Using document root /www/ Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:41893 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:41893 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:41893 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:41893 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:41893 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:41893 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 if=eth0 ecn=0x2 1200 bytes I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cca bbr enter Startup I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf con next skip pkn=833113189 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf con recv packet len=1200 mask=37355f798a sample=e5bd880c68f69adc488f74f2f9edd6ec I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt rx pkn=0 dcid=0x175cd2d7a59d855e622bac7e89575a9920bc9a85 scid=0xda7551ac8464645d version=0x00000001 type=Initial len=1162 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 Initial CRYPTO(0x06) offset=0 len=286 Ordered CRYPTO data in Initial crypto level 00000000 01 00 01 1a 03 03 59 ca e8 87 43 d8 77 4d d7 a4 |......Y...C.wM..| 00000010 bb 1f 0e ab 85 54 2b b4 45 bb 96 a6 a7 db 35 ae |.....T+.E.....5.| 00000020 ce 56 d1 4e 86 de 00 00 08 13 02 13 01 13 03 00 |.V.N............| 00000030 ff 01 00 00 e9 00 10 00 0d 00 0b 0a 68 71 2d 69 |............hq-i| 00000040 6e 74 65 72 6f 70 00 0b 00 02 01 00 00 2d 00 02 |nterop.......-..| 00000050 01 01 00 2b 00 03 02 03 04 00 17 00 00 00 05 00 |...+............| 00000060 05 01 00 00 00 00 00 0a 00 08 00 06 00 1d 00 17 |................| 00000070 00 18 00 23 00 00 00 00 00 0c 00 0a 00 00 07 73 |...#...........s| 00000080 65 72 76 65 72 34 00 0d 00 14 00 12 05 03 04 03 |erver4..........| 00000090 08 07 08 06 08 05 08 04 06 01 05 01 04 01 00 33 |...............3| 000000a0 00 26 00 24 00 1d 00 20 0d c1 cc 49 04 07 96 ef |.&.$... ...I....| 000000b0 73 d4 dc 24 7e a9 da f7 d5 b0 e5 d7 c4 ae 20 28 |s..$~......... (| 000000c0 7e e1 6f 98 ad 44 fc 36 00 39 00 52 01 04 80 00 |~.o..D.6.9.R....| 000000d0 75 30 03 02 45 c0 04 08 ff ff ff ff ff ff ff ff |u0..E...........| 000000e0 05 04 80 13 12 d0 06 04 80 13 12 d0 07 04 80 13 |................| 000000f0 12 d0 08 02 40 64 09 02 40 64 0e 01 05 40 b6 00 |....@d..@d...@..| 00000100 20 04 80 00 ff ff 0f 08 da 75 51 ac 84 64 64 5d | ........uQ..dd]| 00000110 6a b2 00 c0 00 00 00 ff 04 de 1b 02 43 e8 |j...........C.| 0000011e I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf con the negotiated version is 0x00000001 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters initial_source_connection_id=0xda7551ac8464645d I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters initial_max_stream_data_bidi_local=1250000 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters initial_max_stream_data_bidi_remote=1250000 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters initial_max_stream_data_uni=1250000 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters initial_max_data=4611686018427387903 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters initial_max_streams_bidi=100 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters initial_max_streams_uni=100 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters max_idle_timeout=30000 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters max_udp_payload_size=1472 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters ack_delay_exponent=3 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters max_ack_delay=25 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters active_connection_id_limit=5 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters disable_active_migration=0 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters max_datagram_frame_size=65535 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf cry remote transport_parameters grease_quic_bit=1 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 Initial PADDING(0x00) len=855 I00000000 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt read packet 1200 left 0 Set timer=29.999030s I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt tx pkn=833112964 dcid=0xda7551ac8464645d scid=0x4ae90658ed4e27906605fae8803ee2fdb3cf version=0x00000001 type=Initial len=0 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 Initial ACK(0x03) largest_ack=0 ack_delay=0(0) ack_range_count=0 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 Initial ACK(0x03) range=[0..0] len=0 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 Initial ACK(0x03) ect0=1 ect1=0 ce=0 