2025/09/11 18:16:05 Requesting https://server4:443/cemubbohro. 2025/09/11 18:16:05 Increased receive buffer size to 14336 kiB 2025/09/11 18:16:05 Increased send buffer size to 14336 kiB 2025/09/11 18:16:05 Setting DF for IPv4 and IPv6. 2025/09/11 18:16:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/11 18:16:05 Activating reading of packet info for IPv4 and IPv6. 2025/09/11 18:16:05 Created qlog file: /logs/qlog/a9927b29cad695e6cda92e35b9.sqlog 2025/09/11 18:16:05 client Starting new connection to server4 ([::]:40060 -> 193.167.100.100:443), source connection ID (empty), destination connection ID a9927b29cad695e6cda92e35b9, version v1 2025/09/11 18:16:05 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/11 18:16:05 client -> Sending packet 0 (1280 bytes) for connection a9927b29cad695e6cda92e35b9, Initial 2025/09/11 18:16:05 client Long Header{Type: Initial, DestConnectionID: a9927b29cad695e6cda92e35b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 18:16:05 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/11 18:16:05 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 18:16:05 client -> Sending packet 1 (1280 bytes) for connection a9927b29cad695e6cda92e35b9, Initial 2025/09/11 18:16:05 client Long Header{Type: Initial, DestConnectionID: a9927b29cad695e6cda92e35b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 18:16:05 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 18:16:05 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/11 18:16:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/11 18:16:06 client -> Sending packet 2 (1280 bytes) for connection a9927b29cad695e6cda92e35b9, Initial 2025/09/11 18:16:06 client Long Header{Type: Initial, DestConnectionID: a9927b29cad695e6cda92e35b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 18:16:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 18:16:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/11 18:16:06 client -> Sending packet 3 (1280 bytes) for connection a9927b29cad695e6cda92e35b9, Initial 2025/09/11 18:16:06 client Long Header{Type: Initial, DestConnectionID: a9927b29cad695e6cda92e35b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 18:16:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 18:16:06 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/11 18:16:06 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/09/11 18:16:06 client -> Sending packet 4 (1280 bytes) for connection a9927b29cad695e6cda92e35b9, Initial 2025/09/11 18:16:06 client Long Header{Type: Initial, DestConnectionID: a9927b29cad695e6cda92e35b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 18:16:06 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 18:16:06 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/11 18:16:06 client -> Sending packet 5 (1280 bytes) for connection a9927b29cad695e6cda92e35b9, Initial 2025/09/11 18:16:06 client Long Header{Type: Initial, DestConnectionID: a9927b29cad695e6cda92e35b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 18:16:06 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 18:16:06 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/11 18:16:07 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/11 18:16:07 client -> Sending packet 6 (1280 bytes) for connection a9927b29cad695e6cda92e35b9, Initial 2025/09/11 18:16:07 client Long Header{Type: Initial, DestConnectionID: a9927b29cad695e6cda92e35b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/11 18:16:07 client -> Sending packet 7 (1280 bytes) for connection a9927b29cad695e6cda92e35b9, Initial 2025/09/11 18:16:07 client Long Header{Type: Initial, DestConnectionID: a9927b29cad695e6cda92e35b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 1235, Data length: 277, Offset + Data length: 1512} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/11 18:16:07 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1089 bytes. 2025/09/11 18:16:07 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/09/11 18:16:07 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 76000250e2b5202ef4e3745b35a4a841, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/09/11 18:16:07 client Received first packet. Switching destination connection ID to: 76000250e2b5202ef4e3745b35a4a841 2025/09/11 18:16:07 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 16.856ms} 2025/09/11 18:16:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/11 18:16:07 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 18:16:07 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 18:16:07 client Parsed a coalesced packet. Part 2: 1089 bytes. Remaining: 0 bytes. 2025/09/11 18:16:07 client <- Reading packet 0 (1089 bytes) for connection (empty), Handshake 2025/09/11 18:16:07 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 76000250e2b5202ef4e3745b35a4a841, PacketNumber: 0, PacketNumberLen: 1, Length: 1064, Version: v1} 2025/09/11 18:16:07 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/09/11 18:16:07 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 18:16:07 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/11 18:16:07 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: a9927b29cad695e6cda92e35b9, InitialSourceConnectionID: 76000250e2b5202ef4e3745b35a4a841, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3, EnableResetStreamAt: false} 2025/09/11 18:16:07 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection a9927b29cad695e6cda92e35b9 2025/09/11 18:16:07 client Long Header{Type: Initial, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/11 18:16:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 18:16:07 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 18:16:07 client Dropping Initial keys. 2025/09/11 18:16:07 client -> Sending packet 1 (105 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:07 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/11 18:16:07 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 18:16:07 client Short Header{DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 18:16:07 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/11 18:16:07 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/09/11 18:16:07 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/09/11 18:16:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/11 18:16:07 client -> Sending packet 2 (82 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:07 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 18:16:07 client -> Sending packet 3 (82 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:07 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 18:16:07 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/09/11 18:16:07 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/09/11 18:16:07 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/11 