Using document root /www/ Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:51718 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:51718 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:51718 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:51718 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:51718 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:51718 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:52298 if=eth0 ecn=0x0 1200 bytes I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cca bbr enter Startup I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con next skip pkn=1512612753 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=1200 mask=95053093b3 sample=3e399d1a103b76f8a0c7405af5d9249d I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt rx pkn=0 dcid=0x22bd3592370fcda0 scid=0x35f603ac35344073 version=0x00000001 type=Initial len=1174 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm rx 0 Initial CRYPTO(0x06) offset=0 len=257 Ordered CRYPTO data in Initial crypto level 00000000 01 00 00 fd 03 03 de 41 a0 84 9d 7e 1f 03 9f e9 |.......A...~....| 00000010 5c ab 33 5b 0f 3f db a7 06 3d 02 43 cf 74 ee 6c |\.3[.?...=.C.t.l| 00000020 ca 1e 9b ac 8c 23 00 00 02 13 01 01 00 00 d2 00 |.....#..........| 00000030 00 00 0c 00 0a 00 00 07 73 65 72 76 65 72 34 00 |........server4.| 00000040 2b 00 03 02 03 04 00 0a 00 04 00 02 00 17 00 0d |+...............| 00000050 00 0e 00 0c 08 04 08 05 08 06 04 03 05 03 06 03 |................| 00000060 00 33 00 47 00 45 00 17 00 41 04 4d 7c 89 48 f6 |.3.G.E...A.M|.H.| 00000070 df 53 a2 de 34 78 2f a8 2d 22 02 01 f2 b7 58 95 |.S..4x/.-"....X.| 00000080 16 f0 43 72 0e 48 13 66 81 11 c1 1a df 95 f9 5b |..Cr.H.f.......[| 00000090 59 c4 dc 3f b5 59 53 78 a9 e2 82 78 c4 4b ef 53 |Y..?.YSx...x.K.S| 000000a0 7d 68 9a b0 65 ae 3e ae a5 6e 3f 00 2d 00 02 01 |}h..e.>..n?.-...| 000000b0 01 00 39 00 3b 01 04 80 00 ea 60 03 02 45 dc 04 |..9.;.....`..E..| 000000c0 04 80 26 25 a0 05 04 80 03 d0 90 06 04 80 03 d0 |..&%............| 000000d0 90 07 04 80 03 d0 90 08 01 03 09 01 03 0a 01 03 |................| 000000e0 0b 01 19 0e 01 02 0f 08 35 f6 03 ac 35 34 40 73 |........5...54@s| 000000f0 00 10 00 0d 00 0b 0a 68 71 2d 69 6e 74 65 72 6f |.......hq-intero| 00000100 70 |p| 00000101 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con the negotiated version is 0x00000001 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters initial_source_connection_id=0x35f603ac35344073 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters initial_max_stream_data_bidi_local=250000 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters initial_max_stream_data_bidi_remote=250000 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters initial_max_stream_data_uni=250000 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters initial_max_data=2500000 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters initial_max_streams_bidi=3 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters initial_max_streams_uni=3 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters max_idle_timeout=60000 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters max_udp_payload_size=1500 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters ack_delay_exponent=3 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters max_ack_delay=25 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters active_connection_id_limit=2 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters disable_active_migration=0 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters max_datagram_frame_size=0 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cry remote transport_parameters grease_quic_bit=0 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm rx 0 Initial PADDING(0x00) len=896 I00000000 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt read packet 1200 left 0 Set timer=29.998983s I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612736 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Initial len=0 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612736 Initial ACK(0x02) largest_ack=0 ack_delay=0(0) ack_range_count=0 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612736 Initial ACK(0x02) range=[0..0] len=0 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612736 Initial CRYPTO(0x06) offset=0 len=123 mask=1fa224e427 sample=87af0c8d2d3f184201e58e04403b59b3 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=638911585090 timeout=300 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612736 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612736 Handshake CRYPTO(0x06) offset=0 len=718 mask=5ad9a17fbd sample=09f980d037dd886f55af5552ddc367b8 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=638911585090 timeout=300 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612736 dcid=0x35f603ac35344073 type=1RTT k=0 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612736 1RTT NEW_CONNECTION_ID(0x18) seq=1 cid=0xb718f49b861d31fa90d54d2e948a1bb51cb2 retire_prior_to=0 stateless_reset_token=0x0e26e1f763fae42110c518ba9a2b6f46 I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612736 1RTT PADDING(0x00) len=164 mask=4134e612a5 sample=841f78dbe3fee5de2774304093275efa I00000001 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=638911585090 timeout=300 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:52298 ecn=0x2 1200 bytes Timer has already expired: 0.000198s Timer expired Set timer=0.299730s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:52298 if=eth0 ecn=0x0 1201 bytes I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=1201 mask=e0607e520c sample=c09d1e1d49535b7deeac30e565c8adcc I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt rx pkn=1 dcid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca scid=0x35f603ac35344073 version=0x00000001 type=Initial len=1165 I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm rx 1 Initial ACK(0x02) largest_ack=1512612736 ack_delay=0(0) ack_range_count=0 I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm rx 1 Initial ACK(0x02) range=[1512612736..1512612736] len=0 I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc latest_rtt=84 min_rtt=84 smoothed_rtt=84 rttvar=42 ack_delay=0 I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con path is not ECN capable I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca cca bbr update min_rtt=84037384 I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=638863697242 timeout=168 I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm rx 1 Initial PADDING(0x00) len=1136 I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt read packet 1201 left 0 I00000085 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con processing buffered handshake packet Set timer=0.167967s Set timer=0.167930s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00000124 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00000124 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.129005s Set timer=0.128954s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 63 bytes I00000131 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=63 I00000131 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.122122s Set timer=0.122086s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 49 bytes I00000149 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=49 I00000149 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.103883s Set timer=0.103853s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 69 bytes I00000158 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=69 I00000158 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.095271s Set timer=0.095240s Timer expired I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss detection timer fired I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc pto_count=1 I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=639115809394 timeout=251 I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612737 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612737 Handshake CRYPTO(0x06) offset=0 len=718 mask=52d72c499c sample=d3cbce8154d75661822d1a4570036710 I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=639368886918 timeout=504 I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612738 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612738 Handshake CRYPTO(0x06) offset=0 len=718 mask=2829c2fbbd sample=0a00d2b354e5dd94e85b9f8d011809e4 I00000254 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=639368886918 timeout=504 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:52298 ecn=0x0 1558 bytes Timer has already expired: 0.000245s Timer expired Set timer=0.503906s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00000275 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00000275 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.483206s Set timer=0.483179s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00000505 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00000505 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.253017s Set timer=0.252979s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00000506 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00000506 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.252239s Set timer=0.252218s Timer expired I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss detection timer fired I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc pto_count=2 I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=639873111222 timeout=503 I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612739 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612739 Handshake CRYPTO(0x06) offset=0 len=718 mask=60c008605e sample=a02abf902602b14dc7221db5dffca8b5 I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=640378503136 timeout=1008 I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612740 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612740 Handshake CRYPTO(0x06) offset=0 len=718 mask=c75b3cfed0 sample=1e4a1ccff724559e3063953a8743fa94 I00000759 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=640378503136 timeout=1008 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:52298 ecn=0x0 1558 bytes Timer has already expired: 0.000217s Timer expired Set timer=1.008180s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00000966 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00000966 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.801637s Set timer=0.801603s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00000967 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00000967 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.800947s Set timer=0.800901s Timer expired I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss detection timer fired I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc pto_count=3 I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=641386951744 timeout=1007 I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612741 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612741 Handshake CRYPTO(0x06) offset=0 len=718 mask=f5fbd3ce7e sample=d3b6f0bf6d652028891dc935852cb348 I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=642396427169 timeout=2016 I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612742 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612742 Handshake CRYPTO(0x06) offset=0 len=718 mask=356cf66246 sample=b146993370bf3bf52b6754923b04a484 I00001769 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=642396427169 timeout=2016 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:52298 ecn=0x0 1558 bytes Timer has already expired: 0.000247s Timer expired Set timer=2.016586s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00001887 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00001887 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=1.898725s Set timer=1.898691s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00001888 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00001888 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=1.897948s Set timer=1.897930s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00003728 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00003728 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.057718s Set timer=0.057673s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:57607 if=eth0 ecn=0x0 90 bytes I00003729 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00003729 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.057010s Set timer=0.056986s Timer expired I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss detection timer fired I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc pto_count=4 I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=644413324385 timeout=2016 I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612743 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612743 Handshake CRYPTO(0x06) offset=0 len=718 mask=99911d4ad9 sample=3f7d78d44a5e90b92ee4c6911ba70a95 I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=646430398076 timeout=4033 I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca pkt tx pkn=1512612744 dcid=0x35f603ac35344073 scid=0x8ac0d71246c0266ddb4ae68f5cd3b38344ca version=0x00000001 type=Handshake len=0 I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca frm tx 1512612744 Handshake CRYPTO(0x06) offset=0 len=489 mask=4577f20b21 sample=d878dbf0625d0a52b20362419d00b44c I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss_detection_timer=646430398076 timeout=4033 I00003786 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca ldc loss detection timer canceled due to amplification limit Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:52298 ecn=0x0 1329 bytes Timer has already expired: 0.000194s Timer expired Set timer=26.467825s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:59022 if=eth0 ecn=0x0 90 bytes I00007409 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00007409 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=22.845033s Set timer=22.845005s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:59022 if=eth0 ecn=0x0 90 bytes I00007410 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00007410 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=22.844278s Set timer=22.844252s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:18108 if=eth0 ecn=0x0 90 bytes I00014770 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00014770 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=15.484147s Set timer=15.484118s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:18108 if=eth0 ecn=0x0 90 bytes I00014771 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00014771 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=15.483380s Set timer=15.483353s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:38910 if=eth0 ecn=0x0 90 bytes I00029491 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00029491 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.763209s Set timer=0.763176s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:38910 if=eth0 ecn=0x0 90 bytes I00029492 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con recv packet len=90 I00029492 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca con ignore packet from unknown path during handshake Set timer=0.762485s Set timer=0.762465s Timer expired ngtcp2_conn_handle_expiry: ERR_IDLE_CLOSE 0x8ac0d71246c0266ddb4ae68f5cd3b38344ca Closing QUIC connection