Using document root /www/ Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:42566 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:42566 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:42566 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:42566 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:42566 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:42566 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 if=eth0 ecn=0x0 1252 bytes I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cca bbr enter Startup I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad con next skip pkn=1707879039 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad con recv packet len=1252 mask=3ea7895b68 sample=4b77f9e718606c3d95dda687cac00f28 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad pkt rx pkn=14467620 dcid=0x1164b6cbb4a0d2c6 scid=0x version=0x00000001 type=Initial len=1234 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467620 Initial CRYPTO(0x06) offset=0 len=310 Ordered CRYPTO data in Initial crypto level 00000000 01 00 01 32 03 03 d1 c2 58 bb 3e 37 54 89 25 f2 |...2....X.>7T.%.| 00000010 ff c2 46 56 a8 bf 16 10 ea 4e da af 1b 72 73 8f |..FV.....N...rs.| 00000020 93 26 18 7b cc 7c 00 00 02 13 01 01 00 01 07 00 |.&.{.|..........| 00000030 2b 00 03 02 03 04 00 0a 00 06 00 04 00 1d 00 17 |+...............| 00000040 00 33 00 6b 00 69 00 17 00 41 04 55 75 13 4d e5 |.3.k.i...A.Uu.M.| 00000050 5b f5 b4 f4 25 62 ea 8d f3 02 86 e6 47 26 3c ec |[...%b......G&<.| 00000060 8f b1 00 e1 14 eb 2a db cd 82 55 2e 8b 7d 23 e4 |......*...U..}#.| 00000070 d1 c8 bf 4b 05 63 aa e8 12 d0 9f 3a 8e 9f d7 ec |...K.c.....:....| 00000080 f3 ca 78 7a 81 43 78 6c 5c e1 b2 00 1d 00 20 27 |..xz.Cxl\..... '| 00000090 2c b7 56 76 80 c5 df 3c 92 f9 e5 d1 a4 5e 97 66 |,.Vv...<.....^.f| 000000a0 c5 b9 a3 23 69 23 a3 03 7f 2f 5f 3f 39 94 62 00 |...#i#.../_?9.b.| 000000b0 0d 00 0a 00 08 04 03 05 03 06 03 08 04 00 00 00 |................| 000000c0 0c 00 0a 00 00 07 73 65 72 76 65 72 34 00 10 00 |......server4...| 000000d0 0d 00 0b 0a 68 71 2d 69 6e 74 65 72 6f 70 00 2d |....hq-interop.-| 000000e0 00 03 02 01 00 00 1b 00 05 04 00 01 00 03 00 39 |...............9| 000000f0 00 44 05 04 86 66 66 66 06 04 86 66 66 66 07 04 |.D...fff...fff..| 00000100 86 66 66 66 04 04 86 66 66 66 08 02 40 64 09 02 |.fff...fff..@d..| 00000110 40 64 01 04 80 00 ea 60 0a 01 03 03 02 45 dc 0e |@d.....`.....E..| 00000120 01 05 0f 00 20 04 80 00 ff ff 8f f0 a0 01 01 00 |.... ...........| 00000130 80 00 51 78 01 01 |..Qx..| 00000136 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad con the negotiated version is 0x00000001 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters initial_source_connection_id=0x I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters initial_max_stream_data_bidi_local=107374182 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters initial_max_stream_data_bidi_remote=107374182 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters initial_max_stream_data_uni=107374182 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters initial_max_data=107374182 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters initial_max_streams_bidi=100 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters initial_max_streams_uni=100 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters max_idle_timeout=60000 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters max_udp_payload_size=1500 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters ack_delay_exponent=3 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters max_ack_delay=25 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters active_connection_id_limit=5 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters disable_active_migration=0 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters max_datagram_frame_size=65535 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad cry remote transport_parameters grease_quic_bit=0 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467620 Initial PADDING(0x00) len=900 I00000000 0x3e9464227139c107e71d0e2d6a71d1942fad pkt read packet 1252 left 0 Set timer=29.999007s I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad pkt tx pkn=1707878878 dcid=0x scid=0x3e9464227139c107e71d0e2d6a71d1942fad version=0x00000001 type=Initial len=0 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 Initial ACK(0x02) largest_ack=14467620 ack_delay=0(0) ack_range_count=0 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 Initial ACK(0x02) range=[14467620..14467620] len=0 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 Initial CRYPTO(0x06) offset=0 len=90 mask=09fd407946 sample=8595fb193469124bc5cbdaa52fcf7d6c I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253861364071 timeout=300 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad pkt tx pkn=1707878878 dcid=0x scid=0x3e9464227139c107e71d0e2d6a71d1942fad version=0x00000001 type=Handshake len=0 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 Handshake CRYPTO(0x06) offset=0 len=705 mask=d2a0ca9711 sample=87c5dc3b4e7baa432dfee4f225ff2fdf I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253861364071 timeout=300 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad pkt