Using document root /www/ Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:44863 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:44863 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:50061 if=eth0 ecn=0x0 1200 bytes I00000000 0x6ae6f8171027f2e69f097106d09908dcab4f cca bbr enter Startup I00000000 0x6ae6f8171027f2e69f097106d09908dcab4f con next skip pkn=2017920371 I00000000 0x6ae6f8171027f2e69f097106d09908dcab4f con recv packet len=1200 mask=55b3fa96b6 sample=4d6c2bfce91bcce6dc2bf8017913ed6f I00000000 0x6ae6f8171027f2e69f097106d09908dcab4f pkt rx pkn=0 dcid=0xad55e0e2edcae635 scid=0x9f73ea45f6d9ab27 version=0x00000001 type=Initial len=1174 I00000000 0x6ae6f8171027f2e69f097106d09908dcab4f frm rx 0 Initial CRYPTO(0x06) offset=0 len=257 Ordered CRYPTO data in Initial crypto level 00000000 01 00 00 fd 03 03 31 7a be 92 7c b4 cf 65 50 de |......1z..|..eP.| 00000010 e4 b3 0e b6 0b 85 cf bd 65 ca 0f 7f 33 36 21 c4 |........e...36!.| 00000020 fa 6c 82 5c bf 6d 00 00 02 13 03 01 00 00 d2 00 |.l.\.m..........| 00000030 00 00 0c 00 0a 00 00 07 73 65 72 76 65 72 34 00 |........server4.| 00000040 2b 00 03 02 03 04 00 0a 00 04 00 02 00 17 00 0d |+...............| 00000050 00 0e 00 0c 08 04 08 05 08 06 04 03 05 03 06 03 |................| 00000060 00 33 00 47 00 45 00 17 00 41 04 80 86 2e c8 da |.3.G.E...A......| 00000070 87 07 7a e3 5d ac 2c ae 77 60 7b d3 a8 6d f5 5d |..z.].,.w`{..m.]| 00000080 e1 2e dd d1 bc ee d5 cb 95 91 8c d1 8e 7a 31 54 |.............z1T| 00000090 d2 ca 0c 66 13 5b 07 b3 6b 35 a2 29 99 75 3c 75 |...f.[..k5.).u