2025/12/14 06:34:49 Requesting https://server4:443/freezing-unrelenting-usb. 2025/12/14 06:34:49 Increased receive buffer size to 14336 kiB 2025/12/14 06:34:49 Increased send buffer size to 14336 kiB 2025/12/14 06:34:49 Setting DF for IPv4 and IPv6. 2025/12/14 06:34:49 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/14 06:34:49 Activating reading of packet info for IPv4 and IPv6. 2025/12/14 06:34:49 Created qlog file: /logs/qlog/3d3cdc9e331a0b82359a88012c5fa91f2be81bc7.sqlog 2025/12/14 06:34:49 client Starting new connection to server4 ([::]:59396 -> 193.167.100.100:443), source connection ID (empty), destination connection ID 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, version v1 2025/12/14 06:34:49 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/14 06:34:49 client -> Sending packet 0 (1280 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, Initial 2025/12/14 06:34:49 client Long Header{Type: Initial, DestConnectionID: 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/14 06:34:49 client -> &wire.CryptoFrame{Offset: 67, Data length: 1161, Offset + Data length: 1228} 2025/12/14 06:34:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/14 06:34:49 client -> Sending packet 1 (1280 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, Initial 2025/12/14 06:34:49 client Long Header{Type: Initial, DestConnectionID: 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/12/14 06:34:49 client -> &wire.CryptoFrame{Offset: 1228, Data length: 284, Offset + Data length: 1512} 2025/12/14 06:34:49 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/14 06:34:49 client <- Reading packet 0 (48 bytes) for connection (empty), Initial 2025/12/14 06:34:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 72945e7b4b041cdafd7ca299, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 26, Version: v1} 2025/12/14 06:34:49 client Received first packet. Switching destination connection ID to: 72945e7b4b041cdafd7ca299 2025/12/14 06:34:49 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 656µs} 2025/12/14 06:34:49 client newly acked packets (1): [0] 2025/12/14 06:34:49 client updated RTT: 37.374737ms (σ: 18.687368ms) 2025/12/14 06:34:49 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/12/14 06:34:49 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 72945e7b4b041cdafd7ca299, Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1178, Version: v1} 2025/12/14 06:34:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/14 06:34:49 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/14 06:34:49 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/14 06:34:49 client <- Reading packet 0 (195 bytes) for connection (empty), Handshake 2025/12/14 06:34:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 72945e7b4b041cdafd7ca299, PacketNumber: 0, PacketNumberLen: 4, Length: 174, Version: v1} 2025/12/14 06:34:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/12/14 06:34:49 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, InitialSourceConnectionID: 72945e7b4b041cdafd7ca299, InitialMaxStreamDataBidiLocal: 16777216, InitialMaxStreamDataBidiRemote: 16777216, InitialMaxStreamDataUni: 16777216, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 2m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x9614b216e42c7721f9b4130c228fb43c, EnableResetStreamAt: false} 2025/12/14 06:34:49 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7 2025/12/14 06:34:49 client Long Header{Type: Initial, DestConnectionID: 72945e7b4b041cdafd7ca299, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1214, Version: v1} 2025/12/14 06:34:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:34:49 client Long Header{Type: Handshake, DestConnectionID: 72945e7b4b041cdafd7ca299, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/14 06:34:49 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:34:49 client Dropping Initial keys. 2025/12/14 06:34:49 client <- Reading packet 1 (516 bytes) for connection (empty), Handshake 2025/12/14 06:34:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 72945e7b4b041cdafd7ca299, PacketNumber: 1, PacketNumberLen: 4, Length: 495, Version: v1} 2025/12/14 06:34:49 client <- &wire.CryptoFrame{Offset: 150, Data length: 470, Offset + Data length: 620} 2025/12/14 06:34:49 client -> Sending packet 1 (44 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, Handshake 2025/12/14 06:34:49 client Long Header{Type: Handshake, DestConnectionID: 72945e7b4b041cdafd7ca299, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/14 06:34:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:34:49 client <- Reading packet 2 (125 bytes) for connection (empty), Handshake 2025/12/14 06:34:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 72945e7b4b041cdafd7ca299, PacketNumber: 2, PacketNumberLen: 4, Length: 104, Version: v1} 2025/12/14 06:34:49 client <- &wire.CryptoFrame{Offset: 620, Data length: 79, Offset + Data length: 699} 2025/12/14 06:34:49 client <- Reading packet 3 (81 bytes) for connection (empty), Handshake 2025/12/14 06:34:49 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 