2025/12/14 06:35:24 Requesting https://server4:443/pink-boiling-ring. 2025/12/14 06:35:24 Increased receive buffer size to 14336 kiB 2025/12/14 06:35:24 Increased send buffer size to 14336 kiB 2025/12/14 06:35:24 Setting DF for IPv4 and IPv6. 2025/12/14 06:35:24 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/14 06:35:24 Activating reading of packet info for IPv4 and IPv6. 2025/12/14 06:35:24 Created qlog file: /logs/qlog/d3154f4c4bda0594392e510caca13092f672b7.sqlog 2025/12/14 06:35:24 client Starting new connection to server4 ([::]:44143 -> 193.167.100.100:443), source connection ID (empty), destination connection ID d3154f4c4bda0594392e510caca13092f672b7, version v1 2025/12/14 06:35:24 client Not doing 0-RTT. Has sealer: false, has params: false 2025/12/14 06:35:24 client -> Sending packet 0 (1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Initial 2025/12/14 06:35:24 client Long Header{Type: Initial, DestConnectionID: d3154f4c4bda0594392e510caca13092f672b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/14 06:35:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/14 06:35:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/14 06:35:24 client -> Sending packet 1 (1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Initial 2025/12/14 06:35:24 client Long Header{Type: Initial, DestConnectionID: d3154f4c4bda0594392e510caca13092f672b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/14 06:35:24 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/12/14 06:35:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/14 06:35:24 client Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/12/14 06:35:24 client -> Sending packet 2 (1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Initial 2025/12/14 06:35:24 client Long Header{Type: Initial, DestConnectionID: d3154f4c4bda0594392e510caca13092f672b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/14 06:35:24 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/14 06:35:24 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/14 06:35:24 client -> Sending packet 3 (1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Initial 2025/12/14 06:35:24 client Long Header{Type: Initial, DestConnectionID: d3154f4c4bda0594392e510caca13092f672b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/14 06:35:24 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/14 06:35:24 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/12/14 06:35:25 client Loss detection alarm for Initial fired in PTO mode. PTO count: 2 2025/12/14 06:35:25 client -> Sending packet 4 (1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Initial 2025/12/14 06:35:25 client Long Header{Type: Initial, DestConnectionID: d3154f4c4bda0594392e510caca13092f672b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/14 06:35:25 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/14 06:35:25 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/14 06:35:25 client -> Sending packet 5 (1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Initial 2025/12/14 06:35:25 client Long Header{Type: Initial, DestConnectionID: d3154f4c4bda0594392e510caca13092f672b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/14 06:35:25 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/14 06:35:25 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/12/14 06:35:26 client Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/12/14 06:35:26 client -> Sending packet 6 (1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Initial 2025/12/14 06:35:26 client Long Header{Type: Initial, DestConnectionID: d3154f4c4bda0594392e510caca13092f672b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/12/14 06:35:26 client -> Sending packet 7 (1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Initial 2025/12/14 06:35:26 client Long Header{Type: Initial, DestConnectionID: d3154f4c4bda0594392e510caca13092f672b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/14 06:35:26 client <- Reading packet 0 (48 bytes) for connection (empty), Initial 2025/12/14 06:35:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6659dbdfa3d3b365e5f3cc80, Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 26, Version: v1} 2025/12/14 06:35:26 client Received first packet. Switching destination connection ID to: 6659dbdfa3d3b365e5f3cc80 2025/12/14 06:35:26 client <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 640µs} 2025/12/14 06:35:26 client <- Reading packet 1 (1200 bytes) for connection (empty), Initial 2025/12/14 06:35:26 client Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6659dbdfa3d3b365e5f3cc80, Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1178, Version: v1} 2025/12/14 06:35:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/12/14 06:35:26 client Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/14 06:35:26 client Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/14 06:35:26 client <- Reading packet 0 (194 bytes) for connection (empty), Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 0, PacketNumberLen: 4, Length: 173, Version: v1} 2025/12/14 06:35:26 client <- &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/12/14 06:35:26 client Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: d3154f4c4bda0594392e510caca13092f672b7, InitialSourceConnectionID: 6659dbdfa3d3b365e5f3cc80, InitialMaxStreamDataBidiLocal: 16777216, InitialMaxStreamDataBidiRemote: 16777216, InitialMaxStreamDataUni: 16777216, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 2m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, StatelessResetToken: 0x0cf727614b812fc33c051eb85c2bff08, EnableResetStreamAt: false} 2025/12/14 06:35:26 client -> Sending coalesced packet (2 parts, 1280 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7 2025/12/14 06:35:26 client Long Header{Type: Initial, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1214, Version: v1} 2025/12/14 06:35:26 client -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/14 06:35:26 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:35:26 client Dropping Initial keys. 2025/12/14 06:35:26 client <- Reading packet 1 (515 bytes) for connection (empty), Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 1, PacketNumberLen: 4, Length: 494, Version: v1} 2025/12/14 06:35:26 client <- &wire.CryptoFrame{Offset: 149, Data length: 469, Offset + Data length: 618} 2025/12/14 06:35:26 client <- Reading packet 2 (125 bytes) for connection (empty), Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 2, PacketNumberLen: 4, Length: 104, Version: v1} 2025/12/14 06:35:26 client <- &wire.CryptoFrame{Offset: 618, Data length: 79, Offset + Data length: 697} 2025/12/14 06:35:26 client <- Reading packet 3 (81 bytes) for connection (empty), Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 3, PacketNumberLen: 4, Length: 60, Version: v1} 2025/12/14 06:35:26 client <- &wire.CryptoFrame{Offset: 697, Data length: 36, Offset + Data length: 733} 2025/12/14 06:35:26 client Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/14 06:35:26 client Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/14 06:35:26 client Dropping initial packet (48 bytes) because we already dropped the keys. 2025/12/14 06:35:26 client -> Sending packet 1 (83 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/14 06:35:26 client -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/14 06:35:26 client -> Sending packet 0 (57 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:35:26 client Short Header{DestConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:35:26 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/14 06:35:26 client Dropping initial packet (47 bytes) because we already dropped the keys. 2025/12/14 06:35:26 client Dropping initial packet (47 bytes) because we already dropped the keys. 2025/12/14 06:35:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/12/14 06:35:26 client -> Sending packet 2 (78 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/14 06:35:26 client -> Sending packet 3 (78 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/14 06:35:26 client Dropping initial packet (47 bytes) because we already dropped the keys. 2025/12/14 06:35:26 client Dropping initial packet (47 bytes) because we already dropped the keys. 2025/12/14 06:35:26 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/12/14 06:35:26 client -> Sending packet 4 (78 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/14 06:35:26 client -> Sending packet 5 (78 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:26 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/14 06:35:26 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/14 06:35:27 client Dropping initial packet (1200 bytes) because we already dropped the keys. 2025/12/14 06:35:27 client Dropping initial packet (1200 bytes) because we already dropped the keys. 2025/12/14 06:35:27 client Dropping initial packet (47 bytes) because we already dropped the keys. 2025/12/14 06:35:27 client Dropping initial packet (47 bytes) because we already dropped the keys. 2025/12/14 06:35:27 client Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/12/14 06:35:27 client -> Sending packet 6 (78 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:27 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/14 06:35:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/14 06:35:27 client -> Sending packet 7 (78 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:27 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 57, Version: v1} 2025/12/14 06:35:27 client -> &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/14 06:35:27 client <- Reading packet 4 (194 bytes) for connection (empty), Handshake 2025/12/14 06:35:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 4, PacketNumberLen: 4, Length: 173, Version: v1} 2025/12/14 06:35:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/12/14 06:35:27 client -> Sending packet 8 (44 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:27 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/14 06:35:27 client -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:35:27 client <- Reading packet 5 (515 bytes) for connection (empty), Handshake 2025/12/14 06:35:27 client Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 5, PacketNumberLen: 4, Length: 494, Version: v1} 2025/12/14 06:35:27 client <- &wire.CryptoFrame{Offset: 