhrav. 2025/04/30 13:30:11 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:11 Increased send buffer size to 14336 kiB 2025/04/30 13:30:11 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:11 Created qlog file: /logs/qlog/ecc1be4cc35d50247c5c0f32d7c8641852.sqlog 2025/04/30 13:30:11 client Starting new connection to server4 ([::]:59960 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ecc1be4cc35d50247c5c0f32d7c8641852, version v1 2025/04/30 13:30:11 Adding connection ID (empty). 2025/04/30 13:30:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:11 client -> Sending packet 0 (1280 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, Initial 2025/04/30 13:30:11 client Long Header{Type: Initial, DestConnectionID: ecc1be4cc35d50247c5c0f32d7c8641852, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:30:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:11 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:11 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ed9836620fd86d972c0a8f17ae7d6725, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:11 client Received first packet. Switching destination connection ID to: ed9836620fd86d972c0a8f17ae7d6725 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.848ms} 2025/04/30 13:30:11 client newly acked packets (1): [0] 2025/04/30 13:30:11 client updated RTT: 34.147541ms (σ: 17.07377ms) 2025/04/30 13:30:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:11 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ed9836620fd86d972c0a8f17ae7d6725, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 693, Offset + Data length: 693} 2025/04/30 13:30:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ecc1be4cc35d50247c5c0f32d7c8641852, InitialSourceConnectionID: ed9836620fd86d972c0a8f17ae7d6725, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852 2025/04/30 13:30:11 client Long Header{Type: Initial, DestConnectionID: ed9836620fd86d972c0a8f17ae7d6725, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: ed9836620fd86d972c0a8f17ae7d6725, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:11 client Dropping Initial keys. 2025/04/30 13:30:11 client -> Sending packet 1 (51 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: ed9836620fd86d972c0a8f17ae7d6725, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client -> Sending packet 0 (54 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: ed9836620fd86d972c0a8f17ae7d6725, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:11 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:11 client Dropping Handshake keys. 2025/04/30 13:30:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: af8853b9470f41a6d595c0d0cf34f578, StatelessResetToken: 0x171bdde5f3334a8e8c3f4e13e6153f31} 2025/04/30 13:30:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: cbe52479433256c9f6bb92a928cb652a, StatelessResetToken: 0x13707c07f67fd6991a9f01e3067ad27f} 2025/04/30 13:30:11 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 303edfd98b27fc354b7629e78563e38b, StatelessResetToken: 0x1b565bab07ae101691e49aebb1f85599} 2025/04/30 13:30:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:11 client -> Sending packet 1 (45 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: af8853b9470f41a6d595c0d0cf34f578, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.04µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:11 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 648µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client newly acked packets (1): [0] 2025/04/30 13:30:11 client updated RTT: 34.159ms (σ: 12.83ms) 2025/04/30 13:30:11 client ECN capability confirmed. 2025/04/30 13:30:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:11 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:11 client Sending ACK because the ACK timer expired. 2025/04/30 13:30:11 client -> Sending packet 2 (44 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: af8853b9470f41a6d595c0d0cf34f578, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.287121ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:11 client -> Sending packet 4 (37 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: af8853b9470f41a6d595c0d0cf34f578, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:11 client -> Sending packet 5 (37 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: af8853b9470f41a6d595c0d0cf34f578, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:11 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 77.08ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- &wire.PingFrame{} 2025/04/30 13:30:11 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:11 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 77.08ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- &wire.PingFrame{} 2025/04/30 13:30:11 client -> Sending packet 6 (47 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: af8853b9470f41a6d595c0d0cf34f578, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 142.215µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 216µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 376µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:11 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:11 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:11 client -> Sending packet 7 (38 bytes) for connection ecc1be4cc35d50247c5c0f32d7c8641852, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: af8853b9470f41a6d595c0d0cf34f578, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:11 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:11 client Connection ecc1be4cc35d50247c5c0f32d7c8641852 closed. 2025/04/30 13:30:11 Requesting https://server4:443/aykghdjjxz. 2025/04/30 13:30:11 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:11 Increased send buffer size to 14336 kiB 2025/04/30 13:30:11 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:11 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:11 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:11 Created qlog file: /logs/qlog/6bcf49c3e3b98b12bcfd87f24d0de297.sqlog 2025/04/30 13:30:11 client Starting new connection to server4 ([::]:56434 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6bcf49c3e3b98b12bcfd87f24d0de297, version v1 2025/04/30 13:30:11 Adding connection ID (empty). 2025/04/30 13:30:11 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:11 client -> Sending packet 0 (1280 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, Initial 2025/04/30 13:30:11 client Long Header{Type: Initial, DestConnectionID: 6bcf49c3e3b98b12bcfd87f24d0de297, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:30:11 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:11 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:11 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:11 client Received first packet. Switching destination connection ID to: 0149d8c379a271c2211b9ae05bf64ddc 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.024ms} 2025/04/30 13:30:11 client newly acked packets (1): [0] 2025/04/30 13:30:11 client updated RTT: 34.157904ms (σ: 17.078952ms) 2025/04/30 13:30:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:11 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:11 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:11 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:30:11 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:11 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6bcf49c3e3b98b12bcfd87f24d0de297, InitialSourceConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:11 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297 2025/04/30 13:30:11 client Long Header{Type: Initial, DestConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:11 client Dropping Initial keys. 2025/04/30 13:30:11 client -> Sending packet 1 (51 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client -> Sending packet 0 (54 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:11 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:11 client -> Sending packet 2 (82 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:11 client -> Sending packet 3 (82 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, Handshake 2025/04/30 13:30:11 client Long Header{Type: Handshake, DestConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:11 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:11 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 128.96ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client Peer doesn't await address validation any longer. 2025/04/30 13:30:11 client newly acked packets (1): [0] 2025/04/30 13:30:11 client updated RTT: 47.16ms (σ: 38.816ms) 2025/04/30 13:30:11 client ECN capability confirmed. 2025/04/30 13:30:11 client Canceling loss detection timer. 2025/04/30 13:30:11 client Dropping Handshake keys. 2025/04/30 13:30:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:11 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:11 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:11 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:11 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 128.96ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:11 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:11 client -> Sending packet 1 (45 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:11 client Short Header{DestConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:11 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 238.354µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 112.776ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- &wire.PingFrame{} 2025/04/30 13:30:12 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:12 client -> Sending packet 2 (47 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: 0149d8c379a271c2211b9ae05bf64ddc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 4, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 154.387µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- Reading packet 12 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 528µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: a8aa4724787ff0fcb5d3a6ed0f911186, StatelessResetToken: 0x7821281d5be048a51f9969bf16e9858c} 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 98eef3b762cf128e96a844874f9c2b15, StatelessResetToken: 0x0a5001e31ba981bf199d0dbd27c204ef} 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 5c57b8112dc58dd074881d2844d1aa48, StatelessResetToken: 0xaad74421e4d5ca1948069b25616158db} 2025/04/30 13:30:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:12 client -> Sending packet 3 (49 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: a8aa4724787ff0fcb5d3a6ed0f911186, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 152.894µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:12 client -> Sending packet 4 (38 bytes) for connection 6bcf49c3e3b98b12bcfd87f24d0de297, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: a8aa4724787ff0fcb5d3a6ed0f911186, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:12 client Connection 6bcf49c3e3b98b12bcfd87f24d0de297 closed. 2025/04/30 13:30:12 Requesting https://server4:443/mntywjrtxt. 2025/04/30 13:30:12 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:12 Increased send buffer size to 14336 kiB 2025/04/30 13:30:12 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:12 Created qlog file: /logs/qlog/25c42fbf7b760d5aa0.sqlog 2025/04/30 13:30:12 client Starting new connection to server4 ([::]:55245 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 25c42fbf7b760d5aa0, version v1 2025/04/30 13:30:12 Adding connection ID (empty). 2025/04/30 13:30:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:12 client -> Sending packet 0 (1280 bytes) for connection 25c42fbf7b760d5aa0, Initial 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: 25c42fbf7b760d5aa0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:12 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:12 client -> Sending packet 1 (1280 bytes) for connection 25c42fbf7b760d5aa0, Initial 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: 25c42fbf7b760d5aa0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:12 client -> Sending packet 2 (1280 bytes) for connection 25c42fbf7b760d5aa0, Initial 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: 25c42fbf7b760d5aa0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:12 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:12 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: babc733f1c0e43aaa5730a2e95df500e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:12 client Received first packet. Switching destination connection ID to: babc733f1c0e43aaa5730a2e95df500e 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 10.176ms} 2025/04/30 13:30:12 client newly acked packets (1): [2] 2025/04/30 13:30:12 client updated RTT: 36.017536ms (σ: 18.008768ms) 2025/04/30 13:30:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:12 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: babc733f1c0e43aaa5730a2e95df500e, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 686, Offset + Data length: 686} 2025/04/30 13:30:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 25c42fbf7b760d5aa0, InitialSourceConnectionID: babc733f1c0e43aaa5730a2e95df500e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 25c42fbf7b760d5aa0 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: babc733f1c0e43aaa5730a2e95df500e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: babc733f1c0e43aaa5730a2e95df500e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:12 client Dropping Initial keys. 2025/04/30 13:30:12 client -> Sending packet 1 (51 bytes) for connection 25c42fbf7b760d5aa0, Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: babc733f1c0e43aaa5730a2e95df500e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client -> Sending packet 0 (54 bytes) for connection 25c42fbf7b760d5aa0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: babc733f1c0e43aaa5730a2e95df500e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:12 client -> Sending packet 2 (82 bytes) for connection 25c42fbf7b760d5aa0, Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: babc733f1c0e43aaa5730a2e95df500e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:12 client -> Sending packet 3 (82 bytes) for connection 25c42fbf7b760d5aa0, Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: babc733f1c0e43aaa5730a2e95df500e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:12 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 130.776ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client Peer doesn't await address validation any longer. 2025/04/30 13:30:12 client newly acked packets (1): [0] 2025/04/30 13:30:12 client updated RTT: 49.035ms (σ: 39.542ms) 2025/04/30 13:30:12 client ECN capability confirmed. 2025/04/30 13:30:12 client Canceling loss detection timer. 2025/04/30 13:30:12 client Dropping Handshake keys. 2025/04/30 13:30:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:12 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 130.776ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:12 client -> Sending packet 1 (45 bytes) for connection 25c42fbf7b760d5aa0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: babc733f1c0e43aaa5730a2e95df500e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 203.259µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 114.624ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- &wire.PingFrame{} 2025/04/30 13:30:12 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:12 client -> Sending packet 2 (47 bytes) for connection 25c42fbf7b760d5aa0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: babc733f1c0e43aaa5730a2e95df500e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 4, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 118.991µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- Reading packet 12 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 576µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 60937624d1fa077ac98651ba8b73d890, StatelessResetToken: 0x59bd57fbec48519ef34ef63309d520ca} 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 30468d5b3413bceadce3c52fc5cef533, StatelessResetToken: 0x4c32da270fd94d84d6412b32e9fa0b74} 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: d9acc3a5ed35c3e59a02f57a5964b953, StatelessResetToken: 0x6edb40e29d21ec0f7016e41c2ad82463} 2025/04/30 13:30:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:12 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:12 client -> Sending packet 3 (49 bytes) for connection 25c42fbf7b760d5aa0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: 60937624d1fa077ac98651ba8b73d890, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 173.082µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:12 client -> Sending packet 4 (38 bytes) for connection 25c42fbf7b760d5aa0, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: 60937624d1fa077ac98651ba8b73d890, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:12 client Connection 25c42fbf7b760d5aa0 closed. 2025/04/30 13:30:12 Requesting https://server4:443/cyineeegmd. 2025/04/30 13:30:12 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:12 Increased send buffer size to 14336 kiB 2025/04/30 13:30:12 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:12 Created qlog file: /logs/qlog/6f98c71b5abb4c7261851bb396.sqlog 2025/04/30 13:30:12 client Starting new connection to server4 ([::]:60328 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6f98c71b5abb4c7261851bb396, version v1 2025/04/30 13:30:12 Adding connection ID (empty). 2025/04/30 13:30:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:12 client -> Sending packet 0 (1280 bytes) for connection 6f98c71b5abb4c7261851bb396, Initial 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: 6f98c71b5abb4c7261851bb396, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:12 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:12 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2a1f7042e1955363600d1262609e1381, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:12 client Received first packet. Switching destination connection ID to: 2a1f7042e1955363600d1262609e1381 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.68ms} 2025/04/30 13:30:12 client newly acked packets (1): [0] 2025/04/30 13:30:12 client updated RTT: 34.543207ms (σ: 17.271603ms) 2025/04/30 13:30:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:12 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2a1f7042e1955363600d1262609e1381, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:30:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6f98c71b5abb4c7261851bb396, InitialSourceConnectionID: 2a1f7042e1955363600d1262609e1381, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6f98c71b5abb4c7261851bb396 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: 2a1f7042e1955363600d1262609e1381, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: 2a1f7042e1955363600d1262609e1381, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:12 client Dropping Initial keys. 2025/04/30 13:30:12 client -> Sending packet 1 (105 bytes) for connection 6f98c71b5abb4c7261851bb396, Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: 2a1f7042e1955363600d1262609e1381, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client Short Header{DestConnectionID: 2a1f7042e1955363600d1262609e1381, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:12 client <- Reading packet 1 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 616µs} 2025/04/30 13:30:12 client Peer doesn't await address validation any longer. 2025/04/30 13:30:12 client newly acked packets (1): [0] 2025/04/30 13:30:12 client updated RTT: 34.564ms (σ: 12.996ms) 2025/04/30 13:30:12 client Canceling loss detection timer. 2025/04/30 13:30:12 client Dropping Handshake keys. 2025/04/30 13:30:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:12 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:12 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:12 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:12 client -> Sending packet 1 (43 bytes) for connection 6f98c71b5abb4c7261851bb396, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: 2a1f7042e1955363600d1262609e1381, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 202.319µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:12 client -> Sending packet 2 (38 bytes) for connection 6f98c71b5abb4c7261851bb396, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: 2a1f7042e1955363600d1262609e1381, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:12 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:12 client Connection 6f98c71b5abb4c7261851bb396 closed. 2025/04/30 13:30:12 Requesting https://server4:443/bjzhefdmci. 2025/04/30 13:30:12 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:12 Increased send buffer size to 14336 kiB 2025/04/30 13:30:12 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:12 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:12 Created qlog file: /logs/qlog/1cf744c20bf55803d38d8095bdc01f605ac4.sqlog 2025/04/30 13:30:12 client Starting new connection to server4 ([::]:41651 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 1cf744c20bf55803d38d8095bdc01f605ac4, version v1 2025/04/30 13:30:12 Adding connection ID (empty). 2025/04/30 13:30:12 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:12 client -> Sending packet 0 (1280 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, Initial 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: 1cf744c20bf55803d38d8095bdc01f605ac4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:30:12 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:12 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0bdcdd552b6300f70a3cc51cded35938, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:12 client Received first packet. Switching destination connection ID to: 0bdcdd552b6300f70a3cc51cded35938 2025/04/30 13:30:12 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.424ms} 2025/04/30 13:30:12 client newly acked packets (1): [0] 2025/04/30 13:30:12 client updated RTT: 34.491101ms (σ: 17.24555ms) 2025/04/30 13:30:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:12 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:12 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0bdcdd552b6300f70a3cc51cded35938, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:12 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:30:12 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:12 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 1cf744c20bf55803d38d8095bdc01f605ac4, InitialSourceConnectionID: 0bdcdd552b6300f70a3cc51cded35938, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:12 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4 2025/04/30 13:30:12 client Long Header{Type: Initial, DestConnectionID: 0bdcdd552b6300f70a3cc51cded35938, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: 0bdcdd552b6300f70a3cc51cded35938, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:12 client Dropping Initial keys. 2025/04/30 13:30:12 client -> Sending packet 1 (51 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: 0bdcdd552b6300f70a3cc51cded35938, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client -> Sending packet 0 (54 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: 0bdcdd552b6300f70a3cc51cded35938, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:12 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:12 client -> Sending packet 2 (82 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: 0bdcdd552b6300f70a3cc51cded35938, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:12 client -> Sending packet 3 (82 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, Handshake 2025/04/30 13:30:12 client Long Header{Type: Handshake, DestConnectionID: 0bdcdd552b6300f70a3cc51cded35938, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:12 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:12 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:12 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:12 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:12 client Dropping Handshake keys. 