2025/09/12 02:56:54 Requesting https://server4:443/ndgjrvznlg. 2025/09/12 02:56:54 Increased receive buffer size to 14336 kiB 2025/09/12 02:56:54 Increased send buffer size to 14336 kiB 2025/09/12 02:56:54 Setting DF for IPv4 and IPv6. 2025/09/12 02:56:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:56:54 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:56:54 Created qlog file: /logs/qlog/055c6fec5cd999bb68fbfc20fb.sqlog 2025/09/12 02:56:54 client Starting new connection to server4 ([::]:60734 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 055c6fec5cd999bb68fbfc20fb, version v1 2025/09/12 02:56:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 02:56:54 client -> Sending packet 0 (1280 bytes) for connection 055c6fec5cd999bb68fbfc20fb, Initial 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: 055c6fec5cd999bb68fbfc20fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 02:56:54 client -> Sending packet 1 (1280 bytes) for connection 055c6fec5cd999bb68fbfc20fb, Initial 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: 055c6fec5cd999bb68fbfc20fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 1235, Data length: 280, Offset + Data length: 1515} 2025/09/12 02:56:54 client Parsed a coalesced packet. Part 1: 143 bytes. Remaining: 1089 bytes. 2025/09/12 02:56:54 client <- Reading packet 0 (143 bytes) for connection (empty), Initial 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19d8766562658ac79853cdf5d40f1b73, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 117, Version: v1} 2025/09/12 02:56:54 client Received first packet. Switching destination connection ID to: 19d8766562658ac79853cdf5d40f1b73 2025/09/12 02:56:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 15.464ms} 2025/09/12 02:56:54 client newly acked packets (2): [0 1] 2025/09/12 02:56:54 client updated RTT: 40.36369ms (σ: 20.181845ms) 2025/09/12 02:56:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 02:56:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:56:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:56:54 client Parsed a coalesced packet. Part 2: 1089 bytes. Remaining: 0 bytes. 2025/09/12 02:56:54 client <- Reading packet 0 (1089 bytes) for connection (empty), Handshake 2025/09/12 02:56:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19d8766562658ac79853cdf5d40f1b73, PacketNumber: 0, PacketNumberLen: 1, Length: 1064, Version: v1} 2025/09/12 02:56:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 690, Offset + Data length: 690} 2025/09/12 02:56:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:56:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:56:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 055c6fec5cd999bb68fbfc20fb, InitialSourceConnectionID: 19d8766562658ac79853cdf5d40f1b73, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3, EnableResetStreamAt: false} 2025/09/12 02:56:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 055c6fec5cd999bb68fbfc20fb 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: 19d8766562658ac79853cdf5d40f1b73, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client Long Header{Type: Handshake, DestConnectionID: 19d8766562658ac79853cdf5d40f1b73, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:56:54 client Dropping Initial keys. 2025/09/12 02:56:54 client -> Sending packet 1 (51 bytes) for connection 055c6fec5cd999bb68fbfc20fb, Handshake 2025/09/12 02:56:54 client Long Header{Type: Handshake, DestConnectionID: 19d8766562658ac79853cdf5d40f1b73, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client -> Sending packet 0 (54 bytes) for connection 055c6fec5cd999bb68fbfc20fb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 19d8766562658ac79853cdf5d40f1b73, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:56:54 client <- Reading packet 0 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.PingFrame{} 2025/09/12 02:56:54 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:56:54 client -> Sending packet 1 (43 bytes) for connection 055c6fec5cd999bb68fbfc20fb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 19d8766562658ac79853cdf5d40f1b73, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 115.546µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 1 (297 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.4ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client Peer doesn't await address validation any longer. 2025/09/12 02:56:54 client newly acked packets (1): [0] 2025/09/12 02:56:54 client updated RTT: 39.715ms (σ: 16.43ms) 2025/09/12 02:56:54 client ECN capability confirmed. 2025/09/12 02:56:54 client Canceling loss detection timer. 2025/09/12 02:56:54 client Dropping Handshake keys. 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/09/12 02:56:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 2872b7bcc6502780ca6311acf0014468, StatelessResetToken: 0x59625eba65a14a0702fe4e6352d3dfc2} 2025/09/12 02:56:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: cd5b8499c4d5abbbfb2d10d6bd46317d, StatelessResetToken: 0xd509a0b2aafc523cd63cdcef290a6ab8} 2025/09/12 02:56:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 32388f15ff206472062a604d3c1cef8d, StatelessResetToken: 0x8663fd6d5789772b39a370b2d61e9287} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client -> Sending packet 2 (45 bytes) for connection 055c6fec5cd999bb68fbfc20fb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 2872b7bcc6502780ca6311acf0014468, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 196.848µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:56:54 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1211, Offset + Data length: 1211} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client <- Reading packet 3 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1211, Data