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 Initial CRYPTO(0x06) offset=0 len=90 mask=f25e314cd7 sample=13d554562b58cac278bc1d9f343319d9 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754880296804 timeout=300 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt tx pkn=833112964 dcid=0xda7551ac8464645d scid=0x4ae90658ed4e27906605fae8803ee2fdb3cf version=0x00000001 type=Handshake len=0 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 Handshake CRYPTO(0x06) offset=0 len=716 mask=7ba76af525 sample=f6968bef53ae4d3aa53cfa8002f05feb I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754880296804 timeout=300 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt tx pkn=833112964 dcid=0xda7551ac8464645d type=1RTT k=0 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 1RTT NEW_CONNECTION_ID(0x18) seq=4 cid=0xfd8ef63f01093b37e51444ff88bce799470e retire_prior_to=0 stateless_reset_token=0xaad4a491fce047257836e8ee573473d5 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 1RTT NEW_CONNECTION_ID(0x18) seq=3 cid=0x5b2a4856c438b0b9ab749fa00123685a4ee3 retire_prior_to=0 stateless_reset_token=0xc4f87c18490a54db555e95f1c3df1ec6 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 1RTT NEW_CONNECTION_ID(0x18) seq=2 cid=0xbd50ac94048cdfa0a177410bb59f38f69e49 retire_prior_to=0 stateless_reset_token=0xffb94a033a8b00fe3bf19453441a72ad I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 1RTT NEW_CONNECTION_ID(0x18) seq=1 cid=0xeae04c18279f3cb109ea86d3d25dccf6e335 retire_prior_to=0 stateless_reset_token=0xae247980ab798f29108d11a09b5ba0cb I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112964 1RTT PADDING(0x00) len=82 mask=1b7a3c7725 sample=bc4a9018655bb46e8f337bfbcda04e54 I00000001 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754880296804 timeout=300 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 ecn=0x2 1200 bytes Timer has already expired: 0.000236s Timer expired Set timer=0.299690s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 if=eth0 ecn=0x2 1200 bytes I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf con recv packet len=1200 mask=55c343fdfc sample=ef2ed488364949ad0d3e596384815909 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt rx pkn=1 dcid=0x4ae90658ed4e27906605fae8803ee2fdb3cf scid=0xda7551ac8464645d version=0x00000001 type=Initial len=28 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 Initial ACK(0x03) largest_ack=833112964 ack_delay=0(0) ack_range_count=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 Initial ACK(0x03) range=[833112964..833112964] len=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 Initial ACK(0x03) ect0=1 ect1=0 ce=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=16 ack_delay=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf con path is ECN capable I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf cca bbr update min_rtt=32902675 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754679004827 timeout=65 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt read packet 64 left 1136 mask=aee5e89eb7 sample=80e171a4a14e0ed03ac0363bf4bb90aa I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt rx pkn=0 dcid=0x4ae90658ed4e27906605fae8803ee2fdb3cf scid=0xda7551ac8464645d version=0x00000001 type=Handshake len=67 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 Handshake ACK(0x03) largest_ack=833112964 ack_delay=0(0) ack_range_count=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 Handshake ACK(0x03) range=[833112964..833112964] len=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 Handshake ACK(0x03) ect0=1 ect1=0 ce=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=12 ack_delay=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss detection timer canceled I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 Handshake CRYPTO(0x06) offset=0 len=36 Ordered CRYPTO data in Handshake crypto level 00000000 14 00 00 20 b9 15 3f 1f 95 86 db 20 ba 90 53 83 |... ..?.... ..S.| 00000010 58 4e c2 74 48 72 89 b7 93 3b 71 2f f2 5d 92 f0 |XN.tHr...;q/.]..| 00000020 ea 75 0f 1e |.u..