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e230b7d5f20693065a66e765cb9ccb70, StatelessResetToken: 0x9e6dba61dbd1f7ab060c1a68756e686f} 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 8599640bc3d91f6030a97d16047d5405, StatelessResetToken: 0xa12af5ae75b199265b8241cd3316d544} 2025/04/30 13:30:12 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 00d466fa557cfd3b34255e492aec66fe, StatelessResetToken: 0x710054bebdfe07992c3a05c418a0f862} 2025/04/30 13:30:12 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:12 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:12 client -> Sending packet 2 (64 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 170.778µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:12 client -> Sending packet 3 (56 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:12 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:12 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:12 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:13 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:13 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:13 client -> Sending packet 4 (47 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 103.382µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:30:13 client -> Sending packet 6 (56 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client -> Sending packet 7 (56 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client -> Sending packet 8 (1366 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.PingFrame{} 2025/04/30 13:30:13 client <- Reading packet 5 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 1ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:13 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:13 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 160µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client newly acked packets (1): [8] 2025/04/30 13:30:13 client updated RTT: 34.397ms (σ: 13.12ms) 2025/04/30 13:30:13 client ECN capability confirmed. 2025/04/30 13:30:13 client setting loss timer for packet 7 (1-RTT) to 38.696625ms (in 2025-04-30 13:30:13.223015411 +0000 UTC m=+18.757967373) 2025/04/30 13:30:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:13 client -> Sending packet 9 (49 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 126.575µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 13:30:13.223015411 +0000 UTC m=+18.757967373 2025/04/30 13:30:13 client lost packet 7 (time threshold) 2025/04/30 13:30:13 client Canceling loss detection timer. 2025/04/30 13:30:13 client -> Sending packet 10 (56 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:13 client -> Sending packet 12 (56 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client -> Sending packet 13 (56 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 114.064ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client <- &wire.PingFrame{} 2025/04/30 13:30:13 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:13 client -> Sending packet 14 (1409 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.PingFrame{} 2025/04/30 13:30:13 client -> Sending packet 15 (51 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 226.672µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client <- Reading packet 13 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 15, LowestAcked: 15, DelayTime: 544µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:13 client -> Sending packet 16 (38 bytes) for connection 1cf744c20bf55803d38d8095bdc01f605ac4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: e230b7d5f20693065a66e765cb9ccb70, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:13 client Connection 1cf744c20bf55803d38d8095bdc01f605ac4 closed. 2025/04/30 13:30:13 Requesting https://server4:443/xzpcuzrcxe. 2025/04/30 13:30:13 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:13 Increased send buffer size to 14336 kiB 2025/04/30 13:30:13 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:13 Created qlog file: /logs/qlog/8e489a7a1fc070b917c31c1f11f64816f9f2.sqlog 2025/04/30 13:30:13 client Starting new connection to server4 ([::]:47622 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8e489a7a1fc070b917c31c1f11f64816f9f2, version v1 2025/04/30 13:30:13 Adding connection ID (empty). 2025/04/30 13:30:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:13 client -> Sending packet 0 (1280 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2, Initial 2025/04/30 13:30:13 client Long Header{Type: Initial, DestConnectionID: 8e489a7a1fc070b917c31c1f11f64816f9f2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:13 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:13 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b247945657db9619a4c094d062cc747, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:13 client Received first packet. Switching destination connection ID to: 3b247945657db9619a4c094d062cc747 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.904ms} 2025/04/30 13:30:13 client newly acked packets (1): [0] 2025/04/30 13:30:13 client updated RTT: 34.638165ms (σ: 17.319082ms) 2025/04/30 13:30:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:13 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:13 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3b247945657db9619a4c094d062cc747, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:30:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8e489a7a1fc070b917c31c1f11f64816f9f2, InitialSourceConnectionID: 3b247945657db9619a4c094d062cc747, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2 2025/04/30 13:30:13 client Long Header{Type: Initial, DestConnectionID: 3b247945657db9619a4c094d062cc747, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client Long Header{Type: Handshake, DestConnectionID: 3b247945657db9619a4c094d062cc747, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:13 client Dropping Initial keys. 2025/04/30 13:30:13 client -> Sending packet 1 (105 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2, Handshake 2025/04/30 13:30:13 client Long Header{Type: Handshake, DestConnectionID: 3b247945657db9619a4c094d062cc747, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client Short Header{DestConnectionID: 3b247945657db9619a4c094d062cc747, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:13 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:13 client -> Sending packet 2 (82 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2, Handshake 2025/04/30 13:30:13 client Long Header{Type: Handshake, DestConnectionID: 3b247945657db9619a4c094d062cc747, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:13 client -> Sending packet 3 (82 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2, Handshake 2025/04/30 13:30:13 client Long Header{Type: Handshake, DestConnectionID: 3b247945657db9619a4c094d062cc747, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:13 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:13 client Dropping Handshake keys. 2025/04/30 13:30:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 9439a1377d167058e3e4824a901e4829, StatelessResetToken: 0x0782b6d95761f3bac1e94f084e66173e} 2025/04/30 13:30:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 2e80a50339b9e19da19a24b8a7307d6b, StatelessResetToken: 0x26e42dc02fc4d094a4e5336532d096d0} 2025/04/30 13:30:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: c71e0bf67cb75e51145c5f02e6ccd543, StatelessResetToken: 0x7314953b32ff47ca393f0ed964778df3} 2025/04/30 13:30:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:13 client -> Sending packet 2 (64 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 9439a1377d167058e3e4824a901e4829, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 157.323µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client -> Sending packet 3 (56 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 9439a1377d167058e3e4824a901e4829, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.264ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client newly acked packets (1): [3] 2025/04/30 13:30:13 client updated RTT: 34.494ms (σ: 13.276ms) 2025/04/30 13:30:13 client ECN capability confirmed. 2025/04/30 13:30:13 client Canceling loss detection timer. 2025/04/30 13:30:13 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:13 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:13 client -> Sending packet 4 (43 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 9439a1377d167058e3e4824a901e4829, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 155.099µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:13 client -> Sending packet 5 (38 bytes) for connection 8e489a7a1fc070b917c31c1f11f64816f9f2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 9439a1377d167058e3e4824a901e4829, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:13 client Connection 8e489a7a1fc070b917c31c1f11f64816f9f2 closed. 2025/04/30 13:30:13 Requesting https://server4:443/evozchmaqp. 2025/04/30 13:30:13 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:13 Increased send buffer size to 14336 kiB 2025/04/30 13:30:13 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:13 Created qlog file: /logs/qlog/d0fee4946375269f5c9f1b014aed.sqlog 2025/04/30 13:30:13 client Starting new connection to server4 ([::]:49521 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d0fee4946375269f5c9f1b014aed, version v1 2025/04/30 13:30:13 Adding connection ID (empty). 2025/04/30 13:30:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:13 client -> Sending packet 0 (1280 bytes) for connection d0fee4946375269f5c9f1b014aed, Initial 2025/04/30 13:30:13 client Long Header{Type: Initial, DestConnectionID: d0fee4946375269f5c9f1b014aed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 13:30:13 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:13 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:13 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa0b1e43493b39944f7bf3a920207432, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:13 client Received first packet. Switching destination connection ID to: aa0b1e43493b39944f7bf3a920207432 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 12.376ms} 2025/04/30 13:30:13 client newly acked packets (1): [0] 2025/04/30 13:30:13 client updated RTT: 34.762479ms (σ: 17.381239ms) 2025/04/30 13:30:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:13 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:13 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:13 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:13 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:13 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aa0b1e43493b39944f7bf3a920207432, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:13 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:30:13 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:13 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:13 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d0fee4946375269f5c9f1b014aed, InitialSourceConnectionID: aa0b1e43493b39944f7bf3a920207432, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:13 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d0fee4946375269f5c9f1b014aed 2025/04/30 13:30:13 client Long Header{Type: Initial, DestConnectionID: aa0b1e43493b39944f7bf3a920207432, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client Long Header{Type: Handshake, DestConnectionID: aa0b1e43493b39944f7bf3a920207432, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:13 client Dropping Initial keys. 2025/04/30 13:30:13 client -> Sending packet 1 (105 bytes) for connection d0fee4946375269f5c9f1b014aed, Handshake 2025/04/30 13:30:13 client Long Header{Type: Handshake, DestConnectionID: aa0b1e43493b39944f7bf3a920207432, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client Short Header{DestConnectionID: aa0b1e43493b39944f7bf3a920207432, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:13 client Dropping Handshake keys. 2025/04/30 13:30:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0f47f43fec353c095d2cd7507bf0deac, StatelessResetToken: 0x9441fb9d6150ead85d798b345e1585ac} 2025/04/30 13:30:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 24a4751fe6f7bff855094de021010ef5, StatelessResetToken: 0xc151d8bb3bc4370d019d8b2d89e2aea3} 2025/04/30 13:30:13 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a295adb48b54e5110d449b0b47e79e31, StatelessResetToken: 0xa7e49a40428499b63343ed859ac66dc1} 2025/04/30 13:30:13 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:13 client -> Sending packet 1 (45 bytes) for connection d0fee4946375269f5c9f1b014aed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 0f47f43fec353c095d2cd7507bf0deac, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 136.765µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:13 client -> Sending packet 3 (54 bytes) for connection d0fee4946375269f5c9f1b014aed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 0f47f43fec353c095d2cd7507bf0deac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:13 client Skipping packet number 2 2025/04/30 13:30:13 client -> Sending packet 4 (37 bytes) for connection d0fee4946375269f5c9f1b014aed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 0f47f43fec353c095d2cd7507bf0deac, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:13 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 528µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client newly acked packets (2): [3 4] 2025/04/30 13:30:13 client updated RTT: 34.418ms (σ: 13.722ms) 2025/04/30 13:30:13 client ECN capability confirmed. 2025/04/30 13:30:13 client Canceling loss detection timer. 2025/04/30 13:30:13 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 1.312ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:13 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:13 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:13 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:13 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:13 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:13 client -> Sending packet 5 (45 bytes) for connection d0fee4946375269f5c9f1b014aed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 0f47f43fec353c095d2cd7507bf0deac, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 97.342µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:13 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:13 client -> Sending packet 6 (38 bytes) for connection d0fee4946375269f5c9f1b014aed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:13 client Short Header{DestConnectionID: 0f47f43fec353c095d2cd7507bf0deac, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:13 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:13 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:13 client Connection d0fee4946375269f5c9f1b014aed closed. 2025/04/30 13:30:13 Requesting https://server4:443/dvvxmirlkv. 2025/04/30 13:30:13 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:13 Increased send buffer size to 14336 kiB 2025/04/30 13:30:13 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:13 Created qlog file: /logs/qlog/657c14f321b678282c4d.sqlog 2025/04/30 13:30:13 client Starting new connection to server4 ([::]:38183 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 657c14f321b678282c4d, version v1 2025/04/30 13:30:13 Adding connection ID (empty). 2025/04/30 13:30:13 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:13 client -> Sending packet 0 (1280 bytes) for connection 657c14f321b678282c4d, Initial 2025/04/30 13:30:13 client Long Header{Type: Initial, DestConnectionID: 657c14f321b678282c4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:13 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:14 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:14 client -> Sending packet 1 (1280 bytes) for connection 657c14f321b678282c4d, Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: 657c14f321b678282c4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:14 client -> Sending packet 2 (1280 bytes) for connection 657c14f321b678282c4d, Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: 657c14f321b678282c4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 13:30:14 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:14 client Received first packet. Switching destination connection ID to: 6670f9c9e7436d73b21ad27a88b3df2e 2025/04/30 13:30:14 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2.856ms} 2025/04/30 13:30:14 client newly acked packets (1): [2] 2025/04/30 13:30:14 client updated RTT: 34.872124ms (σ: 17.436062ms) 2025/04/30 13:30:14 client -> Sending packet 3 (1280 bytes) for connection 657c14f321b678282c4d, Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:14 client -> &wire.PingFrame{} 2025/04/30 13:30:14 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:14 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 3.024ms} 2025/04/30 13:30:14 client newly acked packets (1): [3] 2025/04/30 13:30:14 client updated RTT: 34.755ms (σ: 13.31ms) 2025/04/30 13:30:14 client -> Sending packet 4 (1280 bytes) for connection 657c14f321b678282c4d, Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:14 client -> &wire.PingFrame{} 2025/04/30 13:30:14 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:14 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2.704ms} 2025/04/30 13:30:14 client newly acked packets (1): [4] 2025/04/30 13:30:14 client updated RTT: 34.635ms (σ: 10.221ms) 2025/04/30 13:30:14 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:14 client <- Reading packet 5 (147 bytes) for connection (empty), Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:30:14 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.356264s} 2025/04/30 13:30:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:14 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:14 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:14 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:14 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:14 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:14 client <- &wire.CryptoFrame{Offset: 0, Data length: 686, Offset + Data length: 686} 2025/04/30 13:30:14 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:14 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:14 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 657c14f321b678282c4d, InitialSourceConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:14 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 657c14f321b678282c4d 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:14 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:14 client Long Header{Type: Handshake, DestConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:14 client Dropping Initial keys. 2025/04/30 13:30:14 client -> Sending packet 1 (51 bytes) for connection 657c14f321b678282c4d, Handshake 2025/04/30 13:30:14 client Long Header{Type: Handshake, DestConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:14 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:14 client -> Sending packet 0 (54 bytes) for connection 657c14f321b678282c4d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:14 client Short Header{DestConnectionID: 6670f9c9e7436d73b21ad27a88b3df2e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:14 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:14 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:14 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:14 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:14 client Dropping Handshake keys. 2025/04/30 13:30:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 9d6ded415fa81d17b71e1371f94eb93d, StatelessResetToken: 0x4ca2300db35ab5c36d9f59e3a47bb2cc} 2025/04/30 13:30:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: fb4c7bdab8e19b040b3a620288b012c9, StatelessResetToken: 0xf9fb7fb65cd588d2c603ccec586ccab9} 2025/04/30 13:30:14 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: ac5e20ccb29e12a76b468942b3e3d59f, StatelessResetToken: 0xd76f8883a7df62515bb18cca89ce93ad} 2025/04/30 13:30:14 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:14 client -> Sending packet 1 (45 bytes) for connection 657c14f321b678282c4d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:14 client Short Header{DestConnectionID: 9d6ded415fa81d17b71e1371f94eb93d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:14 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 121.096µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:14 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:14 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:14 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:14 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 672µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:14 client newly acked packets (1): [0] 2025/04/30 13:30:14 client updated RTT: 34.659ms (σ: 7.714ms) 2025/04/30 13:30:14 client ECN capability confirmed. 2025/04/30 13:30:14 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:14 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:14 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:14 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:14 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:14 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:14 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:14 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:14 client -> Sending packet 2 (43 bytes) for connection 657c14f321b678282c4d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:14 client Short Header{DestConnectionID: 9d6ded415fa81d17b71e1371f94eb93d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:14 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 125.114µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:14 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:14 client -> Sending packet 3 (38 bytes) for connection 657c14f321b678282c4d, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:14 client Short Header{DestConnectionID: 9d6ded415fa81d17b71e1371f94eb93d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:14 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:14 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:14 client Connection 657c14f321b678282c4d closed. 2025/04/30 13:30:14 Requesting https://server4:443/rxxizjstsy. 2025/04/30 13:30:14 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:14 Increased send buffer size to 14336 kiB 2025/04/30 13:30:14 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:14 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:14 Created qlog file: /logs/qlog/a63dc8b559559c7885e9e4c56433.sqlog 2025/04/30 13:30:14 client Starting new connection to server4 ([::]:46605 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a63dc8b559559c7885e9e4c56433, version v1 2025/04/30 13:30:14 Adding connection ID (empty). 