length: 1209, Offset + Data length: 2420} 2025/09/12 02:56:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:56:54 client -> Sending packet 3 (43 bytes) for connection 055c6fec5cd999bb68fbfc20fb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 2872b7bcc6502780ca6311acf0014468, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 47.149µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 4 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2420, Data length: 1209, Offset + Data length: 3629} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client <- Reading packet 5 (492 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3629, Data length: 467, Offset + Data length: 4096} 2025/09/12 02:56:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:56:54 client -> Sending packet 4 (43 bytes) for connection 055c6fec5cd999bb68fbfc20fb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 2872b7bcc6502780ca6311acf0014468, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 48.962µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 6 (1049 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4096, Data length: 1024, Offset + Data length: 5120} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client <- Reading packet 7 (43 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 5120, Data length: 0, Offset + Data length: 5120} 2025/09/12 02:56:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:56:54 client -> Sending packet 5 (43 bytes) for connection 055c6fec5cd999bb68fbfc20fb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 2872b7bcc6502780ca6311acf0014468, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 83.165µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client Closing connection with error: Application error 0x0 (local) 2025/09/12 02:56:54 client -> Sending packet 6 (38 bytes) for connection 055c6fec5cd999bb68fbfc20fb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 2872b7bcc6502780ca6311acf0014468, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:56:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 02:56:54 client Connection 055c6fec5cd999bb68fbfc20fb closed. 2025/09/12 02:56:54 Requesting https://server4:443/ovquerglck. 2025/09/12 02:56:54 Increased receive buffer size to 14336 kiB 2025/09/12 02:56:54 Increased send buffer size to 14336 kiB 2025/09/12 02:56:54 Setting DF for IPv4 and IPv6. 2025/09/12 02:56:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:56:54 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:56:54 Created qlog file: /logs/qlog/6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa.sqlog 2025/09/12 02:56:54 client Starting new connection to server4 ([::]:44877 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, version v1 2025/09/12 02:56:54 client Not doing 0-RTT. Has sealer: false, has params: false 2025/09/12 02:56:54 client -> Sending packet 0 (1280 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, Initial 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:56:54 client -> Sending packet 1 (1280 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, Initial 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 1228, Data length: 474, Offset + Data length: 1702} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:56:54 client <- Reading packet 0 (1232 bytes) for connection (empty), Initial 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1206, Version: v1} 2025/09/12 02:56:54 client Received first packet. Switching destination connection ID to: 08cf7f4f831aabda2d71674b303d9c1c 2025/09/12 02:56:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3.44ms} 2025/09/12 02:56:54 client newly acked packets (1): [0] 2025/09/12 02:56:54 client updated RTT: 33.33711ms (σ: 16.668555ms) 2025/09/12 02:56:54 client Parsed a coalesced packet. Part 1: 149 bytes. Remaining: 1083 bytes. 2025/09/12 02:56:54 client <- Reading packet 1 (149 bytes) for connection (empty), Initial 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 123, Version: v1} 2025/09/12 02:56:54 client <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 6.672ms} 2025/09/12 02:56:54 client newly acked packets (1): [1] 2025/09/12 02:56:54 client updated RTT: 33.515ms (σ: 12.857ms) 2025/09/12 02:56:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/09/12 02:56:54 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:56:54 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:56:54 client Parsed a coalesced packet. Part 2: 1083 bytes. Remaining: 0 bytes. 2025/09/12 02:56:54 client <- Reading packet 0 (1083 bytes) for connection (empty), Handshake 2025/09/12 02:56:54 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, PacketNumber: 0, PacketNumberLen: 1, Length: 1058, Version: v1} 2025/09/12 02:56:54 client <- &wire.CryptoFrame{Offset: 0, Data length: 144, Offset + Data length: 144} 2025/09/12 02:56:54 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:56:54 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:56:54 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, InitialSourceConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3, EnableResetStreamAt: false} 2025/09/12 02:56:54 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa 2025/09/12 02:56:54 client Long Header{Type: Initial, DestConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1172, Version: v1} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client Long Header{Type: Handshake, DestConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:56:54 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:56:54 client Dropping Initial keys. 2025/09/12 02:56:54 client -> Sending packet 1 (51 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, Handshake 2025/09/12 02:56:54 client Long Header{Type: Handshake, DestConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client -> Sending packet 0 (54 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:56:54 client <- Reading packet 0 (1452 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.PingFrame{} 2025/09/12 02:56:54 client Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:56:54 client -> Sending packet 1 (43 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: 08cf7f4f831aabda2d71674b303d9c1c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 111.689µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 1 (136 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.296ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client Peer doesn't await address validation any longer. 