149, Data length: 469, Offset + Data length: 618} 2025/12/14 06:35:27 client -> Sending packet 9 (44 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, Handshake 2025/12/14 06:35:27 client Long Header{Type: Handshake, DestConnectionID: 6659dbdfa3d3b365e5f3cc80, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 23, Version: v1} 2025/12/14 06:35:27 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s} 2025/12/14 06:35:27 client <- Reading packet 0 (22 bytes) for connection (empty), 1-RTT 2025/12/14 06:35:27 client Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:35:27 client <- &wire.HandshakeDoneFrame{} 2025/12/14 06:35:27 client Dropping Handshake keys. 2025/12/14 06:35:27 client Setting ACK timer to max ack delay: 25ms 2025/12/14 06:35:27 client Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/12/14 06:35:27 client -> Sending packet 2 (62 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:35:27 client Short Header{DestConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:35:27 client -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 64.801µs} 2025/12/14 06:35:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/14 06:35:27 client -> Sending packet 3 (57 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:35:27 client Short Header{DestConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:35:27 client -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 24, Offset + Data length: 24} 2025/12/14 06:35:27 client <- Reading packet 5 (60 bytes) for connection (empty), 1-RTT 2025/12/14 06:35:27 client Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:35:27 client <- &wire.NewTokenFrame{Token: 0x7370fbb619788cf75eae5a990025f53da0b85081f827fd9701727dbd738c630c9c9219e3b5} 2025/12/14 06:35:27 client Queuing ACK because there's a new missing packet to report. 2025/12/14 06:35:27 client -> Sending packet 4 (38 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:35:27 client Short Header{DestConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:35:27 client -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 34.765µs} 2025/12/14 06:35:27 client <- Reading packet 6 (282 bytes) for connection (empty), 1-RTT 2025/12/14 06:35:27 client Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:35:27 client <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/12/14 06:35:27 client Setting ACK timer to max ack delay: 25ms 2025/12/14 06:35:27 client <- Reading packet 7 (283 bytes) for connection (empty), 1-RTT 2025/12/14 06:35:27 client Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:35:27 client <- &wire.CryptoFrame{Offset: 257, Data length: 257, Offset + Data length: 514} 2025/12/14 06:35:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/14 06:35:27 client Dropping handshake packet (46 bytes) because we already dropped the keys. 2025/12/14 06:35:27 client -> Sending packet 5 (38 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:35:27 client Short Header{DestConnectionID: 6659dbdfa3d3b365e5f3cc80, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:35:27 client -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 66.364µs} 2025/12/14 06:35:27 client <- Reading packet 8 (53 bytes) for connection (empty), 1-RTT 2025/12/14 06:35:27 client Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:35:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b036a0ace33f7dfd73fe83f4, StatelessResetToken: 0xbcfd24456e64297875eea24546c34626} 2025/12/14 06:35:27 client Setting ACK timer to max ack delay: 25ms 2025/12/14 06:35:27 client <- Reading packet 9 (53 bytes) for connection (empty), 1-RTT 2025/12/14 06:35:27 client Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:35:27 client <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b3d03014dfd0113f4b0ea53, StatelessResetToken: 0x13363d3b983bc643c1a535ef41a56b4c} 2025/12/14 06:35:27 client Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/14 06:35:27 client -> Sending packet 6 (40 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:35:27 client Short Header{DestConnectionID: b036a0ace33f7dfd73fe83f4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:35:27 client -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 86.451µs} 2025/12/14 06:35:27 client -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/14 06:35:27 client <- Reading packet 10 (1049 bytes) for connection (empty), 1-RTT 2025/12/14 06:35:27 client Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/12/14 06:35:27 client <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/14 06:35:27 client Setting ACK timer to max ack delay: 25ms 2025/12/14 06:35:27 client Closing connection with error: Application error 0x0 (local) 2025/12/14 06:35:27 client -> Sending packet 7 (34 bytes) for connection d3154f4c4bda0594392e510caca13092f672b7, 1-RTT (ECN: ECT(0)) 2025/12/14 06:35:27 client Short Header{DestConnectionID: b036a0ace33f7dfd73fe83f4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/14 06:35:27 client -> &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/14 06:35:27 Replacing connection for connection IDs [(empty)] with a closed connection. 2025/12/14 06:35:27 client Connection d3154f4c4bda0594392e510caca13092f672b7 closed.