2025/04/30 13:30:14 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:14 client -> Sending packet 0 (1280 bytes) for connection a63dc8b559559c7885e9e4c56433, Initial 2025/04/30 13:30:14 client Long Header{Type: Initial, DestConnectionID: a63dc8b559559c7885e9e4c56433, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:14 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:30:15 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:15 client -> Sending packet 1 (1280 bytes) for connection a63dc8b559559c7885e9e4c56433, Initial 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: a63dc8b559559c7885e9e4c56433, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:30:15 client -> Sending packet 2 (1280 bytes) for connection a63dc8b559559c7885e9e4c56433, Initial 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: a63dc8b559559c7885e9e4c56433, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:30:15 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:15 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83978e9ed854c717ac0665735a257484, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:15 client Received first packet. Switching destination connection ID to: 83978e9ed854c717ac0665735a257484 2025/04/30 13:30:15 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.088ms} 2025/04/30 13:30:15 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83978e9ed854c717ac0665735a257484, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:15 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.552ms} 2025/04/30 13:30:15 client newly acked packets (1): [2] 2025/04/30 13:30:15 client updated RTT: 34.943872ms (σ: 17.471936ms) 2025/04/30 13:30:15 client -> Sending packet 3 (1280 bytes) for connection a63dc8b559559c7885e9e4c56433, Initial 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: 83978e9ed854c717ac0665735a257484, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:15 client -> &wire.PingFrame{} 2025/04/30 13:30:15 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83978e9ed854c717ac0665735a257484, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:15 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 2.888ms} 2025/04/30 13:30:15 client newly acked packets (1): [3] 2025/04/30 13:30:15 client updated RTT: 34.81ms (σ: 13.369ms) 2025/04/30 13:30:15 client -> Sending packet 4 (1280 bytes) for connection a63dc8b559559c7885e9e4c56433, Initial 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: 83978e9ed854c717ac0665735a257484, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:15 client -> &wire.PingFrame{} 2025/04/30 13:30:15 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/04/30 13:30:15 client <- Reading packet 5 (145 bytes) for connection (empty), Initial 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83978e9ed854c717ac0665735a257484, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 13:30:15 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 4.434064s} 2025/04/30 13:30:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:15 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:15 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:15 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/04/30 13:30:15 client <- Reading packet 2 (1055 bytes) for connection (empty), Handshake 2025/04/30 13:30:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83978e9ed854c717ac0665735a257484, PacketNumber: 2, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/04/30 13:30:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:30:15 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:15 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:15 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a63dc8b559559c7885e9e4c56433, InitialSourceConnectionID: 83978e9ed854c717ac0665735a257484, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:15 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a63dc8b559559c7885e9e4c56433 2025/04/30 13:30:15 client Long Header{Type: Initial, DestConnectionID: 83978e9ed854c717ac0665735a257484, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:15 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:15 client Long Header{Type: Handshake, DestConnectionID: 83978e9ed854c717ac0665735a257484, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:15 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:15 client Dropping Initial keys. 2025/04/30 13:30:15 client -> Sending packet 1 (105 bytes) for connection a63dc8b559559c7885e9e4c56433, Handshake 2025/04/30 13:30:15 client Long Header{Type: Handshake, DestConnectionID: 83978e9ed854c717ac0665735a257484, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:15 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:15 client Short Header{DestConnectionID: 83978e9ed854c717ac0665735a257484, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:15 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:15 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/04/30 13:30:15 client Dropping %!s(logging.PacketType=0) packet (145 bytes) because we already dropped the keys. 2025/04/30 13:30:15 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/04/30 13:30:15 client <- Reading packet 4 (1055 bytes) for connection (empty), Handshake 2025/04/30 13:30:15 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83978e9ed854c717ac0665735a257484, PacketNumber: 4, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/04/30 13:30:15 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:30:15 client -> Sending packet 2 (53 bytes) for connection a63dc8b559559c7885e9e4c56433, Handshake 2025/04/30 13:30:15 client Long Header{Type: Handshake, DestConnectionID: 83978e9ed854c717ac0665735a257484, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 13:30:15 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:15 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:15 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:15 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:15 client Dropping Handshake keys. 2025/04/30 13:30:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 028e6edaa5b475d2c9d417324eb6d2d2, StatelessResetToken: 0x5f3c4eaefc1ed880646a2d1d2e9bfc22} 2025/04/30 13:30:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 3d604be7566770a7685dd8d88fd2a90e, StatelessResetToken: 0x616273fb6614796d7c242e04db11549a} 2025/04/30 13:30:15 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: c50287f376918de29e50232983da190f, StatelessResetToken: 0xcf21efb54c13acdead08d9f2d6a0f8bc} 2025/04/30 13:30:15 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:15 client -> Sending packet 1 (45 bytes) for connection a63dc8b559559c7885e9e4c56433, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:15 client Short Header{DestConnectionID: 028e6edaa5b475d2c9d417324eb6d2d2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:15 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 151.093µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:15 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:16 client <- Reading packet 1 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 26.008ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client newly acked packets (1): [1] 2025/04/30 13:30:16 client updated RTT: 37.662ms (σ: 15.732ms) 2025/04/30 13:30:16 client ECN capability confirmed. 2025/04/30 13:30:16 client lost packet 0 (time threshold) 2025/04/30 13:30:16 client Canceling loss detection timer. 2025/04/30 13:30:16 client Ignoring all packets below 1. 2025/04/30 13:30:16 client -> Sending packet 2 (54 bytes) for connection a63dc8b559559c7885e9e4c56433, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 028e6edaa5b475d2c9d417324eb6d2d2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:16 client -> Sending packet 4 (54 bytes) for connection a63dc8b559559c7885e9e4c56433, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 028e6edaa5b475d2c9d417324eb6d2d2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client -> Sending packet 5 (54 bytes) for connection a63dc8b559559c7885e9e4c56433, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 028e6edaa5b475d2c9d417324eb6d2d2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 440µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client newly acked packets (1): [5] 2025/04/30 13:30:16 client updated RTT: 36.954ms (σ: 13.214ms) 2025/04/30 13:30:16 client Canceling loss detection timer. 2025/04/30 13:30:16 client -> Sending packet 6 (1366 bytes) for connection a63dc8b559559c7885e9e4c56433, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 028e6edaa5b475d2c9d417324eb6d2d2, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.PingFrame{} 2025/04/30 13:30:16 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 1.24ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:16 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:16 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:16 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:16 client -> Sending packet 7 (43 bytes) for connection a63dc8b559559c7885e9e4c56433, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 028e6edaa5b475d2c9d417324eb6d2d2, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 39.16µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:16 client -> Sending packet 8 (38 bytes) for connection a63dc8b559559c7885e9e4c56433, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 028e6edaa5b475d2c9d417324eb6d2d2, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:16 client Connection a63dc8b559559c7885e9e4c56433 closed. 2025/04/30 13:30:16 Requesting https://server4:443/dkgyctvrww. 2025/04/30 13:30:16 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:16 Increased send buffer size to 14336 kiB 2025/04/30 13:30:16 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:16 Created qlog file: /logs/qlog/923455c74ccd66556801870e75d45964b43e.sqlog 2025/04/30 13:30:16 client Starting new connection to server4 ([::]:59969 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 923455c74ccd66556801870e75d45964b43e, version v1 2025/04/30 13:30:16 Adding connection ID (empty). 2025/04/30 13:30:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:16 client -> Sending packet 0 (1280 bytes) for connection 923455c74ccd66556801870e75d45964b43e, Initial 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: 923455c74ccd66556801870e75d45964b43e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:16 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:16 client -> Sending packet 1 (1280 bytes) for connection 923455c74ccd66556801870e75d45964b43e, Initial 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: 923455c74ccd66556801870e75d45964b43e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:16 client -> Sending packet 2 (1280 bytes) for connection 923455c74ccd66556801870e75d45964b43e, Initial 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: 923455c74ccd66556801870e75d45964b43e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:16 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:16 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d9bc8371ccf17532d1839421a34988f1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:16 client Received first packet. Switching destination connection ID to: d9bc8371ccf17532d1839421a34988f1 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.76ms} 2025/04/30 13:30:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:16 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d9bc8371ccf17532d1839421a34988f1, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 694, Offset + Data length: 694} 2025/04/30 13:30:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 923455c74ccd66556801870e75d45964b43e, InitialSourceConnectionID: d9bc8371ccf17532d1839421a34988f1, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 923455c74ccd66556801870e75d45964b43e 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: d9bc8371ccf17532d1839421a34988f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: d9bc8371ccf17532d1839421a34988f1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:16 client Dropping Initial keys. 2025/04/30 13:30:16 client -> Sending packet 1 (105 bytes) for connection 923455c74ccd66556801870e75d45964b43e, Handshake 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: d9bc8371ccf17532d1839421a34988f1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client Short Header{DestConnectionID: d9bc8371ccf17532d1839421a34988f1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 13:30:16 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:16 client Dropping Handshake keys. 2025/04/30 13:30:16 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:16 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:16 client -> Sending packet 1 (1366 bytes) for connection 923455c74ccd66556801870e75d45964b43e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: d9bc8371ccf17532d1839421a34988f1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.PingFrame{} 2025/04/30 13:30:16 client -> Sending packet 2 (43 bytes) for connection 923455c74ccd66556801870e75d45964b43e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: d9bc8371ccf17532d1839421a34988f1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 164.849µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:16 client -> Sending packet 3 (38 bytes) for connection 923455c74ccd66556801870e75d45964b43e, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: d9bc8371ccf17532d1839421a34988f1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:16 client Connection 923455c74ccd66556801870e75d45964b43e closed. 2025/04/30 13:30:16 Requesting https://server4:443/bamkettsgg. 2025/04/30 13:30:16 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:16 Increased send buffer size to 14336 kiB 2025/04/30 13:30:16 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:16 Created qlog file: /logs/qlog/9382ac432429b1175afa940555836f7e3658ef.sqlog 2025/04/30 13:30:16 client Starting new connection to server4 ([::]:47581 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 9382ac432429b1175afa940555836f7e3658ef, version v1 2025/04/30 13:30:16 Adding connection ID (empty). 2025/04/30 13:30:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:16 client -> Sending packet 0 (1280 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, Initial 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: 9382ac432429b1175afa940555836f7e3658ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 13:30:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 273, Offset + Data length: 273} 2025/04/30 13:30:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:16 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:16 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d0c2268abbaf28fe150b4f62d678c3d0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:16 client Received first packet. Switching destination connection ID to: d0c2268abbaf28fe150b4f62d678c3d0 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.856ms} 2025/04/30 13:30:16 client newly acked packets (1): [0] 2025/04/30 13:30:16 client updated RTT: 34.538199ms (σ: 17.269099ms) 2025/04/30 13:30:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:16 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d0c2268abbaf28fe150b4f62d678c3d0, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:30:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 9382ac432429b1175afa940555836f7e3658ef, InitialSourceConnectionID: d0c2268abbaf28fe150b4f62d678c3d0, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: d0c2268abbaf28fe150b4f62d678c3d0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: d0c2268abbaf28fe150b4f62d678c3d0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:16 client Dropping Initial keys. 2025/04/30 13:30:16 client -> Sending packet 1 (51 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, Handshake 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: d0c2268abbaf28fe150b4f62d678c3d0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client -> Sending packet 0 (54 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: d0c2268abbaf28fe150b4f62d678c3d0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:16 client Dropping Handshake keys. 2025/04/30 13:30:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 025480aad64aa340ca56efc097f95ce7, StatelessResetToken: 0xbb54db0eff6dd6cf1e216b25535a45e4} 2025/04/30 13:30:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 265f3cbc5bbec1a04309953a77c4a1c0, StatelessResetToken: 0xb3996d5edb364b234c5aa618f8f52735} 2025/04/30 13:30:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: de0469bee8b54fdc32c0bcda2fa5e8e1, StatelessResetToken: 0x43bc093c4a8d6c7ceb357629cc9d8a62} 2025/04/30 13:30:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:16 client -> Sending packet 1 (45 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 161.139µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:16 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:16 client -> Sending packet 2 (45 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 67.126µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:16 client -> Sending packet 4 (54 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client Skipping packet number 3 2025/04/30 13:30:16 client -> Sending packet 5 (37 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:16 client <- Reading packet 5 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 106.304ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client <- &wire.PingFrame{} 2025/04/30 13:30:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:16 client -> Sending packet 6 (47 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88.045µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 106.304ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client <- &wire.PingFrame{} 2025/04/30 13:30:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:16 client -> Sending packet 7 (49 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 84.713µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 168µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client newly acked packets (1): [5] 2025/04/30 13:30:16 client updated RTT: 34.142ms (σ: 13.741ms) 2025/04/30 13:30:16 client ECN capability confirmed. 2025/04/30 13:30:16 client setting loss timer for packet 4 (1-RTT) to 38.40975ms (in 2025-04-30 13:30:16.711528656 +0000 UTC m=+22.246480628) 2025/04/30 13:30:16 client Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 13:30:16.711528656 +0000 UTC m=+22.246480628 2025/04/30 13:30:16 client lost packet 4 (time threshold) 2025/04/30 13:30:16 client Canceling loss detection timer. 2025/04/30 13:30:16 client -> Sending packet 8 (54 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:16 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 92.4ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client <- &wire.PingFrame{} 2025/04/30 13:30:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:16 client <- Reading packet 13 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 92.4ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client <- &wire.PingFrame{} 2025/04/30 13:30:16 client -> Sending packet 9 (1366 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.PingFrame{} 2025/04/30 13:30:16 client -> Sending packet 10 (53 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 189.466µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client <- Reading packet 14 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 816µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client newly acked packets (1): [9] 2025/04/30 13:30:16 client lost packet 8 (time threshold) 2025/04/30 13:30:16 client Canceling loss detection timer. 2025/04/30 13:30:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:16 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:16 client -> Sending packet 11 (72 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 113.853µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:16 client -> Sending packet 12 (38 bytes) for connection 9382ac432429b1175afa940555836f7e3658ef, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: 025480aad64aa340ca56efc097f95ce7, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:16 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:16 client Connection 9382ac432429b1175afa940555836f7e3658ef closed. 2025/04/30 13:30:16 Requesting https://server4:443/matsjhwldu. 2025/04/30 13:30:16 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:16 Increased send buffer size to 14336 kiB 2025/04/30 13:30:16 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:16 Created qlog file: /logs/qlog/8d45a2c6755d7471d6078e64d5a7a389ae24.sqlog 2025/04/30 13:30:16 client Starting new connection to server4 ([::]:58562 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 8d45a2c6755d7471d6078e64d5a7a389ae24, version v1 2025/04/30 13:30:16 Adding connection ID (empty). 2025/04/30 13:30:16 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:16 client -> Sending packet 0 (1280 bytes) for connection 8d45a2c6755d7471d6078e64d5a7a389ae24, Initial 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: 8d45a2c6755d7471d6078e64d5a7a389ae24, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:16 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:16 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9baa4f1dddc694db739b790a3693ad97, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:16 client Received first packet. Switching destination connection ID to: 9baa4f1dddc694db739b790a3693ad97 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.928ms} 2025/04/30 13:30:16 client newly acked packets (1): [0] 2025/04/30 13:30:16 client updated RTT: 34.209987ms (σ: 17.104993ms) 2025/04/30 13:30:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:16 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:16 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9baa4f1dddc694db739b790a3693ad97, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:16 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:30:16 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:16 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 8d45a2c6755d7471d6078e64d5a7a389ae24, InitialSourceConnectionID: 9baa4f1dddc694db739b790a3693ad97, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:16 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8d45a2c6755d7471d6078e64d5a7a389ae24 2025/04/30 13:30:16 client Long Header{Type: Initial, DestConnectionID: 9baa4f1dddc694db739b790a3693ad97, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: 9baa4f1dddc694db739b790a3693ad97, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:16 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:16 client Dropping Initial keys. 2025/04/30 13:30:16 client -> Sending packet 1 (105 bytes) for connection 8d45a2c6755d7471d6078e64d5a7a389ae24, Handshake 2025/04/30 13:30:16 client Long Header{Type: Handshake, DestConnectionID: 9baa4f1dddc694db739b790a3693ad97, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client Short Header{DestConnectionID: 9baa4f1dddc694db739b790a3693ad97, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:16 client Dropping Handshake keys. 2025/04/30 13:30:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: f4956bfe224f5ec9ee52b501f32ccf6a, StatelessResetToken: 0xae6c23fe060f7951a22ad9e33297f390} 2025/04/30 13:30:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 9d8022a797217d27098cba4e4037d5f9, StatelessResetToken: 0x550d3c78c1c02758e00039bf7ba480b5} 2025/04/30 13:30:16 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 66d0634805218fd63f736b31603152dd, StatelessResetToken: 0x9060bd0ab11e3b53332e50dea9c7bc8f} 2025/04/30 13:30:16 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:16 client -> Sending packet 1 (45 bytes) for connection 8d45a2c6755d7471d6078e64d5a7a389ae24, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: f4956bfe224f5ec9ee52b501f32ccf6a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 135.213µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:16 client <- Reading packet 1 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 24.728ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:16 client newly acked packets (1): [1] 2025/04/30 13:30:16 client updated RTT: 36.925ms (σ: 18.26ms) 2025/04/30 13:30:16 client ECN capability confirmed. 2025/04/30 13:30:16 client lost packet 0 (time threshold) 2025/04/30 13:30:16 client Canceling loss detection timer. 2025/04/30 13:30:16 client Ignoring all packets below 1. 2025/04/30 13:30:16 client -> Sending packet 2 (54 bytes) for connection 8d45a2c6755d7471d6078e64d5a7a389ae24, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: f4956bfe224f5ec9ee52b501f32ccf6a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:16 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:16 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:16 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:16 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:16 client -> Sending packet 3 (45 bytes) for connection 8d45a2c6755d7471d6078e64d5a7a389ae24, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:16 client Short Header{DestConnectionID: f4956bfe224f5ec9ee52b501f32ccf6a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:16 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 118.773µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client <- Reading packet 4 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 5.744ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client newly acked packets (1): [2] 2025/04/30 13:30:17 client Canceling loss detection timer. 2025/04/30 13:30:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:17 client -> Sending packet 4 (38 bytes) for connection 8d45a2c6755d7471d6078e64d5a7a389ae24, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: f4956bfe224f5ec9ee52b501f32ccf6a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:17 client Connection 8d45a2c6755d7471d6078e64d5a7a389ae24 closed. 2025/04/30 13:30:17 Requesting https://server4:443/mvleuqhckx. 2025/04/30 13:30:17 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:17 Increased send buffer size to 14336 kiB 2025/04/30 13:30:17 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:17 Created qlog file: /logs/qlog/ca292b217352de77a60f21d6899c.sqlog 2025/04/30 13:30:17 client Starting new connection to server4 ([::]:58858 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ca292b217352de77a60f21d6899c, version v1 2025/04/30 13:30:17 Adding connection ID (empty). 