2025/09/12 02:56:54 client newly acked packets (1): [0] 2025/09/12 02:56:54 client updated RTT: 33.511ms (σ: 9.649ms) 2025/09/12 02:56:54 client ECN capability confirmed. 2025/09/12 02:56:54 client Canceling loss detection timer. 2025/09/12 02:56:54 client Dropping Handshake keys. 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, StatelessResetToken: 0xcc25e8b743b93cb6fb540a7404c981c0} 2025/09/12 02:56:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 532ced4dbd0282c921c484eb655924fc, StatelessResetToken: 0x419778ad6b2940d38bf3537b8e2e174d} 2025/09/12 02:56:54 client <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: c9598931d22a7d42df553943318906db, StatelessResetToken: 0x4716f52202861f61befe7c46da0defd8} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client -> Sending packet 2 (45 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 159.703µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:56:54 client <- Reading packet 2 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1211, Offset + Data length: 1211} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client <- Reading packet 3 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1211, Data length: 1209, Offset + Data length: 2420} 2025/09/12 02:56:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:56:54 client -> Sending packet 3 (43 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 52.979µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 4 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2420, Data length: 1209, Offset + Data length: 3629} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client <- Reading packet 5 (492 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3629, Data length: 467, Offset + Data length: 4096} 2025/09/12 02:56:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:56:54 client -> Sending packet 4 (43 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 50.174µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 6 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4096, Data length: 1209, Offset + Data length: 5305} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client <- Reading packet 7 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 5305, Data length: 1209, Offset + Data length: 6514} 2025/09/12 02:56:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:56:54 client -> Sending packet 5 (43 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 51.446µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 8 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 6514, Data length: 1209, Offset + Data length: 7723} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client <- Reading packet 9 (494 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 7723, Data length: 469, Offset + Data length: 8192} 2025/09/12 02:56:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:56:54 client -> Sending packet 6 (43 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, DelayTime: 71.604µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 10 (1232 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 8192, Data length: 1209, Offset + Data length: 9401} 2025/09/12 02:56:54 client Setting ACK timer to max ack delay: 25ms 2025/09/12 02:56:54 client <- Reading packet 11 (864 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.HandshakeDoneFrame{} 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 9401, Data length: 839, Offset + Data length: 10240} 2025/09/12 02:56:54 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:56:54 client -> Sending packet 7 (43 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, DelayTime: 79.148µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client <- Reading packet 13 (43 bytes) for connection (empty), 1-RTT 2025/09/12 02:56:54 client Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:56:54 client <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 216µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client newly acked packets (1): [2] 2025/09/12 02:56:54 client Canceling loss detection timer. 2025/09/12 02:56:54 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 10240, Data length: 0, Offset + Data length: 10240} 2025/09/12 02:56:54 client Queuing ACK because there's a new missing packet to report. 2025/09/12 02:56:54 client Ignoring all packets below 2. 2025/09/12 02:56:54 client -> Sending packet 8 (45 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 2, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 2}}, DelayTime: 83.707µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 02:56:54 client Closing connection with error: Application error 0x0 (local) 2025/09/12 02:56:54 client -> Sending packet 9 (38 bytes) for connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:56:54 client Short Header{DestConnectionID: d13a8ddb3d0ea4b2e54fbedce67e7315, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:56:54 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:56:54 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/09/12 02:56:54 client Connection 6a7c106d55c40c6d043c4a0d6fd0b359dfcd12fa closed.