| 00000024 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt read packet 102 left 1034 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf con processing buffered handshake packet I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf con discarding Initial packet number space I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754687553487 timeout=74 QUIC handshake has completed Negotiated cipher suite is TLS13-AES128-GCM-SHA256 Negotiated ALPN is hq-interop I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf con processing buffered protected packet I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf con discarding Handshake packet number space I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754687553487 timeout=74 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754687553487 timeout=74 mask=c6bd214ecb sample=10f8aecaf3fd531aa15ea71ee6fe0588 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt rx pkn=0 dcid=0x4ae90658ed4e27906605fae8803ee2fdb3cf type=1RTT k=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 1RTT ACK(0x03) largest_ack=833112964 ack_delay=0(31) ack_range_count=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 1RTT ACK(0x03) range=[833112964..833112964] len=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 1RTT ACK(0x03) ect0=1 ect1=0 ce=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=9 ack_delay=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss detection timer canceled I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 0 1RTT PADDING(0x00) len=987 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt read packet 1034 left 0 Set timer=29.999579s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 if=eth0 ecn=0x2 204 bytes I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf con recv packet len=204 application_traffic rx secret 1 + secret=67252f1859f754817d4203d3d3567dc6894463204d818de9b6ca74b95d648fa7 + key=a04b67a678eeed7249e4e96897038023 + iv=78a479a7c63d0c921b18f5bc application_traffic tx secret 1 + secret=997ac4a425e168e10d02fff136f198fd42a6a365fff6511e36f1e94e54970c19 + key=b6e9c59aef7f8975b8f47c35dbfc4915 + iv=a7faa0d5f1afd8882e3c35d6 mask=0dd32b9c28 sample=b8b3ebfa756a9cc1fdf268b44ba9066c I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt rx pkn=1 dcid=0x4ae90658ed4e27906605fae8803ee2fdb3cf type=1RTT k=0 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 1RTT NEW_CONNECTION_ID(0x18) seq=1 cid=0x771ec010d277d59e retire_prior_to=0 stateless_reset_token=0x9fee273b80897ba138d3e1b8285cf10e I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 1RTT NEW_CONNECTION_ID(0x18) seq=2 cid=0x4e441ec292287746 retire_prior_to=0 stateless_reset_token=0x7cad2132bf6f7398e8574ed889c07d61 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 1RTT NEW_CONNECTION_ID(0x18) seq=3 cid=0x679932de760bb904 retire_prior_to=0 stateless_reset_token=0x7b6363d62f83899f1ba1fc781f2f9de5 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 1RTT NEW_CONNECTION_ID(0x18) seq=4 cid=0x1985a645b27ab5e8 retire_prior_to=0 stateless_reset_token=0xa419c240e3f912021a3de72a639e5adc I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 1RTT NEW_CONNECTION_ID(0x18) seq=5 cid=0x1ad8931bbdcdff60 retire_prior_to=0 stateless_reset_token=0x182c38b6af9d0b57c94f036c815dac02 I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 1 1RTT NEW_CONNECTION_ID(0x18) seq=6 cid=0x722d6efa0908986c retire_prior_to=0 stateless_reset_token=0xc5e01329864463b401014c4ff449d6ed I00000034 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt read packet 204 left 0 Set timer=0.003918s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 if=eth0 ecn=0x2 56 bytes I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf con recv packet len=56 mask=d64b26cb68 sample=590ee2221abeb0c0e44e49dc4f77e0db I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt rx pkn=2 dcid=0x4ae90658ed4e27906605fae8803ee2fdb3cf type=1RTT k=0 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 2 1RTT STREAM(0x0b) id=0x0 fin=1 offset=0 len=17 uni=0 Ordered STREAM data stream_id=0x0 00000000 47 45 54 20 2f 68 75 68 6e 6a 64 67 67 77 77 0d |GET /huhnjdggww.| 00000010 0a |.| 00000011 http: stream 0x0 submit response headers [:status: 200] I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt read packet 56 left 0 Set timer=0.003745s I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf con sending PMTUD probe packet len=1406 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt tx pkn=833112965 dcid=0xda7551ac8464645d type=1RTT k=0 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112965 1RTT PING(0x01) I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112965 1RTT PADDING(0x00) len=1379 mask=78d78661ca sample=6caa5fb818dbf21eeee679e646933464 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754708981704 timeout=94 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt tx pkn=833112966 dcid=0xda7551ac8464645d type=1RTT k=0 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112966 1RTT ACK(0x03) largest_ack=2 ack_delay=0(17) ack_range_count=0 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112966 