2025/04/30 13:30:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:17 client -> Sending packet 0 (1280 bytes) for connection ca292b217352de77a60f21d6899c, Initial 2025/04/30 13:30:17 client Long Header{Type: Initial, DestConnectionID: ca292b217352de77a60f21d6899c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:30:17 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:17 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: caaff65f5bcd44feb9080b2535209602, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:17 client Received first packet. Switching destination connection ID to: caaff65f5bcd44feb9080b2535209602 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.848ms} 2025/04/30 13:30:17 client newly acked packets (1): [0] 2025/04/30 13:30:17 client updated RTT: 34.22748ms (σ: 17.11374ms) 2025/04/30 13:30:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:17 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:17 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: caaff65f5bcd44feb9080b2535209602, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/04/30 13:30:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ca292b217352de77a60f21d6899c, InitialSourceConnectionID: caaff65f5bcd44feb9080b2535209602, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ca292b217352de77a60f21d6899c 2025/04/30 13:30:17 client Long Header{Type: Initial, DestConnectionID: caaff65f5bcd44feb9080b2535209602, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client Long Header{Type: Handshake, DestConnectionID: caaff65f5bcd44feb9080b2535209602, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:17 client Dropping Initial keys. 2025/04/30 13:30:17 client -> Sending packet 1 (105 bytes) for connection ca292b217352de77a60f21d6899c, Handshake 2025/04/30 13:30:17 client Long Header{Type: Handshake, DestConnectionID: caaff65f5bcd44feb9080b2535209602, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client Short Header{DestConnectionID: caaff65f5bcd44feb9080b2535209602, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:17 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.384ms} 2025/04/30 13:30:17 client Peer doesn't await address validation any longer. 2025/04/30 13:30:17 client newly acked packets (1): [0] 2025/04/30 13:30:17 client updated RTT: 34.185ms (σ: 12.918ms) 2025/04/30 13:30:17 client Canceling loss detection timer. 2025/04/30 13:30:17 client Dropping Handshake keys. 2025/04/30 13:30:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, StatelessResetToken: 0x4b53ba81d3a0b72613c4f8ed07662ae2} 2025/04/30 13:30:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 03e7d31600665f35d60a87357445ac64, StatelessResetToken: 0x61dddff386ceeb5a869b099e20f46da8} 2025/04/30 13:30:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: c18d33e157284437c1b8da58db8541ee, StatelessResetToken: 0xdeaa5c28be0e12f2d24d1ac65a02244b} 2025/04/30 13:30:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:17 client -> Sending packet 1 (45 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 163.506µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:17 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:17 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:17 client Sending ACK because the ACK timer expired. 2025/04/30 13:30:17 client -> Sending packet 2 (44 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.238486ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:17 client -> Sending packet 4 (37 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:17 client -> Sending packet 5 (37 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:17 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 77.192ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client <- &wire.PingFrame{} 2025/04/30 13:30:17 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:17 client -> Sending packet 6 (45 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 102.692µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client <- Reading packet 9 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 121.576ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client <- &wire.PingFrame{} 2025/04/30 13:30:17 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:17 client -> Sending packet 7 (1366 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.PingFrame{} 2025/04/30 13:30:17 client -> Sending packet 8 (47 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 194.414µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 992µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client newly acked packets (1): [7] 2025/04/30 13:30:17 client ECN capability confirmed. 2025/04/30 13:30:17 client lost packet 5 (time threshold) 2025/04/30 13:30:17 client Canceling loss detection timer. 2025/04/30 13:30:17 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:17 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:17 client -> Sending packet 9 (51 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 130.986µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:17 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:17 client -> Sending packet 10 (38 bytes) for connection ca292b217352de77a60f21d6899c, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 24ef38bc17cb2a07155cd1bc493d0f1d, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:17 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:17 client Connection ca292b217352de77a60f21d6899c closed. 2025/04/30 13:30:17 Requesting https://server4:443/netkoawuey. 2025/04/30 13:30:17 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:17 Increased send buffer size to 14336 kiB 2025/04/30 13:30:17 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:17 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:17 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:17 Created qlog file: /logs/qlog/f2d611d445840940c20224a1cf5cbae5d0d3.sqlog 2025/04/30 13:30:17 client Starting new connection to server4 ([::]:49532 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f2d611d445840940c20224a1cf5cbae5d0d3, version v1 2025/04/30 13:30:17 Adding connection ID (empty). 2025/04/30 13:30:17 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:17 client -> Sending packet 0 (1280 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, Initial 2025/04/30 13:30:17 client Long Header{Type: Initial, DestConnectionID: f2d611d445840940c20224a1cf5cbae5d0d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:17 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:17 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:17 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:17 client Received first packet. Switching destination connection ID to: 9a22207ab77aba3c5c578bdde8f8e9d9 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.016ms} 2025/04/30 13:30:17 client newly acked packets (1): [0] 2025/04/30 13:30:17 client updated RTT: 34.18019ms (σ: 17.090095ms) 2025/04/30 13:30:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:17 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:17 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:17 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:17 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:17 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:17 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:30:17 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:17 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:17 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f2d611d445840940c20224a1cf5cbae5d0d3, InitialSourceConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:17 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3 2025/04/30 13:30:17 client Long Header{Type: Initial, DestConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client Long Header{Type: Handshake, DestConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:17 client Dropping Initial keys. 2025/04/30 13:30:17 client -> Sending packet 1 (51 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, Handshake 2025/04/30 13:30:17 client Long Header{Type: Handshake, DestConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client -> Sending packet 0 (54 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:17 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:17 client -> Sending packet 2 (82 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, Handshake 2025/04/30 13:30:17 client Long Header{Type: Handshake, DestConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:17 client -> Sending packet 3 (82 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, Handshake 2025/04/30 13:30:17 client Long Header{Type: Handshake, DestConnectionID: 9a22207ab77aba3c5c578bdde8f8e9d9, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:17 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:17 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:17 client Dropping Handshake keys. 2025/04/30 13:30:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: fb449df4a270b73fcac0df9fa10d96b8, StatelessResetToken: 0xe170cacae392d73eb8300f5a114303a6} 2025/04/30 13:30:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: b4bcdfaaf3edb3574c98777ac67d40eb, StatelessResetToken: 0xd127962dae95d56cbf3326fd921bb17f} 2025/04/30 13:30:17 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 77f4ed06c810098bfc304826393b70da, StatelessResetToken: 0x156ef6f4e0bfafe6825105f507564758} 2025/04/30 13:30:17 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:17 client -> Sending packet 2 (64 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.604µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:17 client -> Sending packet 3 (56 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:17 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.072ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:17 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:17 client Sending ACK because the ACK timer expired. 2025/04/30 13:30:17 client -> Sending packet 4 (44 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.349985ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:17 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:17 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:30:17 client -> Sending packet 6 (56 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:17 client -> Sending packet 7 (56 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:17 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:17 client -> Sending packet 8 (1366 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:17 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:17 client -> &wire.PingFrame{} 2025/04/30 13:30:17 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 432µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client newly acked packets (1): [7] 2025/04/30 13:30:17 client updated RTT: 33.916ms (σ: 13.344ms) 2025/04/30 13:30:17 client ECN capability confirmed. 2025/04/30 13:30:17 client Canceling loss detection timer. 2025/04/30 13:30:17 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:17 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:17 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 25.504ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:17 client newly acked packets (1): [8] 2025/04/30 13:30:17 client updated RTT: 33.809ms (σ: 10.22ms) 2025/04/30 13:30:18 client <- Reading packet 10 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 137.536ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- &wire.PingFrame{} 2025/04/30 13:30:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:18 client <- Reading packet 12 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 137.536ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- &wire.PingFrame{} 2025/04/30 13:30:18 client -> Sending packet 9 (1409 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.PingFrame{} 2025/04/30 13:30:18 client -> Sending packet 10 (49 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 202.62µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- Reading packet 17 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 115.92ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client newly acked packets (1): [9] 2025/04/30 13:30:18 client <- &wire.PingFrame{} 2025/04/30 13:30:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:18 client -> Sending packet 11 (51 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 0, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 1, Smallest: 0}}, DelayTime: 113.202µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- Reading packet 18 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 544µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:18 client -> Sending packet 12 (1430 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.PingFrame{} 2025/04/30 13:30:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:18 client -> Sending packet 13 (38 bytes) for connection f2d611d445840940c20224a1cf5cbae5d0d3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: fb449df4a270b73fcac0df9fa10d96b8, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:18 client Connection f2d611d445840940c20224a1cf5cbae5d0d3 closed. 2025/04/30 13:30:18 Requesting https://server4:443/rwiusorsdr. 2025/04/30 13:30:18 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:18 Increased send buffer size to 14336 kiB 2025/04/30 13:30:18 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:18 Created qlog file: /logs/qlog/f43834852e514bbeecfd4264f24758.sqlog 2025/04/30 13:30:18 client Starting new connection to server4 ([::]:58246 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f43834852e514bbeecfd4264f24758, version v1 2025/04/30 13:30:18 Adding connection ID (empty). 2025/04/30 13:30:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:18 client -> Sending packet 0 (1280 bytes) for connection f43834852e514bbeecfd4264f24758, Initial 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: f43834852e514bbeecfd4264f24758, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:30:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:18 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:18 client -> Sending packet 1 (1280 bytes) for connection f43834852e514bbeecfd4264f24758, Initial 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: f43834852e514bbeecfd4264f24758, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:30:18 client -> Sending packet 2 (1280 bytes) for connection f43834852e514bbeecfd4264f24758, Initial 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: f43834852e514bbeecfd4264f24758, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 13:30:18 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:18 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c6b59fa2909380b8101e97605217d841, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:18 client Received first packet. Switching destination connection ID to: c6b59fa2909380b8101e97605217d841 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 12.192ms} 2025/04/30 13:30:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:18 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:18 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c6b59fa2909380b8101e97605217d841, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 692, Offset + Data length: 692} 2025/04/30 13:30:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f43834852e514bbeecfd4264f24758, InitialSourceConnectionID: c6b59fa2909380b8101e97605217d841, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f43834852e514bbeecfd4264f24758 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: c6b59fa2909380b8101e97605217d841, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client Long Header{Type: Handshake, DestConnectionID: c6b59fa2909380b8101e97605217d841, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:18 client Dropping Initial keys. 2025/04/30 13:30:18 client -> Sending packet 1 (105 bytes) for connection f43834852e514bbeecfd4264f24758, Handshake 2025/04/30 13:30:18 client Long Header{Type: Handshake, DestConnectionID: c6b59fa2909380b8101e97605217d841, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client Short Header{DestConnectionID: c6b59fa2909380b8101e97605217d841, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:18 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:18 client -> Sending packet 2 (82 bytes) for connection f43834852e514bbeecfd4264f24758, Handshake 2025/04/30 13:30:18 client Long Header{Type: Handshake, DestConnectionID: c6b59fa2909380b8101e97605217d841, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:18 client -> Sending packet 3 (82 bytes) for connection f43834852e514bbeecfd4264f24758, Handshake 2025/04/30 13:30:18 client Long Header{Type: Handshake, DestConnectionID: c6b59fa2909380b8101e97605217d841, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:18 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:18 client Dropping Handshake keys. 2025/04/30 13:30:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 5b8aa10dbc1e1d41aa3821211330429e, StatelessResetToken: 0xabcc9434b56b9105eb7536ee47c8b984} 2025/04/30 13:30:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 179ef96a2e4ea9b1df8e1a5a726c8122, StatelessResetToken: 0xef0d81d89abf85f90e3d46fba549326a} 2025/04/30 13:30:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 7cd18555f69004a3df779d83403c7b11, StatelessResetToken: 0x22d2e514a383eb5fd79d57d4f11cfe70} 2025/04/30 13:30:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:18 client -> Sending packet 2 (64 bytes) for connection f43834852e514bbeecfd4264f24758, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 5b8aa10dbc1e1d41aa3821211330429e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 218.229µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:18 client -> Sending packet 3 (56 bytes) for connection f43834852e514bbeecfd4264f24758, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 5b8aa10dbc1e1d41aa3821211330429e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:18 client -> Sending packet 4 (1366 bytes) for connection f43834852e514bbeecfd4264f24758, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 5b8aa10dbc1e1d41aa3821211330429e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.PingFrame{} 2025/04/30 13:30:18 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 1.032ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client newly acked packets (1): [3] 2025/04/30 13:30:18 client updated RTT: 33.320546ms (σ: 16.660273ms) 2025/04/30 13:30:18 client ECN capability confirmed. 2025/04/30 13:30:18 client Canceling loss detection timer. 2025/04/30 13:30:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:18 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:18 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:18 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:18 client -> Sending packet 5 (43 bytes) for connection f43834852e514bbeecfd4264f24758, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 5b8aa10dbc1e1d41aa3821211330429e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 211.216µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:18 client -> Sending packet 6 (38 bytes) for connection f43834852e514bbeecfd4264f24758, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 5b8aa10dbc1e1d41aa3821211330429e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:18 client Connection f43834852e514bbeecfd4264f24758 closed. 2025/04/30 13:30:18 Requesting https://server4:443/jrbtweoagx. 2025/04/30 13:30:18 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:18 Increased send buffer size to 14336 kiB 2025/04/30 13:30:18 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:18 Created qlog file: /logs/qlog/2ca16171b1512fed.sqlog 2025/04/30 13:30:18 client Starting new connection to server4 ([::]:54387 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 2ca16171b1512fed, version v1 2025/04/30 13:30:18 Adding connection ID (empty). 2025/04/30 13:30:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:18 client -> Sending packet 0 (1280 bytes) for connection 2ca16171b1512fed, Initial 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: 2ca16171b1512fed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:30:18 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:18 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 09acd9a066ea23478734cdb1d1f62a43, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:18 client Received first packet. Switching destination connection ID to: 09acd9a066ea23478734cdb1d1f62a43 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.928ms} 2025/04/30 13:30:18 client newly acked packets (1): [0] 2025/04/30 13:30:18 client updated RTT: 34.169669ms (σ: 17.084834ms) 2025/04/30 13:30:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:18 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:18 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:18 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:18 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:18 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 09acd9a066ea23478734cdb1d1f62a43, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:18 client <- &wire.CryptoFrame{Offset: 0, Data length: 685, Offset + Data length: 685} 2025/04/30 13:30:18 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:18 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:18 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 2ca16171b1512fed, InitialSourceConnectionID: 09acd9a066ea23478734cdb1d1f62a43, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:18 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2ca16171b1512fed 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: 09acd9a066ea23478734cdb1d1f62a43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client Long Header{Type: Handshake, DestConnectionID: 09acd9a066ea23478734cdb1d1f62a43, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:18 client Dropping Initial keys. 2025/04/30 13:30:18 client -> Sending packet 1 (105 bytes) for connection 2ca16171b1512fed, Handshake 2025/04/30 13:30:18 client Long Header{Type: Handshake, DestConnectionID: 09acd9a066ea23478734cdb1d1f62a43, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client Short Header{DestConnectionID: 09acd9a066ea23478734cdb1d1f62a43, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:18 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.224ms} 2025/04/30 13:30:18 client Peer doesn't await address validation any longer. 2025/04/30 13:30:18 client newly acked packets (1): [0] 2025/04/30 13:30:18 client updated RTT: 34.095ms (σ: 12.961ms) 2025/04/30 13:30:18 client Canceling loss detection timer. 2025/04/30 13:30:18 client Dropping Handshake keys. 2025/04/30 13:30:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 04b03f06b6371b3662a8ddcb8875714e, StatelessResetToken: 0xbcd8d0be0d87452043ef2f53e1fca155} 2025/04/30 13:30:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 01ba9b5a440d09bfbb455462c53851ea, StatelessResetToken: 0x246651e3881dad46a6442729aebd6204} 2025/04/30 13:30:18 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a1cdab15818ae19c8d819e6440c5d70d, StatelessResetToken: 0xf4c8d8bc52c6fe5395f31dbbfed658a0} 2025/04/30 13:30:18 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:18 client -> Sending packet 1 (45 bytes) for connection 2ca16171b1512fed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 04b03f06b6371b3662a8ddcb8875714e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 179.566µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:18 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:18 client -> Sending packet 2 (45 bytes) for connection 2ca16171b1512fed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 04b03f06b6371b3662a8ddcb8875714e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 121.778µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:18 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:18 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:18 client -> Sending packet 4 (37 bytes) for connection 2ca16171b1512fed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 04b03f06b6371b3662a8ddcb8875714e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:18 client -> Sending packet 5 (37 bytes) for connection 2ca16171b1512fed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 04b03f06b6371b3662a8ddcb8875714e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:18 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client newly acked packets (1): [5] 2025/04/30 13:30:18 client updated RTT: 33.78ms (σ: 10.349ms) 2025/04/30 13:30:18 client ECN capability confirmed. 2025/04/30 13:30:18 client Canceling loss detection timer. 