18:16:07 client -> Sending packet 4 (82 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:07 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 18:16:07 client -> Sending packet 5 (82 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:07 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 18:16:07 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 18:16:08 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/09/11 18:16:08 client Dropping %!s(logging.PacketType=0) packet (145 bytes) because we already dropped the keys. 2025/09/11 18:16:08 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/09/11 18:16:08 client <- Reading packet 2 (1055 bytes) for connection (empty), Handshake 2025/09/11 18:16:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 76000250e2b5202ef4e3745b35a4a841, PacketNumber: 2, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/09/11 18:16:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/09/11 18:16:08 client -> Sending packet 6 (53 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:08 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 28, Version: v1} 2025/09/11 18:16:08 client -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 18:16:08 client Parsed a coalesced packet. Part 1: 145 bytes. Remaining: 1055 bytes. 2025/09/11 18:16:08 client Dropping %!s(logging.PacketType=0) packet (145 bytes) because we already dropped the keys. 2025/09/11 18:16:08 client Parsed a coalesced packet. Part 2: 1055 bytes. Remaining: 0 bytes. 2025/09/11 18:16:08 client <- Reading packet 4 (1055 bytes) for connection (empty), Handshake 2025/09/11 18:16:08 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 76000250e2b5202ef4e3745b35a4a841, PacketNumber: 4, PacketNumberLen: 1, Length: 1030, Version: v1} 2025/09/11 18:16:08 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/09/11 18:16:08 client -> Sending packet 7 (55 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:08 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 30, Version: v1} 2025/09/11 18:16:08 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/09/11 18:16:08 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/09/11 18:16:08 client Dropping %!s(logging.PacketType=0) packet (1232 bytes) because we already dropped the keys. 2025/09/11 18:16:08 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/11 18:16:08 client -> Sending packet 8 (82 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:08 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 18:16:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 18:16:08 client -> Sending packet 9 (82 bytes) for connection a9927b29cad695e6cda92e35b9, Handshake 2025/09/11 18:16:08 client Long Header{Type: Handshake, DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/11 18:16:08 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/11 18:16:08 client <- Reading packet 0 (1452 bytes) for connection (empty), 1-RTT 2025/09/11 18:16:08 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 18:16:08 client <- &wire.PingFrame{} 2025/09/11 18:16:08 client Queueing ACK because the first packet should be acknowledged. 2025/09/11 18:16:08 client -> Sending packet 1 (43 bytes) for connection a9927b29cad695e6cda92e35b9, 1-RTT (ECN: ECT(0)) 2025/09/11 18:16:08 client Short Header{DestConnectionID: 76000250e2b5202ef4e3745b35a4a841, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 18:16:08 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 68.128µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/11 18:16:08 client <- Reading packet 1 (133 bytes) for connection (empty), 1-RTT 2025/09/11 18:16:08 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 18:16:08 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.344ms} 2025/09/11 18:16:08 client Peer doesn't await address validation any longer. 2025/09/11 18:16:08 client newly acked packets (1): [0] 2025/09/11 18:16:08 client updated RTT: 1.504712307s (σ: 752.356153ms) 2025/09/11 18:16:08 client Canceling loss detection timer. 2025/09/11 18:16:08 client Dropping Handshake keys. 2025/09/11 18:16:08 client <- &wire.HandshakeDoneFrame{} 2025/09/11 18:16:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 5e1f009fd71cd622d80b9ef4d7696276, StatelessResetToken: 0x160c6a1ab54a8e0e86c59436d2459e47} 2025/09/11 18:16:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 1a1c9aa304c3aedc2522350a0e20341d, StatelessResetToken: 0x070e2d03ef6697e2cc6d5fe6dcf4db6f} 2025/09/11 18:16:08 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: b79a72c21ef6e940cbfd136b6da2d94a, StatelessResetToken: 0x488f0c1300ea69ef489ca89c1f1a5e7b} 2025/09/11 18:16:08 client Setting ACK timer to max ack delay: 25ms 2025/09/11 18:16:08 client -> Sending packet 2 (45 bytes) for connection a9927b29cad695e6cda92e35b9, 1-RTT (ECN: ECT(0)) 2025/09/11 18:16:08 client Short Header{DestConnectionID: 5e1f009fd71cd622d80b9ef4d7696276, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 18:16:08 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 139.641µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/11 18:16:08 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/11 18:16:08 client <- Reading packet 2 (1047 bytes) for connection (empty), 1-RTT 2025/09/11 18:16:08 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 18:16:08 client <- &wire.HandshakeDoneFrame{} 2025/09/11 18:16:08 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/11 18:16:08 client Setting ACK timer to max ack delay: 25ms 2025/09/11 18:16:08 client <- Reading packet 3 (43 bytes) for connection (empty), 1-RTT 2025/09/11 18:16:08 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/11 18:16:08 client <- &wire.HandshakeDoneFrame{} 2025/09/11 18:16:08 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/11 18:16:08 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/11 18:16:08 client -> Sending packet 3 (43 bytes) for connection a9927b29cad695e6cda92e35b9, 1-RTT (ECN: ECT(0)) 2025/09/11 18:16:08 client Short Header{DestConnectionID: 5e1f009fd71cd622d80b9ef4d7696276, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 18:16:08 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 74.871µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/11 18:16:08 client Closing connection with error: Application error 0x0 (local) 2025/09/11 18:16:08 client -> Sending packet 4 (38 bytes) for connection a9927b29cad695e6cda92e35b9, 1-RTT (ECN: ECT(0)) 2025/09/11 18:16:08 client Short Header{DestConnectionID: 5e1f009fd71cd622d80b9ef4d7696276, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/11 18:16:08 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/11 18:16:08 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/11 18:16:08 client Connection a9927b29cad695e6cda92e35b9 closed.