72945e7b4b041cdafd7ca299, PacketNumber: 3, PacketNumberLen: 4, Length: 60, Version: v1} 2025/12/14 06:34:49 client <- &wire.CryptoFrame{Offset: 699, Data length: 36, Offset + Data length: 735} 2025/12/14 06:34:49 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/14 06:34:49 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/14 06:34:49 client Dropping initial packet (48 bytes) because we already dropped the keys. 2025/12/14 06:34:49 client -> Sending packet 2 (83 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, Handshake 2025/12/14 06:34:49 client Long Header{Type: Handshake, DestConnectionID: 72945e7b4b041cdafd7ca299, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/14 06:34:49 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:34:49 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/14 06:34:49 client -> Sending packet 0 (64 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:34:49 client Short Header{DestConnectionID: 72945e7b4b041cdafd7ca299, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:34:49 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 31, Offset + Data length: 31} 2025/12/14 06:34:49 client <- Reading packet 0 (22 bytes) for connection (empty), 1-RTT 2025/12/14 06:34:49 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:34:49 client <- &wire.HandshakeDoneFrame{} 2025/12/14 06:34:49 client Dropping Handshake keys. 2025/12/14 06:34:49 client Setting ACK timer to max ack delay: 25ms 2025/12/14 06:34:49 client <- Reading packet 1 (60 bytes) for connection (empty), 1-RTT 2025/12/14 06:34:49 client Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:34:49 client <- &wire.NewTokenFrame{Token: 0x4fc50985143b827ca6ad4465000792300b0eb31c7d760cb35af49c2cb8419a1b2729c1f5fd} 2025/12/14 06:34:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/14 06:34:49 client -> Sending packet 1 (36 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:34:49 client Short Header{DestConnectionID: 72945e7b4b041cdafd7ca299, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:34:49 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 88.836µs} 2025/12/14 06:34:49 client <- Reading packet 2 (282 bytes) for connection (empty), 1-RTT 2025/12/14 06:34:49 client Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:34:49 client <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/12/14 06:34:49 client Setting ACK timer to max ack delay: 25ms 2025/12/14 06:34:49 client <- Reading packet 3 (283 bytes) for connection (empty), 1-RTT 2025/12/14 06:34:49 client Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:34:49 client <- &wire.CryptoFrame{Offset: 257, Data length: 257, Offset + Data length: 514} 2025/12/14 06:34:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/14 06:34:49 client Dropping handshake packet (46 bytes) because we already dropped the keys. 2025/12/14 06:34:49 client <- Reading packet 10 (53 bytes) for connection (empty), 1-RTT 2025/12/14 06:34:49 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:34:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dd44f620c1c68f4aa36f25b7, StatelessResetToken: 0x0a2e7aae59fba6f7b66f477975965e5d} 2025/12/14 06:34:49 client -> Sending packet 2 (40 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:34:49 client Short Header{DestConnectionID: dd44f620c1c68f4aa36f25b7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:34:49 client -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 3, Smallest: 0}}, DelayTime: 119.122µs} 2025/12/14 06:34:49 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/14 06:34:49 client <- Reading packet 11 (53 bytes) for connection (empty), 1-RTT 2025/12/14 06:34:49 client Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:34:49 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c4b362c91f17030416dcc936, StatelessResetToken: 0xcc692c10dec0b6d563dfbb1556378411} 2025/12/14 06:34:49 client Setting ACK timer to max ack delay: 25ms 2025/12/14 06:34:49 client <- Reading packet 12 (1049 bytes) for connection (empty), 1-RTT 2025/12/14 06:34:49 client Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:34:49 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/14 06:34:49 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/14 06:34:49 client -> Sending packet 3 (38 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:34:49 client Short Header{DestConnectionID: dd44f620c1c68f4aa36f25b7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:34:49 client -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 3, Smallest: 0}}, DelayTime: 95.779µs} 2025/12/14 06:34:49 client Closing connection with error: Application error 0x0 (local) 2025/12/14 06:34:49 client -> Sending packet 4 (34 bytes) for connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:34:49 client Short Header{DestConnectionID: dd44f620c1c68f4aa36f25b7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:34:49 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/14 06:34:49 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/14 06:34:49 client Connection 3d3cdc9e331a0b82359a88012c5fa91f2be81bc7 closed.