2025/04/30 13:30:18 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 7.888ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- &wire.PingFrame{} 2025/04/30 13:30:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:18 client -> Sending packet 6 (49 bytes) for connection 2ca16171b1512fed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 04b03f06b6371b3662a8ddcb8875714e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 77.074µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 7.888ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- &wire.PingFrame{} 2025/04/30 13:30:18 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:18 client -> Sending packet 7 (51 bytes) for connection 2ca16171b1512fed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 04b03f06b6371b3662a8ddcb8875714e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 141.506µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- Reading packet 9 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:18 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:18 client <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 800µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:18 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:18 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:18 client -> Sending packet 8 (1366 bytes) for connection 2ca16171b1512fed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 04b03f06b6371b3662a8ddcb8875714e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.PingFrame{} 2025/04/30 13:30:18 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:18 client -> Sending packet 9 (38 bytes) for connection 2ca16171b1512fed, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:18 client Short Header{DestConnectionID: 04b03f06b6371b3662a8ddcb8875714e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:18 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:18 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:18 client Connection 2ca16171b1512fed closed. 2025/04/30 13:30:18 Requesting https://server4:443/fwdtgqildc. 2025/04/30 13:30:18 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:18 Increased send buffer size to 14336 kiB 2025/04/30 13:30:18 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:18 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:18 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:18 Created qlog file: /logs/qlog/93ff6f006aab45abe38f2ad1886be1b4.sqlog 2025/04/30 13:30:18 client Starting new connection to server4 ([::]:45429 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 93ff6f006aab45abe38f2ad1886be1b4, version v1 2025/04/30 13:30:18 Adding connection ID (empty). 2025/04/30 13:30:18 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:18 client -> Sending packet 0 (1280 bytes) for connection 93ff6f006aab45abe38f2ad1886be1b4, Initial 2025/04/30 13:30:18 client Long Header{Type: Initial, DestConnectionID: 93ff6f006aab45abe38f2ad1886be1b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:18 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:30:19 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:19 client -> Sending packet 1 (1280 bytes) for connection 93ff6f006aab45abe38f2ad1886be1b4, Initial 2025/04/30 13:30:19 client Long Header{Type: Initial, DestConnectionID: 93ff6f006aab45abe38f2ad1886be1b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:30:19 client -> Sending packet 2 (1280 bytes) for connection 93ff6f006aab45abe38f2ad1886be1b4, Initial 2025/04/30 13:30:19 client Long Header{Type: Initial, DestConnectionID: 93ff6f006aab45abe38f2ad1886be1b4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:30:19 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:19 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f983b3fa741a811daf63711b9edde068, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:19 client Received first packet. Switching destination connection ID to: f983b3fa741a811daf63711b9edde068 2025/04/30 13:30:19 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 13.008ms} 2025/04/30 13:30:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:19 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:19 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f983b3fa741a811daf63711b9edde068, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 693, Offset + Data length: 693} 2025/04/30 13:30:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 93ff6f006aab45abe38f2ad1886be1b4, InitialSourceConnectionID: f983b3fa741a811daf63711b9edde068, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 93ff6f006aab45abe38f2ad1886be1b4 2025/04/30 13:30:19 client Long Header{Type: Initial, DestConnectionID: f983b3fa741a811daf63711b9edde068, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: f983b3fa741a811daf63711b9edde068, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:19 client Dropping Initial keys. 2025/04/30 13:30:19 client -> Sending packet 1 (105 bytes) for connection 93ff6f006aab45abe38f2ad1886be1b4, Handshake 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: f983b3fa741a811daf63711b9edde068, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:19 client Short Header{DestConnectionID: f983b3fa741a811daf63711b9edde068, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:19 client <- Reading packet 0 (133 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:19 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.488ms} 2025/04/30 13:30:19 client Peer doesn't await address validation any longer. 2025/04/30 13:30:19 client newly acked packets (1): [0] 2025/04/30 13:30:19 client updated RTT: 34.050547ms (σ: 17.025273ms) 2025/04/30 13:30:19 client Canceling loss detection timer. 2025/04/30 13:30:19 client Dropping Handshake keys. 2025/04/30 13:30:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 4e3e056a79505dd053a347f5d1c52436, StatelessResetToken: 0xc9158004b8b6e9eae29dfd24a0e38b64} 2025/04/30 13:30:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 1032116b9f51927f51b1b10f77c9f2ad, StatelessResetToken: 0x995236a8f1ff7ec44fcd108f7bc8bee7} 2025/04/30 13:30:19 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: c0751efc793c1adedd9b195b9d4bdb5b, StatelessResetToken: 0xe6df9828c80aab34dbbbe02190c41e70} 2025/04/30 13:30:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:19 client -> Sending packet 1 (45 bytes) for connection 93ff6f006aab45abe38f2ad1886be1b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: 4e3e056a79505dd053a347f5d1c52436, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 206.657µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:19 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:19 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:19 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:19 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:19 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:19 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:19 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:19 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:19 client -> Sending packet 2 (43 bytes) for connection 93ff6f006aab45abe38f2ad1886be1b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: 4e3e056a79505dd053a347f5d1c52436, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 170.5µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:19 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:19 client -> Sending packet 3 (38 bytes) for connection 93ff6f006aab45abe38f2ad1886be1b4, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: 4e3e056a79505dd053a347f5d1c52436, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:19 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:19 client Connection 93ff6f006aab45abe38f2ad1886be1b4 closed. 2025/04/30 13:30:19 Requesting https://server4:443/nmqwntgctj. 2025/04/30 13:30:19 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:19 Increased send buffer size to 14336 kiB 2025/04/30 13:30:19 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:19 Created qlog file: /logs/qlog/d88ecde4f533fb74fff9bf.sqlog 2025/04/30 13:30:19 client Starting new connection to server4 ([::]:55300 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d88ecde4f533fb74fff9bf, version v1 2025/04/30 13:30:19 Adding connection ID (empty). 2025/04/30 13:30:19 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:19 client -> Sending packet 0 (1280 bytes) for connection d88ecde4f533fb74fff9bf, Initial 2025/04/30 13:30:19 client Long Header{Type: Initial, DestConnectionID: d88ecde4f533fb74fff9bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:19 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:19 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:19 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f64fc59ace3bd40c59722c4ac8725891, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:19 client Received first packet. Switching destination connection ID to: f64fc59ace3bd40c59722c4ac8725891 2025/04/30 13:30:19 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.76ms} 2025/04/30 13:30:19 client newly acked packets (1): [0] 2025/04/30 13:30:19 client updated RTT: 34.555438ms (σ: 17.277719ms) 2025/04/30 13:30:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:19 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:19 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:19 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:19 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f64fc59ace3bd40c59722c4ac8725891, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:19 client <- &wire.CryptoFrame{Offset: 0, Data length: 689, Offset + Data length: 689} 2025/04/30 13:30:19 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:19 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:19 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d88ecde4f533fb74fff9bf, InitialSourceConnectionID: f64fc59ace3bd40c59722c4ac8725891, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:19 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d88ecde4f533fb74fff9bf 2025/04/30 13:30:19 client Long Header{Type: Initial, DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:19 client Dropping Initial keys. 2025/04/30 13:30:19 client -> Sending packet 1 (51 bytes) for connection d88ecde4f533fb74fff9bf, Handshake 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:19 client -> Sending packet 0 (54 bytes) for connection d88ecde4f533fb74fff9bf, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:19 client -> Sending packet 2 (82 bytes) for connection d88ecde4f533fb74fff9bf, Handshake 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:19 client -> Sending packet 3 (82 bytes) for connection d88ecde4f533fb74fff9bf, Handshake 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:19 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 13:30:19 client -> Sending packet 4 (82 bytes) for connection d88ecde4f533fb74fff9bf, Handshake 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:19 client -> Sending packet 5 (82 bytes) for connection d88ecde4f533fb74fff9bf, Handshake 2025/04/30 13:30:19 client Long Header{Type: Handshake, DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:19 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:19 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:19 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:19 client Dropping Handshake keys. 2025/04/30 13:30:19 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:19 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:19 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:19 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:19 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:19 client -> Sending packet 2 (64 bytes) for connection d88ecde4f533fb74fff9bf, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 138.759µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:19 client -> Sending packet 3 (54 bytes) for connection d88ecde4f533fb74fff9bf, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:19 client <- Reading packet 11 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:19 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:19 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:19 client -> Sending packet 4 (47 bytes) for connection d88ecde4f533fb74fff9bf, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 94.556µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:19 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:19 client <- Reading packet 14 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:19 client Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:19 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 107.12ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:19 client newly acked packets (1): [3] 2025/04/30 13:30:19 client ECN capability confirmed. 2025/04/30 13:30:19 client Canceling loss detection timer. 2025/04/30 13:30:19 client <- &wire.PingFrame{} 2025/04/30 13:30:19 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:19 client -> Sending packet 5 (1366 bytes) for connection d88ecde4f533fb74fff9bf, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.PingFrame{} 2025/04/30 13:30:19 client -> Sending packet 6 (49 bytes) for connection d88ecde4f533fb74fff9bf, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:19 client Short Header{DestConnectionID: f64fc59ace3bd40c59722c4ac8725891, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:19 client -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 6, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 218.937µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:20 client <- Reading packet 17 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:20 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:20 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 776µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:20 client newly acked packets (1): [5] 2025/04/30 13:30:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 3579afe4102a336161a6a672e20f5b35, StatelessResetToken: 0x4ae0f864cad68bdec70c7d4285e6bc7a} 2025/04/30 13:30:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: c8333471c593c0fd463412cce42c7707, StatelessResetToken: 0x168aabfa1fd9b4582d6ab7f17fbac3bc} 2025/04/30 13:30:20 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: b9eccfc3bc9fe65c485b1c514db3ad9e, StatelessResetToken: 0xefe67b753782b846fb5f47ebd3d76090} 2025/04/30 13:30:20 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:20 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:20 client -> Sending packet 7 (53 bytes) for connection d88ecde4f533fb74fff9bf, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:20 client Short Header{DestConnectionID: 3579afe4102a336161a6a672e20f5b35, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:20 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 6, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 185.215µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:20 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:20 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:20 client -> Sending packet 8 (38 bytes) for connection d88ecde4f533fb74fff9bf, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:20 client Short Header{DestConnectionID: 3579afe4102a336161a6a672e20f5b35, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:20 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:20 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:20 client Connection d88ecde4f533fb74fff9bf closed. 2025/04/30 13:30:20 Requesting https://server4:443/gzxafyiwxz. 2025/04/30 13:30:20 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:20 Increased send buffer size to 14336 kiB 2025/04/30 13:30:20 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:20 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:20 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:20 Created qlog file: /logs/qlog/b9c37b567bbffab28c0c397d4dd0260c81e05c04.sqlog 2025/04/30 13:30:20 client Starting new connection to server4 ([::]:40155 -> 193.167.100.100:443), source connection ID (empty), destination connection ID b9c37b567bbffab28c0c397d4dd0260c81e05c04, version v1 2025/04/30 13:30:20 Adding connection ID (empty). 2025/04/30 13:30:20 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:20 client -> Sending packet 0 (1280 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, Initial 2025/04/30 13:30:20 client Long Header{Type: Initial, DestConnectionID: b9c37b567bbffab28c0c397d4dd0260c81e05c04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:20 client -> Sending packet 1 (1280 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, Initial 2025/04/30 13:30:20 client Long Header{Type: Initial, DestConnectionID: b9c37b567bbffab28c0c397d4dd0260c81e05c04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:20 client -> Sending packet 2 (1280 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, Initial 2025/04/30 13:30:20 client Long Header{Type: Initial, DestConnectionID: b9c37b567bbffab28c0c397d4dd0260c81e05c04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:20 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:20 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 74085086691fa150cb2c67992faf0078, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:20 client Received first packet. Switching destination connection ID to: 74085086691fa150cb2c67992faf0078 2025/04/30 13:30:20 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.528ms} 2025/04/30 13:30:20 client newly acked packets (1): [2] 2025/04/30 13:30:20 client updated RTT: 35.111856ms (σ: 17.555928ms) 2025/04/30 13:30:20 client -> Sending packet 3 (1280 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, Initial 2025/04/30 13:30:20 client Long Header{Type: Initial, DestConnectionID: 74085086691fa150cb2c67992faf0078, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:20 client -> &wire.PingFrame{} 2025/04/30 13:30:20 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:30:20 client -> Sending packet 4 (1280 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, Initial 2025/04/30 13:30:20 client Long Header{Type: Initial, DestConnectionID: 74085086691fa150cb2c67992faf0078, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:20 client -> &wire.PingFrame{} 2025/04/30 13:30:20 client -> Sending packet 5 (1280 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, Initial 2025/04/30 13:30:20 client Long Header{Type: Initial, DestConnectionID: 74085086691fa150cb2c67992faf0078, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:20 client -> &wire.PingFrame{} 2025/04/30 13:30:20 client <- Reading packet 3 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:20 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 74085086691fa150cb2c67992faf0078, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:20 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 2.912ms} 2025/04/30 13:30:20 client newly acked packets (1): [5] 2025/04/30 13:30:20 client updated RTT: 35.079ms (σ: 13.229ms) 2025/04/30 13:30:21 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:21 client <- Reading packet 7 (147 bytes) for connection (empty), Initial 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 74085086691fa150cb2c67992faf0078, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 1.0524s} 2025/04/30 13:30:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:21 client <- Reading packet 4 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 74085086691fa150cb2c67992faf0078, PacketNumber: 4, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:30:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: b9c37b567bbffab28c0c397d4dd0260c81e05c04, InitialSourceConnectionID: 74085086691fa150cb2c67992faf0078, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: 74085086691fa150cb2c67992faf0078, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 74085086691fa150cb2c67992faf0078, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:21 client Dropping Initial keys. 2025/04/30 13:30:21 client -> Sending packet 1 (51 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 74085086691fa150cb2c67992faf0078, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client -> Sending packet 0 (54 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 74085086691fa150cb2c67992faf0078, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:21 client Dropping Handshake keys. 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e9f53bfb717d13aaefafa926ba1bc69c, StatelessResetToken: 0x3bbc845780345d0da99f347a657b3ef3} 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: eb3683760f504120ccac7968a30d34e3, StatelessResetToken: 0x9c43a5643005b6b55ad9f981ba5f509f} 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 7aece4b6db8fe3bf3a9f835d6ee44b85, StatelessResetToken: 0xce7982ddceb15519d4b24f1c72864a72} 2025/04/30 13:30:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:21 client -> Sending packet 1 (45 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: e9f53bfb717d13aaefafa926ba1bc69c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 173.403µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:21 client <- Reading packet 1 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 25.096ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client newly acked packets (1): [1] 2025/04/30 13:30:21 client updated RTT: 37.782ms (σ: 15.329ms) 2025/04/30 13:30:21 client ECN capability confirmed. 2025/04/30 13:30:21 client lost packet 0 (time threshold) 2025/04/30 13:30:21 client Canceling loss detection timer. 2025/04/30 13:30:21 client Ignoring all packets below 1. 2025/04/30 13:30:21 client -> Sending packet 2 (54 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: e9f53bfb717d13aaefafa926ba1bc69c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 client <- Reading packet 2 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 896µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client newly acked packets (1): [2] 2025/04/30 13:30:21 client updated RTT: 37.209ms (σ: 12.642ms) 2025/04/30 13:30:21 client Canceling loss detection timer. 2025/04/30 13:30:21 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:21 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:21 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:21 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:21 client -> Sending packet 3 (43 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: e9f53bfb717d13aaefafa926ba1bc69c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 166.871µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:21 client -> Sending packet 4 (38 bytes) for connection b9c37b567bbffab28c0c397d4dd0260c81e05c04, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: e9f53bfb717d13aaefafa926ba1bc69c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:21 client Connection b9c37b567bbffab28c0c397d4dd0260c81e05c04 closed. 2025/04/30 13:30:21 Requesting https://server4:443/ajwmtmogir. 2025/04/30 13:30:21 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:21 Increased send buffer size to 14336 kiB 2025/04/30 13:30:21 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:21 Created qlog file: /logs/qlog/bb042288189503b3f45f37806f11bebe.sqlog 2025/04/30 13:30:21 client Starting new connection to server4 ([::]:33584 -> 193.167.100.100:443), source connection ID (empty), destination connection ID bb042288189503b3f45f37806f11bebe, version v1 2025/04/30 13:30:21 Adding connection ID (empty). 2025/04/30 13:30:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:21 client -> Sending packet 0 (1280 bytes) for connection bb042288189503b3f45f37806f11bebe, Initial 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: bb042288189503b3f45f37806f11bebe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 13:30:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:21 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:21 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 33fc96f7629577dd879f40923bcf35f9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:21 client Received first packet. Switching destination connection ID to: 33fc96f7629577dd879f40923bcf35f9 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 11.992ms} 2025/04/30 13:30:21 client newly acked packets (1): [0] 2025/04/30 13:30:21 client updated RTT: 34.893975ms (σ: 17.446987ms) 2025/04/30 13:30:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:21 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 33fc96f7629577dd879f40923bcf35f9, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 692, Offset + Data length: 692} 2025/04/30 13:30:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: bb042288189503b3f45f37806f11bebe, InitialSourceConnectionID: 33fc96f7629577dd879f40923bcf35f9, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection bb042288189503b3f45f37806f11bebe 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: 33fc96f7629577dd879f40923bcf35f9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 33fc96f7629577dd879f40923bcf35f9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:21 client Dropping Initial keys. 2025/04/30 13:30:21 client -> Sending packet 1 (105 bytes) for connection bb042288189503b3f45f37806f11bebe, Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 33fc96f7629577dd879f40923bcf35f9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client Short Header{DestConnectionID: 33fc96f7629577dd879f40923bcf35f9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:21 client Dropping Handshake keys. 