1RTT ACK(0x03) range=[2..0] len=2 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112966 1RTT ACK(0x03) ect0=3 ect1=0 ce=0 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112966 1RTT HANDSHAKE_DONE(0x1e) I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112966 1RTT NEW_TOKEN(0x07) token=0x36d2afcc7cb5ddf146d76c50c66a68a2c45b8befffd88c9e056b418092b3888170fb1b327a9cee13c1 len=41 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112966 1RTT CRYPTO(0x06) offset=0 len=237 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112966 1RTT STREAM(0x0a) id=0x0 fin=0 offset=0 len=877 uni=0 mask=c5f2343bd6 sample=99905c3815d5e19bcded75121b3c564d I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754708981704 timeout=94 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 ecn=0x2 1406 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 ecn=0x2 1200 bytes Timer has already expired: 0.000187s Timer expired I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt tx pkn=833112967 dcid=0xda7551ac8464645d type=1RTT k=0 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112967 1RTT STREAM(0x0f) id=0x0 fin=1 offset=877 len=147 uni=0 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112967 1RTT PADDING(0x00) len=1021 mask=6130eaa595 sample=b79534cd64db7644332c3accfb01b3c6 I00000035 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754709222815 timeout=94 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 ecn=0x2 1200 bytes Timer has already expired: 0.000084s Timer expired Set timer=0.094558s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 if=eth0 ecn=0x2 47 bytes I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf con recv packet len=47 mask=422bb0c643 sample=f1814054d58dc7c4a9aa2d7e46b2adb6 I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt rx pkn=3 dcid=0x4ae90658ed4e27906605fae8803ee2fdb3cf type=1RTT k=0 I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 3 1RTT ACK(0x03) largest_ack=833112966 ack_delay=0(4) ack_range_count=0 I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 3 1RTT ACK(0x03) range=[833112966..833112965] len=1 I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 3 1RTT ACK(0x03) ect0=3 ect1=0 ce=0 I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=6 ack_delay=0 I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf cca bbr update min_rtt=32725757 I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754700123740 timeout=53 I00000067 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt read packet 47 left 0 Set timer=0.053277s I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf con sending PMTUD probe packet len=1444 I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt tx pkn=833112968 dcid=0xda7551ac8464645d type=1RTT k=0 I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112968 1RTT PING(0x01) I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm tx 833112968 1RTT PADDING(0x00) len=1417 mask=c2b240b1c0 sample=25f4aa08c7fbf503daf093fba58ff20e I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754732681543 timeout=85 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 ecn=0x2 1444 bytes Timer has already expired: 0.000063s Timer expired Set timer=0.085718s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 if=eth0 ecn=0x2 50 bytes I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf con recv packet len=50 mask=d41b1220df sample=de42b997ee6d02a426e807c2203a123d I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf pkt rx pkn=4 dcid=0x4ae90658ed4e27906605fae8803ee2fdb3cf type=1RTT k=0 I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 4 1RTT ACK(0x03) largest_ack=833112967 ack_delay=0(13) ack_range_count=0 I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 4 1RTT ACK(0x03) range=[833112967..833112965] len=2 I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 4 1RTT ACK(0x03) ect0=4 ect1=0 ce=0 I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc latest_rtt=33 min_rtt=32 smoothed_rtt=32 rttvar=5 ack_delay=0 QUIC stream 0 closed HTTP stream 0 closed with error code 0 I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf ldc loss_detection_timer=754726254722 timeout=78 I00000068 0x4ae90658ed4e27906605fae8803ee2fdb3cf frm rx 4 1RTT CONNECTION_CLOSE(0x1d) error_code=(unknown)(0x0) frame_type=0 reason_len=0 reason=[] ngtcp2_conn_read_pkt: ERR_DRAINING Draining period has started (0.238177 seconds) Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:34248 if=eth0 ecn=0x2 51 bytes Draining Period is over 0x4ae90658ed4e27906605fae8803ee2fdb3cf Closing QUIC connection