tx pkn=1707878878 dcid=0x type=1RTT k=0 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 1RTT NEW_CONNECTION_ID(0x18) seq=4 cid=0x84c9608f964e820ffa4f0225ba4d32dfe13c retire_prior_to=0 stateless_reset_token=0x667a88efc59e24e45f9a05df2e4dd92f I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 1RTT NEW_CONNECTION_ID(0x18) seq=3 cid=0xcda693453f920326409f14784ba995fe4aea retire_prior_to=0 stateless_reset_token=0xca9dd6e07389b472137df6d5888284d4 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 1RTT NEW_CONNECTION_ID(0x18) seq=2 cid=0x91be486ff64e8ce2c31c3b2c379eb0121b98 retire_prior_to=0 stateless_reset_token=0x610bc3689541721add1ff2695336c5b0 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 1RTT NEW_CONNECTION_ID(0x18) seq=1 cid=0x13eda93efca9014ce94b3658fda7e692eee6 retire_prior_to=0 stateless_reset_token=0xb25c4e42208e68512d6a1025ced826aa I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878878 1RTT PADDING(0x00) len=117 mask=bc0e100df3 sample=065f195367597b7700f2d1a29db9be85 I00000001 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253861364071 timeout=300 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 ecn=0x2 1200 bytes Timer has already expired: 0.000213s Timer expired Set timer=0.299714s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 if=eth0 ecn=0x0 99 bytes I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad con recv packet len=99 mask=e053f06f83 sample=3e06a41b31d496cfc0186696c0a7b619 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad pkt rx pkn=14467620 dcid=0x3e9464227139c107e71d0e2d6a71d1942fad scid=0x version=0x00000001 type=Handshake len=72 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467620 Handshake CRYPTO(0x06) offset=0 len=36 Ordered CRYPTO data in Handshake crypto level 00000000 14 00 00 20 12 5a f7 76 40 9a 1d 98 dc 4a 9b 42 |... .Z.v@....J.B| 00000010 e0 79 94 58 15 8a a1 ce dc 02 bf 35 3c e1 8a d5 |.y.X.......5<...| 00000020 c9 7b 02 41 |.{.A| 00000024 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467620 Handshake ACK(0x02) largest_ack=1707878878 ack_delay=0(0) ack_range_count=0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467620 Handshake ACK(0x02) range=[1707878878..1707878878] len=0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=16 ack_delay=0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad con path is not ECN capable I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad cca bbr update min_rtt=32684044 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253659416203 timeout=65 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad pkt read packet 99 left 0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad con processing buffered handshake packet I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad con discarding Initial packet number space I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253684416203 timeout=90 QUIC handshake has completed Negotiated cipher suite is TLS13-AES128-GCM-SHA256 Negotiated ALPN is hq-interop I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad con processing buffered protected packet I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad con discarding Handshake packet number space I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253684416203 timeout=90 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253684416203 timeout=90 Set timer=0.089992s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 if=eth0 ecn=0x0 68 bytes I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad con recv packet len=68 application_traffic rx secret 1 + secret=2eab16214d85824cad668c2d2c063296579d035b2238019f8a191db8baa8251b + key=8dc9f602dd78bb41b6bae69ae62b9608 + iv=5dab3ad34e59e52123468c84 application_traffic tx secret 1 + secret=9f7551e541d2b47b3f6c4cb5bd70b074d1b6a1e2d3c2ddb88ad6af3215c93c53 + key=e0da5575a65381969d1a4fc8fe304f15 + iv=74d0d877db928898857c3748 mask=54fd3558c4 sample=b55e35f222cb1091b5b69bb7aa5f3703 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad pkt rx pkn=14467620 dcid=0x3e9464227139c107e71d0e2d6a71d1942fad type=1RTT k=0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467620 1RTT ACK(0x02) largest_ack=1707878878 ack_delay=0(121) ack_range_count=0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467620 1RTT ACK(0x02) range=[1707878878..1707878878] len=0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad ldc latest_rtt=33 min_rtt=32 smoothed_rtt=32 rttvar=12 ack_delay=0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss detection timer canceled I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467620 1RTT PADDING(0x00) len=16 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad pkt read packet 68 left 0 Set timer=29.999763s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 if=eth0 ecn=0x0 68 bytes I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad con recv packet len=68 mask=da8ba5ba95 sample=179f8c14ef373b64c44007442de52564 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad pkt rx pkn=14467621 dcid=0x3e9464227139c107e71d0e2d6a71d1942fad type=1RTT k=0 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467621 1RTT STREAM(0x0b) id=0x0 fin=1 offset=0 len=17 uni=0 Ordered STREAM data stream_id=0x0 00000000 47 45 54 20 2f 7a 6b 68 72 70 62 62 7a 63 77 0d |GET /zkhrpbbzcw.