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 850b23c8b8a0f6908992c6c17b161328, StatelessResetToken: 0xefcc6b59783d132fd3a6e4cf1764203e} 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 70aa1df995287c31d71de2459eb3c4c0, StatelessResetToken: 0x5bebf2043a5080d4b60ede69af7eb46f} 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: f8e21f1464adf761c4a3ed4571c1b981, StatelessResetToken: 0x187a7bb58afe6308f48e79048e421bb1} 2025/04/30 13:30:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:21 client -> Sending packet 1 (45 bytes) for connection bb042288189503b3f45f37806f11bebe, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 850b23c8b8a0f6908992c6c17b161328, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 139.239µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:21 client -> Sending packet 3 (54 bytes) for connection bb042288189503b3f45f37806f11bebe, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 850b23c8b8a0f6908992c6c17b161328, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 client Skipping packet number 2 2025/04/30 13:30:21 client -> Sending packet 4 (37 bytes) for connection bb042288189503b3f45f37806f11bebe, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 850b23c8b8a0f6908992c6c17b161328, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:21 client <- Reading packet 3 (1057 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 1.312ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client newly acked packets (2): [3 4] 2025/04/30 13:30:21 client updated RTT: 34.722ms (σ: 13.425ms) 2025/04/30 13:30:21 client ECN capability confirmed. 2025/04/30 13:30:21 client Canceling loss detection timer. 2025/04/30 13:30:21 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:21 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:21 client -> Sending packet 5 (45 bytes) for connection bb042288189503b3f45f37806f11bebe, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 850b23c8b8a0f6908992c6c17b161328, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 183.522µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:21 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:21 client -> Sending packet 6 (38 bytes) for connection bb042288189503b3f45f37806f11bebe, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 850b23c8b8a0f6908992c6c17b161328, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:21 client Connection bb042288189503b3f45f37806f11bebe closed. 2025/04/30 13:30:21 Requesting https://server4:443/wjeqqnviyl. 2025/04/30 13:30:21 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:21 Increased send buffer size to 14336 kiB 2025/04/30 13:30:21 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:21 Created qlog file: /logs/qlog/ce322a587dae51f777470d344f366b3ad3.sqlog 2025/04/30 13:30:21 client Starting new connection to server4 ([::]:56911 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ce322a587dae51f777470d344f366b3ad3, version v1 2025/04/30 13:30:21 Adding connection ID (empty). 2025/04/30 13:30:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:21 client -> Sending packet 0 (1280 bytes) for connection ce322a587dae51f777470d344f366b3ad3, Initial 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: ce322a587dae51f777470d344f366b3ad3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 13:30:21 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:21 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 05c8d994d1425d8f75e0eb806b463654, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:21 client Received first packet. Switching destination connection ID to: 05c8d994d1425d8f75e0eb806b463654 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.6ms} 2025/04/30 13:30:21 client newly acked packets (1): [0] 2025/04/30 13:30:21 client updated RTT: 34.168094ms (σ: 17.084047ms) 2025/04/30 13:30:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:21 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 05c8d994d1425d8f75e0eb806b463654, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 693, Offset + Data length: 693} 2025/04/30 13:30:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ce322a587dae51f777470d344f366b3ad3, InitialSourceConnectionID: 05c8d994d1425d8f75e0eb806b463654, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ce322a587dae51f777470d344f366b3ad3 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: 05c8d994d1425d8f75e0eb806b463654, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 05c8d994d1425d8f75e0eb806b463654, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:21 client Dropping Initial keys. 2025/04/30 13:30:21 client -> Sending packet 1 (51 bytes) for connection ce322a587dae51f777470d344f366b3ad3, Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 05c8d994d1425d8f75e0eb806b463654, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client -> Sending packet 0 (54 bytes) for connection ce322a587dae51f777470d344f366b3ad3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 05c8d994d1425d8f75e0eb806b463654, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:21 client -> Sending packet 2 (82 bytes) for connection ce322a587dae51f777470d344f366b3ad3, Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 05c8d994d1425d8f75e0eb806b463654, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:21 client -> Sending packet 3 (82 bytes) for connection ce322a587dae51f777470d344f366b3ad3, Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 05c8d994d1425d8f75e0eb806b463654, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:21 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:21 client Dropping Handshake keys. 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: b7a34fe5ee125f2ee1e9e0b496863134, StatelessResetToken: 0x159030181b901ac6eda94c48f97e0808} 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5c394d2ebab77c1be9a1bdeb2c276d0d, StatelessResetToken: 0x9df6024f6d3b43a1032be391aead7e46} 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: fd50ebe99ccd62b7a2e2429162e41a7f, StatelessResetToken: 0x2ddb58dddb164fbcccd10b59235b2c4c} 2025/04/30 13:30:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:21 client -> Sending packet 2 (64 bytes) for connection ce322a587dae51f777470d344f366b3ad3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: b7a34fe5ee125f2ee1e9e0b496863134, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 145.491µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 client -> Sending packet 3 (56 bytes) for connection ce322a587dae51f777470d344f366b3ad3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: b7a34fe5ee125f2ee1e9e0b496863134, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 115.192ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client <- &wire.PingFrame{} 2025/04/30 13:30:21 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:21 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 115.192ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client <- &wire.PingFrame{} 2025/04/30 13:30:21 client -> Sending packet 4 (47 bytes) for connection ce322a587dae51f777470d344f366b3ad3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: b7a34fe5ee125f2ee1e9e0b496863134, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 127.818µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client <- Reading packet 7 (1054 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 432µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:21 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:21 client -> Sending packet 5 (1366 bytes) for connection ce322a587dae51f777470d344f366b3ad3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: b7a34fe5ee125f2ee1e9e0b496863134, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.PingFrame{} 2025/04/30 13:30:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:21 client -> Sending packet 6 (38 bytes) for connection ce322a587dae51f777470d344f366b3ad3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: b7a34fe5ee125f2ee1e9e0b496863134, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:21 client Connection ce322a587dae51f777470d344f366b3ad3 closed. 2025/04/30 13:30:21 Requesting https://server4:443/hilclthshh. 2025/04/30 13:30:21 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:21 Increased send buffer size to 14336 kiB 2025/04/30 13:30:21 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:21 Created qlog file: /logs/qlog/7896aecf669ddebb1c48dfcd43.sqlog 2025/04/30 13:30:21 client Starting new connection to server4 ([::]:35102 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 7896aecf669ddebb1c48dfcd43, version v1 2025/04/30 13:30:21 Adding connection ID (empty). 2025/04/30 13:30:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:21 client -> Sending packet 0 (1280 bytes) for connection 7896aecf669ddebb1c48dfcd43, Initial 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: 7896aecf669ddebb1c48dfcd43, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 13:30:21 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:21 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:21 client Received first packet. Switching destination connection ID to: 21596e12ba8d46f812bad2e419b7d6cb 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.672ms} 2025/04/30 13:30:21 client newly acked packets (1): [0] 2025/04/30 13:30:21 client updated RTT: 34.754843ms (σ: 17.377421ms) 2025/04/30 13:30:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:21 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:21 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:21 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/04/30 13:30:21 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:21 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 7896aecf669ddebb1c48dfcd43, InitialSourceConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:21 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7896aecf669ddebb1c48dfcd43 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:21 client Dropping Initial keys. 2025/04/30 13:30:21 client -> Sending packet 1 (105 bytes) for connection 7896aecf669ddebb1c48dfcd43, Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client Short Header{DestConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:21 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:21 client -> Sending packet 2 (82 bytes) for connection 7896aecf669ddebb1c48dfcd43, Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:21 client -> Sending packet 3 (82 bytes) for connection 7896aecf669ddebb1c48dfcd43, Handshake 2025/04/30 13:30:21 client Long Header{Type: Handshake, DestConnectionID: 21596e12ba8d46f812bad2e419b7d6cb, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:21 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:21 client Dropping Handshake keys. 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 8e1f3233a7080c0941a1c3d03e7bcb84, StatelessResetToken: 0x37b4751638004940b519e01f9be6f3fc} 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 831be673b32f1b150f67a32df7827710, StatelessResetToken: 0x401ec0c8e7d75cb4802474c86b728119} 2025/04/30 13:30:21 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a720c040e5a15191005061333de7297a, StatelessResetToken: 0xdf590d608593a90ef664e0caddc94c4b} 2025/04/30 13:30:21 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:21 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:21 client -> Sending packet 2 (64 bytes) for connection 7896aecf669ddebb1c48dfcd43, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 8e1f3233a7080c0941a1c3d03e7bcb84, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 155.299µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 client -> Sending packet 3 (56 bytes) for connection 7896aecf669ddebb1c48dfcd43, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 8e1f3233a7080c0941a1c3d03e7bcb84, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:21 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:21 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.024ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:21 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:21 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:21 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:21 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:21 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:21 client -> Sending packet 4 (43 bytes) for connection 7896aecf669ddebb1c48dfcd43, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 8e1f3233a7080c0941a1c3d03e7bcb84, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 131.395µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:21 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:21 client -> Sending packet 5 (38 bytes) for connection 7896aecf669ddebb1c48dfcd43, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:21 client Short Header{DestConnectionID: 8e1f3233a7080c0941a1c3d03e7bcb84, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:21 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:21 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:21 client Connection 7896aecf669ddebb1c48dfcd43 closed. 2025/04/30 13:30:21 Requesting https://server4:443/gprukcidxx. 2025/04/30 13:30:21 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:21 Increased send buffer size to 14336 kiB 2025/04/30 13:30:21 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:21 Created qlog file: /logs/qlog/caa6a20a6c8a26f052d8e019287cc968f96a.sqlog 2025/04/30 13:30:21 client Starting new connection to server4 ([::]:50412 -> 193.167.100.100:443), source connection ID (empty), destination connection ID caa6a20a6c8a26f052d8e019287cc968f96a, version v1 2025/04/30 13:30:21 Adding connection ID (empty). 2025/04/30 13:30:21 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:21 client -> Sending packet 0 (1280 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a, Initial 2025/04/30 13:30:21 client Long Header{Type: Initial, DestConnectionID: caa6a20a6c8a26f052d8e019287cc968f96a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:21 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:30:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:22 client -> Sending packet 1 (1280 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a, Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: caa6a20a6c8a26f052d8e019287cc968f96a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:30:22 client -> Sending packet 2 (1280 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a, Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: caa6a20a6c8a26f052d8e019287cc968f96a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 13:30:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 13:30:22 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:22 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b05c5d38cb0df3e1355d6027da77161, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:22 client Received first packet. Switching destination connection ID to: 3b05c5d38cb0df3e1355d6027da77161 2025/04/30 13:30:22 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 13.76ms} 2025/04/30 13:30:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:22 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:22 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:22 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:22 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:22 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3b05c5d38cb0df3e1355d6027da77161, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:22 client <- &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 13:30:22 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:22 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:22 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: caa6a20a6c8a26f052d8e019287cc968f96a, InitialSourceConnectionID: 3b05c5d38cb0df3e1355d6027da77161, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:22 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: 3b05c5d38cb0df3e1355d6027da77161, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:22 client Long Header{Type: Handshake, DestConnectionID: 3b05c5d38cb0df3e1355d6027da77161, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:22 client Dropping Initial keys. 2025/04/30 13:30:22 client -> Sending packet 1 (51 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a, Handshake 2025/04/30 13:30:22 client Long Header{Type: Handshake, DestConnectionID: 3b05c5d38cb0df3e1355d6027da77161, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:22 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:22 client -> Sending packet 0 (54 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:22 client Short Header{DestConnectionID: 3b05c5d38cb0df3e1355d6027da77161, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:22 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:22 client Dropping %!s(logging.PacketType=0) packet (1200 bytes) because we already dropped the keys. 2025/04/30 13:30:22 client <- Reading packet 1 (1047 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:22 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:22 client Dropping Handshake keys. 2025/04/30 13:30:22 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:22 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:22 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:22 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:22 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:22 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:22 client -> Sending packet 1 (1366 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:22 client Short Header{DestConnectionID: 3b05c5d38cb0df3e1355d6027da77161, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:22 client -> &wire.PingFrame{} 2025/04/30 13:30:22 client -> Sending packet 2 (43 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:22 client Short Header{DestConnectionID: 3b05c5d38cb0df3e1355d6027da77161, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:22 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 172.992µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:22 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:22 client -> Sending packet 3 (38 bytes) for connection caa6a20a6c8a26f052d8e019287cc968f96a, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:22 client Short Header{DestConnectionID: 3b05c5d38cb0df3e1355d6027da77161, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:22 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:22 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:22 client Connection caa6a20a6c8a26f052d8e019287cc968f96a closed. 2025/04/30 13:30:22 Requesting https://server4:443/kvenqsejyd. 2025/04/30 13:30:22 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:22 Increased send buffer size to 14336 kiB 2025/04/30 13:30:22 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:22 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:22 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:22 Created qlog file: /logs/qlog/ac74d1f84958c174e120dce2c083.sqlog 2025/04/30 13:30:22 client Starting new connection to server4 ([::]:52308 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ac74d1f84958c174e120dce2c083, version v1 2025/04/30 13:30:22 Adding connection ID (empty). 2025/04/30 13:30:22 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:22 client -> Sending packet 0 (1280 bytes) for connection ac74d1f84958c174e120dce2c083, Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: ac74d1f84958c174e120dce2c083, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:22 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:22 client -> Sending packet 1 (1280 bytes) for connection ac74d1f84958c174e120dce2c083, Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: ac74d1f84958c174e120dce2c083, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:22 client -> Sending packet 2 (1280 bytes) for connection ac74d1f84958c174e120dce2c083, Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: ac74d1f84958c174e120dce2c083, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:22 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:30:22 client -> Sending packet 3 (1280 bytes) for connection ac74d1f84958c174e120dce2c083, Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: ac74d1f84958c174e120dce2c083, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:22 client -> Sending packet 4 (1280 bytes) for connection ac74d1f84958c174e120dce2c083, Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: ac74d1f84958c174e120dce2c083, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 13:30:22 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:22 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:22 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:22 client Received first packet. Switching destination connection ID to: 23dbc7833efa4fbbc958d9886f1624a5 2025/04/30 13:30:22 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 3.504ms} 2025/04/30 13:30:22 client newly acked packets (1): [4] 2025/04/30 13:30:22 client updated RTT: 35.022428ms (σ: 17.511214ms) 2025/04/30 13:30:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:23 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1051 bytes. 2025/04/30 13:30:23 client <- Reading packet 6 (149 bytes) for connection (empty), Initial 2025/04/30 13:30:23 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 123, Version: v1} 2025/04/30 13:30:23 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 3.186288s} 2025/04/30 13:30:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:23 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:23 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:23 client Parsed a coalesced packet. Part 2: 1051 bytes. Remaining: 0 bytes. 2025/04/30 13:30:23 client <- Reading packet 4 (1051 bytes) for connection (empty), Handshake 2025/04/30 13:30:23 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, PacketNumber: 4, PacketNumberLen: 1, Length: 1026, Version: v1} 2025/04/30 13:30:23 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:30:23 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:23 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:23 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ac74d1f84958c174e120dce2c083, InitialSourceConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:23 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ac74d1f84958c174e120dce2c083 2025/04/30 13:30:23 client Long Header{Type: Initial, DestConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:23 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:23 client Long Header{Type: Handshake, DestConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:23 client Dropping Initial keys. 2025/04/30 13:30:23 client -> Sending packet 1 (51 bytes) for connection ac74d1f84958c174e120dce2c083, Handshake 2025/04/30 13:30:23 client Long Header{Type: Handshake, DestConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:23 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:23 client -> Sending packet 0 (54 bytes) for connection ac74d1f84958c174e120dce2c083, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:23 client Short Header{DestConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:23 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:23 client -> Sending packet 2 (82 bytes) for connection ac74d1f84958c174e120dce2c083, Handshake 2025/04/30 13:30:23 client Long Header{Type: Handshake, DestConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:23 client -> Sending packet 3 (82 bytes) for connection ac74d1f84958c174e120dce2c083, Handshake 2025/04/30 13:30:23 client Long Header{Type: Handshake, DestConnectionID: 23dbc7833efa4fbbc958d9886f1624a5, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:23 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:23 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:23 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:23 client Dropping Handshake keys. 2025/04/30 13:30:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 4f08a856db65193f38c5eaf960baf8d7, StatelessResetToken: 0x02a8c6b66c889deb27495d2f2a5f45a7} 2025/04/30 13:30:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 57bb90ef93be1ace17346d8acf2f9787, StatelessResetToken: 0x5e2eefd64eabcdd227d3fa93a81ffb5b} 2025/04/30 13:30:23 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 8779eb8c75009aca43de2e32ddffc2c5, StatelessResetToken: 0x45a2ad0e60960627276cda9115f2d9cf} 2025/04/30 13:30:23 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:23 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:23 client -> Sending packet 2 (64 bytes) for connection ac74d1f84958c174e120dce2c083, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:23 client Short Header{DestConnectionID: 4f08a856db65193f38c5eaf960baf8d7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:23 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 186.279µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:23 client -> Sending packet 3 (56 bytes) for connection ac74d1f84958c174e120dce2c083, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:23 client Short Header{DestConnectionID: 4f08a856db65193f38c5eaf960baf8d7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:23 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:23 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:23 client <- Reading packet 1 (1055 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:23 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:23 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.064ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:23 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:23 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:23 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:23 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:23 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:23 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:23 client -> Sending packet 4 (43 bytes) for connection ac74d1f84958c174e120dce2c083, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:23 client Short Header{DestConnectionID: 4f08a856db65193f38c5eaf960baf8d7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:23 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 145.773µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:23 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:23 client -> Sending packet 5 (38 bytes) for connection ac74d1f84958c174e120dce2c083, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:23 client Short Header{DestConnectionID: 4f08a856db65193f38c5eaf960baf8d7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:23 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:23 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:23 client Connection ac74d1f84958c174e120dce2c083 closed. 