Using document root /www/ Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:47947 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:47947 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:47947 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:47947 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:47947 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:47947 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:42777 if=eth0 ecn=0x0 1200 bytes I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cca bbr enter Startup I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con next skip pkn=1193249675 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 mask=2ecf0963c6 sample=1d59ca763abe1863ca1f2caebe5c7d16 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt rx pkn=0 dcid=0x15063d3c11de503c scid=0x6b7a85e282ab027e version=0x00000001 type=Initial len=1174 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm rx 0 Initial CRYPTO(0x06) offset=0 len=257 Ordered CRYPTO data in Initial crypto level 00000000 01 00 00 fd 03 03 4d b2 67 0e 99 23 5c 8b b1 e9 |......M.g..#\...| 00000010 c5 49 06 c5 c1 ce 4e 0d 30 b3 f7 dd fc ec a7 8d |.I....N.0.......| 00000020 5f 6c 61 9a 84 e5 00 00 02 13 01 01 00 00 d2 00 |_la.............| 00000030 00 00 0c 00 0a 00 00 07 73 65 72 76 65 72 34 00 |........server4.| 00000040 2b 00 03 02 03 04 00 0a 00 04 00 02 00 17 00 0d |+...............| 00000050 00 0e 00 0c 08 04 08 05 08 06 04 03 05 03 06 03 |................| 00000060 00 33 00 47 00 45 00 17 00 41 04 43 2d 5e 9b aa |.3.G.E...A.C-^..| 00000070 60 eb 82 ce f3 a9 d1 d1 26 cc 78 62 00 55 fd 71 |`.......&.xb.U.q| 00000080 e4 c7 25 6b 81 95 f3 4b 6a 31 bb e3 66 0c 2e fa |..%k...Kj1..f...| 00000090 f6 6e 17 d7 7f 9c 74 3d 09 38 ad 09 76 0c 02 c1 |.n....t=.8..v...| 000000a0 60 14 70 b5 2a bf 0f 55 00 e6 b8 00 2d 00 02 01 |`.p.*..U....-...| 000000b0 01 00 39 00 3b 01 04 80 00 ea 60 03 02 45 dc 04 |..9.;.....`..E..| 000000c0 04 80 26 25 a0 05 04 80 03 d0 90 06 04 80 03 d0 |..&%............| 000000d0 90 07 04 80 03 d0 90 08 01 03 09 01 03 0a 01 03 |................| 000000e0 0b 01 19 0e 01 02 0f 08 6b 7a 85 e2 82 ab 02 7e |........kz.....~| 000000f0 00 10 00 0d 00 0b 0a 68 71 2d 69 6e 74 65 72 6f |.......hq-intero| 00000100 70 |p| 00000101 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con the negotiated version is 0x00000001 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters initial_source_connection_id=0x6b7a85e282ab027e I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters initial_max_stream_data_bidi_local=250000 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters initial_max_stream_data_bidi_remote=250000 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters initial_max_stream_data_uni=250000 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters initial_max_data=2500000 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters initial_max_streams_bidi=3 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters initial_max_streams_uni=3 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters max_idle_timeout=60000 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters max_udp_payload_size=1500 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters ack_delay_exponent=3 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters max_ack_delay=25 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters active_connection_id_limit=2 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters disable_active_migration=0 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters max_datagram_frame_size=0 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 cry remote transport_parameters grease_quic_bit=0 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm rx 0 Initial PADDING(0x00) len=896 I00000000 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt read packet 1200 left 0 Set timer=29.998926s I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt tx pkn=1193249455 dcid=0x6b7a85e282ab027e scid=0xe4a10fdb3a6c3359103fc610caa4220fbc12 version=0x00000001 type=Initial len=0 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249455 Initial ACK(0x02) largest_ack=0 ack_delay=0(0) ack_range_count=0 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249455 Initial ACK(0x02) range=[0..0] len=0 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249455 Initial CRYPTO(0x06) offset=0 len=123 mask=fd63309483 sample=8f4e0feb992b60b96c0740f16ab0d381 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=684206316811 timeout=300 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt tx pkn=1193249455 dcid=0x6b7a85e282ab027e scid=0xe4a10fdb3a6c3359103fc610caa4220fbc12 version=0x00000001 type=Handshake len=0 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249455 Handshake CRYPTO(0x06) offset=0 len=717 mask=ef46f8a9d3 sample=daf07e2078d02b133e1653aee312684c I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=684206316811 timeout=300 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt tx pkn=1193249455 dcid=0x6b7a85e282ab027e type=1RTT k=0 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249455 1RTT NEW_CONNECTION_ID(0x18) seq=1 cid=0x657ea16720a94de89f117a10abfc47740351 retire_prior_to=0 stateless_reset_token=0xb09190b3c5e4c01b43c811644ce7e7a0 I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249455 1RTT PADDING(0x00) len=165 mask=7ccf147051 sample=21040b276c33d5529cd5106f2a0c090d I00000001 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=684206316811 timeout=300 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:42777 ecn=0x2 1200 bytes Timer has already expired: 0.000206s Timer expired Set timer=0.299706s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.224]:59022 if=eth0 ecn=0x0 1200 bytes I00000204 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00000204 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=0.097089s Set timer=0.097047s Timer expired I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss detection timer fired I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc pto_count=1 I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=684506316811 timeout=298 