| 00000010 0a |.| 00000011 http: stream 0x0 submit response headers [:status: 200] I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467621 1RTT PADDING(0x00) len=9 I00000034 0x3e9464227139c107e71d0e2d6a71d1942fad pkt read packet 68 left 0 Set timer=0.003960s I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad con sending PMTUD probe packet len=1406 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad pkt tx pkn=1707878879 dcid=0x type=1RTT k=0 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878879 1RTT PING(0x01) I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878879 1RTT PADDING(0x00) len=1387 mask=290363a93b sample=78547466b95b6adc5f839ef3caf093d3 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253702150864 timeout=107 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad pkt tx pkn=1707878880 dcid=0x type=1RTT k=0 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878880 1RTT HANDSHAKE_DONE(0x1e) I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878880 1RTT NEW_TOKEN(0x07) token=0x363e1d63b637b47875e54e91caa03bfa98770f266a1f881c6bedf6b6c88a2324a4f1d61d38d4296e33 len=41 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878880 1RTT CRYPTO(0x06) offset=0 len=237 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878880 1RTT STREAM(0x0a) id=0x0 fin=0 offset=0 len=893 uni=0 mask=a35a878de4 sample=592b3102a9a9b2e9aac206b4653bbc61 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253702150864 timeout=107 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 ecn=0x0 1406 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 ecn=0x0 1200 bytes Timer has already expired: 0.000186s Timer expired I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad pkt tx pkn=1707878881 dcid=0x type=1RTT k=0 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878881 1RTT STREAM(0x0f) id=0x0 fin=1 offset=893 len=131 uni=0 I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878881 1RTT PADDING(0x00) len=1045 mask=1542883518 sample=f2eed7354e5c737c4377d0f0e284beea I00000035 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253702390955 timeout=107 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 ecn=0x0 1200 bytes Timer has already expired: 0.000061s Timer expired Set timer=0.003607s Timer expired I00000039 0x3e9464227139c107e71d0e2d6a71d1942fad pkt tx pkn=1707878882 dcid=0x type=1RTT k=0 I00000039 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878882 1RTT ACK(0x02) largest_ack=14467621 ack_delay=4(571) ack_range_count=0 I00000039 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878882 1RTT ACK(0x02) range=[14467621..14467620] len=1 I00000039 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878882 1RTT PADDING(0x00) len=13 mask=a155e4be81 sample=a2544009872c4db75c7c174415e47f75 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 ecn=0x0 40 bytes Timer has already expired: 0.000076s Timer expired Set timer=0.102698s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 if=eth0 ecn=0x0 68 bytes I00000067 0x3e9464227139c107e71d0e2d6a71d1942fad con recv packet len=68 mask=84d6477211 sample=934ad76458ad8e4380683dca8286ea23 I00000067 0x3e9464227139c107e71d0e2d6a71d1942fad pkt rx pkn=14467622 dcid=0x3e9464227139c107e71d0e2d6a71d1942fad type=1RTT k=0 I00000067 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467622 1RTT ACK(0x02) largest_ack=1707878880 ack_delay=0(4) ack_range_count=0 I00000067 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467622 1RTT ACK(0x02) range=[1707878880..1707878878] len=2 I00000067 0x3e9464227139c107e71d0e2d6a71d1942fad ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=9 ack_delay=0 I00000067 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253690149127 timeout=62 I00000067 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467622 1RTT PADDING(0x00) len=17 I00000067 0x3e9464227139c107e71d0e2d6a71d1942fad pkt read packet 68 left 0 Set timer=0.062199s I00000068 0x3e9464227139c107e71d0e2d6a71d1942fad con sending PMTUD probe packet len=1444 I00000068 0x3e9464227139c107e71d0e2d6a71d1942fad pkt tx pkn=1707878883 dcid=0x type=1RTT k=0 I00000068 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878883 1RTT PING(0x01) I00000068 0x3e9464227139c107e71d0e2d6a71d1942fad frm tx 1707878883 1RTT PADDING(0x00) len=1425 mask=8d92611cd9 sample=ef8229f6cb59ceec358bb458464d5d40 I00000068 0x3e9464227139c107e71d0e2d6a71d1942fad ldc loss_detection_timer=253722945731 timeout=94 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 ecn=0x0 1444 bytes Timer has already expired: 0.000151s Timer expired Set timer=0.094766s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:49012 if=eth0 ecn=0x0 50 bytes I00000068 0x3e9464227139c107e71d0e2d6a71d1942fad con recv packet len=50 mask=7af46b778f sample=93e6189e90786cfe8685846b66b09b88 I00000068 0x3e9464227139c107e71d0e2d6a71d1942fad pkt rx pkn=14467623 dcid=0x3e9464227139c107e71d0e2d6a71d1942fad type=1RTT k=0 I00000068 0x3e9464227139c107e71d0e2d6a71d1942fad frm rx 14467623 1RTT CONNECTION_CLOSE(0x1d) error_code=(unknown)(0x0) frame_type=0 reason_len=8 reason=[No Error] ngtcp2_conn_read_pkt: ERR_DRAINING Draining period has started (0.2849 seconds) Draining Period is over 0x3e9464227139c107e71d0e2d6a71d1942fad Closing QUIC connection