2025/04/30 13:30:23 Requesting https://server4:443/exxagmqrdr. 2025/04/30 13:30:23 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:23 Increased send buffer size to 14336 kiB 2025/04/30 13:30:23 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:23 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:23 Created qlog file: /logs/qlog/88b27127ed1326d17cc162ec4ac8a69110df4c01.sqlog 2025/04/30 13:30:23 client Starting new connection to server4 ([::]:45147 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 88b27127ed1326d17cc162ec4ac8a69110df4c01, version v1 2025/04/30 13:30:23 Adding connection ID (empty). 2025/04/30 13:30:23 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:23 client -> Sending packet 0 (1280 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, Initial 2025/04/30 13:30:23 client Long Header{Type: Initial, DestConnectionID: 88b27127ed1326d17cc162ec4ac8a69110df4c01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:23 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:23 client -> Sending packet 1 (1280 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, Initial 2025/04/30 13:30:23 client Long Header{Type: Initial, DestConnectionID: 88b27127ed1326d17cc162ec4ac8a69110df4c01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:23 client -> Sending packet 2 (1280 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, Initial 2025/04/30 13:30:23 client Long Header{Type: Initial, DestConnectionID: 88b27127ed1326d17cc162ec4ac8a69110df4c01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:23 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:23 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/04/30 13:30:24 client -> Sending packet 3 (1280 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, Initial 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: 88b27127ed1326d17cc162ec4ac8a69110df4c01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:24 client -> Sending packet 4 (1280 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, Initial 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: 88b27127ed1326d17cc162ec4ac8a69110df4c01, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:24 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1e73196e9cebaffddcbaf379121b61b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:24 client Received first packet. Switching destination connection ID to: c1e73196e9cebaffddcbaf379121b61b 2025/04/30 13:30:24 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 3.392ms} 2025/04/30 13:30:24 client newly acked packets (1): [4] 2025/04/30 13:30:24 client updated RTT: 35.000537ms (σ: 17.500268ms) 2025/04/30 13:30:24 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:24 client Parsed a coalesced packet. Part 1: 147 bytes. Remaining: 1053 bytes. 2025/04/30 13:30:24 client <- Reading packet 3 (147 bytes) for connection (empty), Initial 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1e73196e9cebaffddcbaf379121b61b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 121, Version: v1} 2025/04/30 13:30:24 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 3.192272s} 2025/04/30 13:30:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Parsed a coalesced packet. Part 2: 1053 bytes. Remaining: 0 bytes. 2025/04/30 13:30:24 client <- Reading packet 2 (1053 bytes) for connection (empty), Handshake 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c1e73196e9cebaffddcbaf379121b61b, PacketNumber: 2, PacketNumberLen: 1, Length: 1028, Version: v1} 2025/04/30 13:30:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:30:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 88b27127ed1326d17cc162ec4ac8a69110df4c01, InitialSourceConnectionID: c1e73196e9cebaffddcbaf379121b61b, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: c1e73196e9cebaffddcbaf379121b61b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: c1e73196e9cebaffddcbaf379121b61b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:24 client Dropping Initial keys. 2025/04/30 13:30:24 client -> Sending packet 1 (105 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, Handshake 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: c1e73196e9cebaffddcbaf379121b61b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client Short Header{DestConnectionID: c1e73196e9cebaffddcbaf379121b61b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:24 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:24 client -> Sending packet 2 (82 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, Handshake 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: c1e73196e9cebaffddcbaf379121b61b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:24 client -> Sending packet 3 (82 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, Handshake 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: c1e73196e9cebaffddcbaf379121b61b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:24 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:24 client Dropping Handshake keys. 2025/04/30 13:30:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:24 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:24 client -> Sending packet 2 (62 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: c1e73196e9cebaffddcbaf379121b61b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 151.534µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:24 client -> Sending packet 3 (54 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: c1e73196e9cebaffddcbaf379121b61b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:24 client <- Reading packet 5 (135 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 784µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client newly acked packets (1): [3] 2025/04/30 13:30:24 client updated RTT: 34.657ms (σ: 13.811ms) 2025/04/30 13:30:24 client ECN capability confirmed. 2025/04/30 13:30:24 client Canceling loss detection timer. 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 384bfafc4acad7b1ff6a160d39739de4, StatelessResetToken: 0xf6ba9fcd482844a92247b124fef69e5a} 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: b76dae24a86c44cd8befc4ec1efaa41b, StatelessResetToken: 0x72f975d754fe6cabd81410673d9b1bf7} 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 71cd767bbcbf78d5bf36585d76293e61, StatelessResetToken: 0x693c0f952065ffe346c5ad06ce58c9c1} 2025/04/30 13:30:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:24 client -> Sending packet 4 (45 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 384bfafc4acad7b1ff6a160d39739de4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 160.36µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:24 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:24 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:24 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:24 client -> Sending packet 5 (43 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 384bfafc4acad7b1ff6a160d39739de4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, DelayTime: 31.262µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:24 client -> Sending packet 6 (38 bytes) for connection 88b27127ed1326d17cc162ec4ac8a69110df4c01, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 384bfafc4acad7b1ff6a160d39739de4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:24 client Connection 88b27127ed1326d17cc162ec4ac8a69110df4c01 closed. 2025/04/30 13:30:24 Requesting https://server4:443/ondpidiftv. 2025/04/30 13:30:24 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:24 Increased send buffer size to 14336 kiB 2025/04/30 13:30:24 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:24 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:24 Created qlog file: /logs/qlog/ef45654372161f9bbdd4e4d071206ffabbf0ddf3.sqlog 2025/04/30 13:30:24 client Starting new connection to server4 ([::]:50009 -> 193.167.100.100:443), source connection ID (empty), destination connection ID ef45654372161f9bbdd4e4d071206ffabbf0ddf3, version v1 2025/04/30 13:30:24 Adding connection ID (empty). 2025/04/30 13:30:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:24 client -> Sending packet 0 (1280 bytes) for connection ef45654372161f9bbdd4e4d071206ffabbf0ddf3, Initial 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: ef45654372161f9bbdd4e4d071206ffabbf0ddf3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 13:30:24 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:24 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2a1ad394540b8dad4a5fb41a2a4f630, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:24 client Received first packet. Switching destination connection ID to: b2a1ad394540b8dad4a5fb41a2a4f630 2025/04/30 13:30:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.192ms} 2025/04/30 13:30:24 client newly acked packets (1): [0] 2025/04/30 13:30:24 client updated RTT: 34.401325ms (σ: 17.200662ms) 2025/04/30 13:30:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:24 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2a1ad394540b8dad4a5fb41a2a4f630, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:30:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: ef45654372161f9bbdd4e4d071206ffabbf0ddf3, InitialSourceConnectionID: b2a1ad394540b8dad4a5fb41a2a4f630, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection ef45654372161f9bbdd4e4d071206ffabbf0ddf3 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: b2a1ad394540b8dad4a5fb41a2a4f630, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: b2a1ad394540b8dad4a5fb41a2a4f630, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:24 client Dropping Initial keys. 2025/04/30 13:30:24 client -> Sending packet 1 (105 bytes) for connection ef45654372161f9bbdd4e4d071206ffabbf0ddf3, Handshake 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: b2a1ad394540b8dad4a5fb41a2a4f630, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client Short Header{DestConnectionID: b2a1ad394540b8dad4a5fb41a2a4f630, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:24 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:24 client Dropping Handshake keys. 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d33e384c906db77fa02b7cb6c580e69e, StatelessResetToken: 0xb1d857ca8618cd5d9e327a5d95f8bc64} 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: faa2d31055b959b87f3621028788ddd7, StatelessResetToken: 0x842f7486978f5fc504288b6cec984f8e} 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 0a47f8fe9ab8e7c57d5b6188273b49ec, StatelessResetToken: 0x0c26e9e39dcde76bdea70be8cd5547cf} 2025/04/30 13:30:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:24 client -> Sending packet 1 (45 bytes) for connection ef45654372161f9bbdd4e4d071206ffabbf0ddf3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: d33e384c906db77fa02b7cb6c580e69e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 171.051µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:24 client <- Reading packet 1 (1053 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 672µs} 2025/04/30 13:30:24 client newly acked packets (1): [0] 2025/04/30 13:30:24 client updated RTT: 34.403ms (σ: 12.904ms) 2025/04/30 13:30:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:24 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:24 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:24 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:24 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:24 client -> Sending packet 2 (43 bytes) for connection ef45654372161f9bbdd4e4d071206ffabbf0ddf3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: d33e384c906db77fa02b7cb6c580e69e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 91.182µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:24 client -> Sending packet 3 (38 bytes) for connection ef45654372161f9bbdd4e4d071206ffabbf0ddf3, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: d33e384c906db77fa02b7cb6c580e69e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:24 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:24 client Connection ef45654372161f9bbdd4e4d071206ffabbf0ddf3 closed. 2025/04/30 13:30:24 Requesting https://server4:443/abhglmywsk. 2025/04/30 13:30:24 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:24 Increased send buffer size to 14336 kiB 2025/04/30 13:30:24 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:24 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:24 Created qlog file: /logs/qlog/f04b53ea3391f42a558e81ae798ffb2dc991dc90.sqlog 2025/04/30 13:30:24 client Starting new connection to server4 ([::]:43368 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f04b53ea3391f42a558e81ae798ffb2dc991dc90, version v1 2025/04/30 13:30:24 Adding connection ID (empty). 2025/04/30 13:30:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:24 client -> Sending packet 0 (1280 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, Initial 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: f04b53ea3391f42a558e81ae798ffb2dc991dc90, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 13:30:24 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:24 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 972e290084f737d8b3584c5b42b796ca, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:24 client Received first packet. Switching destination connection ID to: 972e290084f737d8b3584c5b42b796ca 2025/04/30 13:30:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.248ms} 2025/04/30 13:30:24 client newly acked packets (1): [0] 2025/04/30 13:30:24 client updated RTT: 34.349313ms (σ: 17.174656ms) 2025/04/30 13:30:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:24 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:24 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 972e290084f737d8b3584c5b42b796ca, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:24 client <- &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 13:30:24 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:24 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f04b53ea3391f42a558e81ae798ffb2dc991dc90, InitialSourceConnectionID: 972e290084f737d8b3584c5b42b796ca, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:24 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90 2025/04/30 13:30:24 client Long Header{Type: Initial, DestConnectionID: 972e290084f737d8b3584c5b42b796ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: 972e290084f737d8b3584c5b42b796ca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:24 client Dropping Initial keys. 2025/04/30 13:30:24 client -> Sending packet 1 (51 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, Handshake 2025/04/30 13:30:24 client Long Header{Type: Handshake, DestConnectionID: 972e290084f737d8b3584c5b42b796ca, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client -> Sending packet 0 (54 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 972e290084f737d8b3584c5b42b796ca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:24 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:24 client Dropping Handshake keys. 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, StatelessResetToken: 0x13264054aa8ee9d63266106816e8b032} 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 3bd221a865b1c909d93ea4a6fdebf385, StatelessResetToken: 0xda651e2c34c01964bc4be6cf23d3dcbf} 2025/04/30 13:30:24 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 951077cbf5790cd01389dc93cd23f678, StatelessResetToken: 0x6a0a4be082271a020881f830e4be9d21} 2025/04/30 13:30:24 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:24 client -> Sending packet 1 (45 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 132.158µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:24 client <- Reading packet 1 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 768µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client newly acked packets (1): [0] 2025/04/30 13:30:24 client updated RTT: 34.387ms (σ: 12.957ms) 2025/04/30 13:30:24 client ECN capability confirmed. 2025/04/30 13:30:24 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:24 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:24 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:24 client Sending ACK because the ACK timer expired. 2025/04/30 13:30:24 client -> Sending packet 2 (44 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.33105ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:24 client -> Sending packet 4 (37 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:24 client -> Sending packet 5 (37 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:24 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:24 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:24 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 77.264ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:24 client <- &wire.PingFrame{} 2025/04/30 13:30:24 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:24 client -> Sending packet 6 (45 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:24 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:24 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 143.028µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:25 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:25 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 13:30:25 client -> Sending packet 8 (37 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:25 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:25 client -> Sending packet 9 (37 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:25 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:25 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:25 client -> Sending packet 10 (1366 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:25 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:25 client -> &wire.PingFrame{} 2025/04/30 13:30:25 client <- Reading packet 9 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:25 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:25 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 24.848ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:30:25 client newly acked packets (2): [9 10] 2025/04/30 13:30:25 client updated RTT: 37.286ms (σ: 15.516ms) 2025/04/30 13:30:25 client Canceling loss detection timer. 2025/04/30 13:30:25 client <- Reading packet 17 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:25 client Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:25 client <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 574.192ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 13:30:25 client <- &wire.PingFrame{} 2025/04/30 13:30:25 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:25 client -> Sending packet 11 (1409 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:25 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:25 client -> &wire.PingFrame{} 2025/04/30 13:30:25 client -> Sending packet 12 (49 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:25 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:25 client -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 0, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 172.714µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:25 client <- Reading packet 18 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:25 client Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:25 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25.928ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:30:25 client newly acked packets (1): [11] 2025/04/30 13:30:25 client updated RTT: 39.962ms (σ: 16.989ms) 2025/04/30 13:30:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:26 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 13:30:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:26 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:27 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:28 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:28 Tracking 1 connection IDs and 1 reset tokens. 2025/04/30 13:30:28 client <- Reading packet 26 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:28 client Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:28 client <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 3.187016s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 13:30:28 client <- &wire.PingFrame{} 2025/04/30 13:30:28 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:28 client -> Sending packet 13 (1430 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:28 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:28 client -> &wire.PingFrame{} 2025/04/30 13:30:28 client -> Sending packet 14 (51 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:28 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:28 client -> &wire.AckFrame{LargestAcked: 26, LowestAcked: 0, AckRanges: {{Largest: 26, Smallest: 26}, {Largest: 18, Smallest: 17}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 200.847µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:29 client <- Reading packet 27 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:29 client Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:29 client <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 13, DelayTime: 944µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 13:30:29 client newly acked packets (1): [13] 2025/04/30 13:30:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:29 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:29 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:29 client -> Sending packet 15 (38 bytes) for connection f04b53ea3391f42a558e81ae798ffb2dc991dc90, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:29 client Short Header{DestConnectionID: 2fc3c9e4e5d3bc18c6b176e423c5e698, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:29 client Connection f04b53ea3391f42a558e81ae798ffb2dc991dc90 closed. 2025/04/30 13:30:29 Requesting https://server4:443/mbehxoorbx. 2025/04/30 13:30:29 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:29 Increased send buffer size to 14336 kiB 2025/04/30 13:30:29 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:29 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:29 Created qlog file: /logs/qlog/e425fd6da5bdd0b9.sqlog 2025/04/30 13:30:29 client Starting new connection to server4 ([::]:57859 -> 193.167.100.100:443), source connection ID (empty), destination connection ID e425fd6da5bdd0b9, version v1 2025/04/30 13:30:29 Adding connection ID (empty). 