I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt tx pkn=1193249456 dcid=0x6b7a85e282ab027e scid=0xe4a10fdb3a6c3359103fc610caa4220fbc12 version=0x00000001 type=Initial len=0 I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249456 Initial CRYPTO(0x06) offset=0 len=123 mask=19a371a3f2 sample=29e2133becd82a8a5e972717680cf7b3 I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=684506316811 timeout=298 I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt tx pkn=1193249456 dcid=0x6b7a85e282ab027e scid=0xe4a10fdb3a6c3359103fc610caa4220fbc12 version=0x00000001 type=Handshake len=0 I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249456 Handshake CRYPTO(0x06) offset=0 len=717 mask=223ae642d2 sample=11207569c593ea3f33433e8db9ebaa8d I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=684807498095 timeout=600 I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249456 1RTT PADDING(0x00) len=208 mask=3a34c2da8b sample=dad22d6ade4d30301676b50f62d2c32d I00000302 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=684807498095 timeout=600 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:42777 ecn=0x2 1200 bytes Timer has already expired: 0.000269s Timer expired Set timer=0.599677s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.224]:59022 if=eth0 ecn=0x0 1200 bytes I00000605 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00000605 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=0.297633s Set timer=0.297581s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.224]:59022 if=eth0 ecn=0x0 1200 bytes I00000606 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00000606 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=0.296779s Set timer=0.296753s Timer expired I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss detection timer fired I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc pto_count=2 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=685407498095 timeout=599 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt tx pkn=1193249457 dcid=0x6b7a85e282ab027e scid=0xe4a10fdb3a6c3359103fc610caa4220fbc12 version=0x00000001 type=Initial len=0 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249457 Initial CRYPTO(0x06) offset=0 len=123 mask=fe87344dcc sample=f3f3b90916e73cd34252b9bad839e4b7 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=685407498095 timeout=599 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt tx pkn=1193249457 dcid=0x6b7a85e282ab027e scid=0xe4a10fdb3a6c3359103fc610caa4220fbc12 version=0x00000001 type=Handshake len=0 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249457 Handshake CRYPTO(0x06) offset=0 len=717 mask=a6c2238e23 sample=82d4cbb8570675a25739d7bbea7f1b83 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=686008189892 timeout=1200 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 pkt tx pkn=1193249457 dcid=0x6b7a85e282ab027e type=1RTT k=0 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249457 1RTT PING(0x01) I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 frm tx 1193249457 1RTT PADDING(0x00) len=207 mask=d2467da4a0 sample=eb6591215b0d44322c7ddfdc3415b74a I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss_detection_timer=686008189892 timeout=1200 I00000903 0xe4a10fdb3a6c3359103fc610caa4220fbc12 ldc loss detection timer canceled due to amplification limit Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:42777 ecn=0x0 1200 bytes Timer has already expired: 0.000260s Timer expired Set timer=29.097821s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.224]:59022 if=eth0 ecn=0x0 1200 bytes I00001405 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00001405 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=28.595653s Set timer=28.595623s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.224]:59022 if=eth0 ecn=0x0 1200 bytes I00001406 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00001406 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=28.594805s Set timer=28.594784s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.224]:59022 if=eth0 ecn=0x0 1200 bytes I00003007 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00003007 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=26.994572s Set timer=26.994548s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.224]:59022 if=eth0 ecn=0x0 1200 bytes I00003007 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00003007 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=26.993783s Set timer=26.993768s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.71]:39968 if=eth0 ecn=0x0 1200 bytes I00006208 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00006208 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=23.793376s Set timer=23.793342s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.71]:39968 if=eth0 ecn=0x0 1200 bytes I00006209 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00006209 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=23.792564s Set timer=23.792550s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.3]:38910 if=eth0 ecn=0x0 1200 bytes I00012609 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00012609 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=17.392622s Set timer=17.392588s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.3]:38910 if=eth0 ecn=0x0 1200 bytes I00012615 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00012615 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=17.385850s Set timer=17.385830s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.217]:46157 if=eth0 ecn=0x0 1200 bytes I00025416 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00025416 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=4.585434s Set timer=4.585402s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.217]:46157 if=eth0 ecn=0x0 1200 bytes I00025417 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con recv packet len=1200 I00025417 0xe4a10fdb3a6c3359103fc610caa4220fbc12 con ignore packet from unknown path during handshake Set timer=4.584584s Set timer=4.584558s Timer expired ngtcp2_conn_handle_expiry: ERR_IDLE_CLOSE 0xe4a10fdb3a6c3359103fc610caa4220fbc12 Closing QUIC connection