2025/04/30 13:30:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:29 client -> Sending packet 0 (1280 bytes) for connection e425fd6da5bdd0b9, Initial 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: e425fd6da5bdd0b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 13:30:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 270, Offset + Data length: 270} 2025/04/30 13:30:29 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:29 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 581fd2578dbc9f168dddd450d0400d25, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:29 client Received first packet. Switching destination connection ID to: 581fd2578dbc9f168dddd450d0400d25 2025/04/30 13:30:29 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.536ms} 2025/04/30 13:30:29 client newly acked packets (1): [0] 2025/04/30 13:30:29 client updated RTT: 34.420687ms (σ: 17.210343ms) 2025/04/30 13:30:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:29 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:29 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:29 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:29 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:29 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 581fd2578dbc9f168dddd450d0400d25, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:29 client <- &wire.CryptoFrame{Offset: 0, Data length: 685, Offset + Data length: 685} 2025/04/30 13:30:29 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:29 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:29 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: e425fd6da5bdd0b9, InitialSourceConnectionID: 581fd2578dbc9f168dddd450d0400d25, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:29 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection e425fd6da5bdd0b9 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: 581fd2578dbc9f168dddd450d0400d25, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:29 client Long Header{Type: Handshake, DestConnectionID: 581fd2578dbc9f168dddd450d0400d25, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:29 client Dropping Initial keys. 2025/04/30 13:30:29 client -> Sending packet 1 (51 bytes) for connection e425fd6da5bdd0b9, Handshake 2025/04/30 13:30:29 client Long Header{Type: Handshake, DestConnectionID: 581fd2578dbc9f168dddd450d0400d25, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:29 client -> Sending packet 0 (54 bytes) for connection e425fd6da5bdd0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:29 client Short Header{DestConnectionID: 581fd2578dbc9f168dddd450d0400d25, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:29 client <- Reading packet 0 (127 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:29 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:29 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:29 client Dropping Handshake keys. 2025/04/30 13:30:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 1cbd7fc3bfb41b3dd043cbdbf43aca78, StatelessResetToken: 0xb283a99fc00dcaa8624e42cc1e6bb156} 2025/04/30 13:30:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: dd2e1682529a031f60debacdf00e0689, StatelessResetToken: 0x37b93a2ccd16107bdba925fd7fbfa6a9} 2025/04/30 13:30:29 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: b71bd2aec9d9456e5843a941b78eed89, StatelessResetToken: 0xdca091cc62269748e5c6c4c23a5fec5f} 2025/04/30 13:30:29 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:29 client -> Sending packet 1 (45 bytes) for connection e425fd6da5bdd0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:29 client Short Header{DestConnectionID: 1cbd7fc3bfb41b3dd043cbdbf43aca78, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:29 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 175.669µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:29 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:29 client -> Sending packet 3 (54 bytes) for connection e425fd6da5bdd0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:29 client Short Header{DestConnectionID: 1cbd7fc3bfb41b3dd043cbdbf43aca78, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:29 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:29 client Skipping packet number 2 2025/04/30 13:30:29 client -> Sending packet 4 (37 bytes) for connection e425fd6da5bdd0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:29 client Short Header{DestConnectionID: 1cbd7fc3bfb41b3dd043cbdbf43aca78, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:29 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:29 client <- Reading packet 5 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:29 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:29 client <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 976µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:29 client newly acked packets (2): [3 4] 2025/04/30 13:30:29 client updated RTT: 34.311ms (σ: 13.125ms) 2025/04/30 13:30:29 client ECN capability confirmed. 2025/04/30 13:30:29 client Canceling loss detection timer. 2025/04/30 13:30:29 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:29 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:29 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:29 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:29 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:29 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:29 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:29 client -> Sending packet 5 (45 bytes) for connection e425fd6da5bdd0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:29 client Short Header{DestConnectionID: 1cbd7fc3bfb41b3dd043cbdbf43aca78, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:29 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 177.533µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:29 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:29 client -> Sending packet 6 (38 bytes) for connection e425fd6da5bdd0b9, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:29 client Short Header{DestConnectionID: 1cbd7fc3bfb41b3dd043cbdbf43aca78, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:29 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:29 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:29 client Connection e425fd6da5bdd0b9 closed. 2025/04/30 13:30:29 Requesting https://server4:443/vcfmuthgzl. 2025/04/30 13:30:29 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:29 Increased send buffer size to 14336 kiB 2025/04/30 13:30:29 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:29 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:29 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:29 Created qlog file: /logs/qlog/a562eb85a1467f7a4ae2.sqlog 2025/04/30 13:30:29 client Starting new connection to server4 ([::]:53965 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a562eb85a1467f7a4ae2, version v1 2025/04/30 13:30:29 Adding connection ID (empty). 2025/04/30 13:30:29 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:29 client -> Sending packet 0 (1280 bytes) for connection a562eb85a1467f7a4ae2, Initial 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: a562eb85a1467f7a4ae2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:29 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 13:30:29 client -> Sending packet 1 (1280 bytes) for connection a562eb85a1467f7a4ae2, Initial 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: a562eb85a1467f7a4ae2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:29 client -> Sending packet 2 (1280 bytes) for connection a562eb85a1467f7a4ae2, Initial 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: a562eb85a1467f7a4ae2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 13:30:29 client -> &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 13:30:29 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:29 client Received first packet. Switching destination connection ID to: 394a3152b91ff15852e39f4e07e9b7ca 2025/04/30 13:30:29 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.024ms} 2025/04/30 13:30:29 client <- Reading packet 2 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:29 client <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 2.048ms} 2025/04/30 13:30:29 client newly acked packets (1): [2] 2025/04/30 13:30:29 client updated RTT: 34.892175ms (σ: 17.446087ms) 2025/04/30 13:30:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:29 client -> Sending packet 3 (1280 bytes) for connection a562eb85a1467f7a4ae2, Initial 2025/04/30 13:30:29 client Long Header{Type: Initial, DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:29 client -> &wire.PingFrame{} 2025/04/30 13:30:29 Removing connection IDs [(empty)] for a closed connection after it has been retired. 2025/04/30 13:30:30 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 13:30:30 client -> Sending packet 4 (1280 bytes) for connection a562eb85a1467f7a4ae2, Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:30 client -> &wire.PingFrame{} 2025/04/30 13:30:30 client -> Sending packet 5 (1280 bytes) for connection a562eb85a1467f7a4ae2, Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:30 client -> &wire.PingFrame{} 2025/04/30 13:30:30 client <- Reading packet 5 (1200 bytes) for connection (empty), Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 1.664ms} 2025/04/30 13:30:30 client newly acked packets (1): [5] 2025/04/30 13:30:30 client updated RTT: 34.914ms (σ: 13.129ms) 2025/04/30 13:30:30 client <- &wire.PingFrame{} 2025/04/30 13:30:30 client -> Sending packet 6 (1280 bytes) for connection a562eb85a1467f7a4ae2, Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/04/30 13:30:30 client <- Reading packet 10 (145 bytes) for connection (empty), Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 119, Version: v1} 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 816.536ms} 2025/04/30 13:30:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:30 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/04/30 13:30:30 client <- Reading packet 4 (1055 bytes) for connection (empty), Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, PacketNumber: 4, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/04/30 13:30:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 688, Offset + Data length: 688} 2025/04/30 13:30:30 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a562eb85a1467f7a4ae2, InitialSourceConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:30 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a562eb85a1467f7a4ae2 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:30 client Dropping Initial keys. 2025/04/30 13:30:30 client -> Sending packet 1 (48 bytes) for connection a562eb85a1467f7a4ae2, Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 13:30:30 client -> Sending packet 0 (54 bytes) for connection a562eb85a1467f7a4ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:30 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:30 client Dropping Handshake keys. 2025/04/30 13:30:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:30 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:30 client -> Sending packet 1 (40 bytes) for connection a562eb85a1467f7a4ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 110.968µs} 2025/04/30 13:30:30 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:30 client -> Sending packet 3 (54 bytes) for connection a562eb85a1467f7a4ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:30 client -> Sending packet 4 (54 bytes) for connection a562eb85a1467f7a4ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:30 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 280µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 29.072ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client <- &wire.PingFrame{} 2025/04/30 13:30:30 client Queuing ACK because there's a new missing packet to report. 2025/04/30 13:30:30 client <- Reading packet 8 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 29.072ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client <- &wire.PingFrame{} 2025/04/30 13:30:30 client -> Sending packet 5 (46 bytes) for connection a562eb85a1467f7a4ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 394a3152b91ff15852e39f4e07e9b7ca, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 143.99µs} 2025/04/30 13:30:30 client <- Reading packet 9 (1200 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 552µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 1a884059f16cf4aebc7d9da66dfb47f5, StatelessResetToken: 0xf56c1daeb8c88e406a8f85b7c0e64e36} 2025/04/30 13:30:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 54b688c1fbbf3f7b616167462f857ffc, StatelessResetToken: 0xf0d6ccf81668c85b80d02dedbce35144} 2025/04/30 13:30:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 5407fc3ffcc7148f2330fcb085f0f133, StatelessResetToken: 0xea216f3fd1daeda9edd5622c799de8d1} 2025/04/30 13:30:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:30 client -> Sending packet 6 (48 bytes) for connection a562eb85a1467f7a4ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 1a884059f16cf4aebc7d9da66dfb47f5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 186.049µs} 2025/04/30 13:30:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:30 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:30 client -> Sending packet 7 (38 bytes) for connection a562eb85a1467f7a4ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 1a884059f16cf4aebc7d9da66dfb47f5, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:30 client Connection a562eb85a1467f7a4ae2 closed. 2025/04/30 13:30:30 Requesting https://server4:443/cfoxbzbfui. 2025/04/30 13:30:30 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:30 Increased send buffer size to 14336 kiB 2025/04/30 13:30:30 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:30 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:30 Created qlog file: /logs/qlog/f2b523164289620f8bc128a47a3a3c4dda21feda.sqlog 2025/04/30 13:30:30 client Starting new connection to server4 ([::]:56912 -> 193.167.100.100:443), source connection ID (empty), destination connection ID f2b523164289620f8bc128a47a3a3c4dda21feda, version v1 2025/04/30 13:30:30 Adding connection ID (empty). 2025/04/30 13:30:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:30 client -> Sending packet 0 (1280 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: f2b523164289620f8bc128a47a3a3c4dda21feda, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 13:30:30 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:30 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:30 client Received first packet. Switching destination connection ID to: 04e4d3e5be985b92ec12d6dba845e25e 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10.528ms} 2025/04/30 13:30:30 client newly acked packets (1): [0] 2025/04/30 13:30:30 client updated RTT: 34.441998ms (σ: 17.220999ms) 2025/04/30 13:30:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:30 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:30 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 13:30:30 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: f2b523164289620f8bc128a47a3a3c4dda21feda, InitialSourceConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:30 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:30 client Dropping Initial keys. 2025/04/30 13:30:30 client -> Sending packet 1 (51 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client -> Sending packet 0 (54 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:30 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:30 client -> Sending packet 2 (82 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:30 client -> Sending packet 3 (82 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:30 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:30 client Dropping Handshake keys. 2025/04/30 13:30:30 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:30 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:30 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:30 client -> Sending packet 2 (64 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 136.245µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:30 client -> Sending packet 3 (54 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 04e4d3e5be985b92ec12d6dba845e25e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:30 client <- Reading packet 5 (135 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 832µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client newly acked packets (1): [3] 2025/04/30 13:30:30 client updated RTT: 34.198ms (σ: 13.399ms) 2025/04/30 13:30:30 client ECN capability confirmed. 2025/04/30 13:30:30 client Canceling loss detection timer. 2025/04/30 13:30:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: c472d777a5d6e8ea6cb790757734196a, StatelessResetToken: 0x4bdea3e74cf455f4f0f387404774d524} 2025/04/30 13:30:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 34379c5425633fda20e3c67de7935600, StatelessResetToken: 0x127919d04d5c4b8f2102cfb612719f5c} 2025/04/30 13:30:30 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a57f65a34a85453feae33fa01fcc71b4, StatelessResetToken: 0x5e8b518ef5f6ccd9c83ab048828a845b} 2025/04/30 13:30:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:30 client -> Sending packet 4 (47 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: c472d777a5d6e8ea6cb790757734196a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 179.957µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 13:30:30 client <- Reading packet 6 (1046 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:30 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:30 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:30 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:30 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:30 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:30 client -> Sending packet 5 (45 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: c472d777a5d6e8ea6cb790757734196a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 158.096µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:30 client -> Sending packet 6 (38 bytes) for connection f2b523164289620f8bc128a47a3a3c4dda21feda, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: c472d777a5d6e8ea6cb790757734196a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:30 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:30 client Connection f2b523164289620f8bc128a47a3a3c4dda21feda closed. 2025/04/30 13:30:30 Requesting https://server4:443/agnhggcmbj. 2025/04/30 13:30:30 Increased receive buffer size to 14336 kiB 2025/04/30 13:30:30 Increased send buffer size to 14336 kiB 2025/04/30 13:30:30 Setting DF for IPv4 and IPv6. 2025/04/30 13:30:30 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 13:30:30 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 13:30:30 Created qlog file: /logs/qlog/d418ee4e895689740095e3b24bffee.sqlog 2025/04/30 13:30:30 client Starting new connection to server4 ([::]:37653 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d418ee4e895689740095e3b24bffee, version v1 2025/04/30 13:30:30 Adding connection ID (empty). 2025/04/30 13:30:30 client Not doing 0-RTT. Has sealer: false, has params: false 2025/04/30 13:30:30 client -> Sending packet 0 (1280 bytes) for connection d418ee4e895689740095e3b24bffee, Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: d418ee4e895689740095e3b24bffee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 13:30:30 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1057 bytes. 2025/04/30 13:30:30 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 32a5214c6695b3f996c5d92973e27cba, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/04/30 13:30:30 client Received first packet. Switching destination connection ID to: 32a5214c6695b3f996c5d92973e27cba 2025/04/30 13:30:30 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8.72ms} 2025/04/30 13:30:30 client newly acked packets (1): [0] 2025/04/30 13:30:30 client updated RTT: 34.237261ms (σ: 17.11863ms) 2025/04/30 13:30:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 13:30:30 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Parsed a coalesced packet. Part 2: 1057 bytes. Remaining: 0 bytes. 2025/04/30 13:30:30 client <- Reading packet 0 (1057 bytes) for connection (empty), Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 32a5214c6695b3f996c5d92973e27cba, PacketNumber: 0, PacketNumberLen: 1, Length: 1032, Version: v1} 2025/04/30 13:30:30 client <- &wire.CryptoFrame{Offset: 0, Data length: 691, Offset + Data length: 691} 2025/04/30 13:30:30 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 13:30:30 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d418ee4e895689740095e3b24bffee, InitialSourceConnectionID: 32a5214c6695b3f996c5d92973e27cba, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 13:30:30 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d418ee4e895689740095e3b24bffee 2025/04/30 13:30:30 client Long Header{Type: Initial, DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:30 client Dropping Initial keys. 2025/04/30 13:30:30 client -> Sending packet 1 (51 bytes) for connection d418ee4e895689740095e3b24bffee, Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 13:30:30 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:30 client -> Sending packet 0 (54 bytes) for connection d418ee4e895689740095e3b24bffee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:30 client Short Header{DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:30 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:30 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 13:30:30 client -> Sending packet 2 (82 bytes) for connection d418ee4e895689740095e3b24bffee, Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:30 client -> Sending packet 3 (82 bytes) for connection d418ee4e895689740095e3b24bffee, Handshake 2025/04/30 13:30:30 client Long Header{Type: Handshake, DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 13:30:30 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 13:30:31 client <- Reading packet 2 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:31 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:31 client Dropping Handshake keys. 2025/04/30 13:30:31 client Queueing ACK because the first packet should be acknowledged. 2025/04/30 13:30:31 client <- Reading packet 4 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:31 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:31 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 13:30:31 client -> Sending packet 2 (64 bytes) for connection d418ee4e895689740095e3b24bffee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:31 client Short Header{DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:31 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 155.011µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 13:30:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:31 client -> Sending packet 3 (54 bytes) for connection d418ee4e895689740095e3b24bffee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:31 client Short Header{DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:31 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 13:30:31 client <- Reading packet 5 (1056 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:31 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:31 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 848µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 13:30:31 client newly acked packets (1): [3] 2025/04/30 13:30:31 client updated RTT: 34.131ms (σ: 13.049ms) 2025/04/30 13:30:31 client ECN capability confirmed. 2025/04/30 13:30:31 client Canceling loss detection timer. 2025/04/30 13:30:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:31 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 13:30:31 client Setting ACK timer to max ack delay: 25ms 2025/04/30 13:30:31 client <- Reading packet 6 (43 bytes) for connection (empty), 1-RTT 2025/04/30 13:30:31 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 13:30:31 client <- &wire.HandshakeDoneFrame{} 2025/04/30 13:30:31 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 13:30:31 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 13:30:31 client -> Sending packet 4 (45 bytes) for connection d418ee4e895689740095e3b24bffee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:31 client Short Header{DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:31 client -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 199.624µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 13:30:31 client Closing connection with error: Application error 0x0 (local) 2025/04/30 13:30:31 client -> Sending packet 5 (38 bytes) for connection d418ee4e895689740095e3b24bffee, 1-RTT (ECN: ECT(0)) 2025/04/30 13:30:31 client Short Header{DestConnectionID: 32a5214c6695b3f996c5d92973e27cba, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 13:30:31 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 13:30:31 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/04/30 13:30:31 client Connection d418ee4e895689740095e3b24bffee closed.