2025/04/30 09:22:02 Increased receive buffer size to 14336 kiB 2025/04/30 09:22:02 Increased send buffer size to 14336 kiB 2025/04/30 09:22:02 Setting DF for IPv4 and IPv6. 2025/04/30 09:22:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:22:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:22:02 server Listening for udp connections on [::]:443 2025/04/30 09:22:02 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:22:02 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:22:02 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:22:04 server <- Received Initial packet. 2025/04/30 09:22:04 Created qlog file: /logs/qlog/2b46ef5592045c84.sqlog 2025/04/30 09:22:04 server Changing connection ID to 3f126aeb. 2025/04/30 09:22:04 Adding connection IDs 2b46ef5592045c84 and 3f126aeb for a new connection. 2025/04/30 09:22:04 server Parsed a coalesced packet. Part 1: 530 bytes. Remaining: 670 bytes. 2025/04/30 09:22:04 server <- Reading packet 0 (530 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:04 server Long Header{Type: Initial, DestConnectionID: 2b46ef5592045c84, SrcConnectionID: f08deba1d33a47c2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 504, Version: v1} 2025/04/30 09:22:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 482, Offset + Data length: 482} 2025/04/30 09:22:04 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:22:04 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:22:04 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:22:04 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f08deba1d33a47c2, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 128, MaxUniStreamNum: 128, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 09:22:04 Adding connection ID 60d98cd4. 2025/04/30 09:22:04 Adding connection ID 9cde9524. 2025/04/30 09:22:04 Adding connection ID 0d21b708. 2025/04/30 09:22:04 Adding connection ID ad9dcf0a. 2025/04/30 09:22:04 Adding connection ID d7fde60e. 2025/04/30 09:22:04 server coalesced packet has different destination connection ID: 00000000, expected 2b46ef5592045c84 2025/04/30 09:22:04 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2b46ef5592045c84 2025/04/30 09:22:04 server Long Header{Type: Initial, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 357, Version: v1} 2025/04/30 09:22:04 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:22:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:22:04 server Long Header{Type: Handshake, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 09:22:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:22:04 server Short Header{DestConnectionID: f08deba1d33a47c2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ad9dcf0a, StatelessResetToken: 0xae6dbed5aedb7a8ad4dcdaf56a520a7c} 2025/04/30 09:22:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0d21b708, StatelessResetToken: 0x9ce6730002d838adea477e774756ee11} 2025/04/30 09:22:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9cde9524, StatelessResetToken: 0x73adb9834b5f69c3b6832a2980f03c28} 2025/04/30 09:22:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d7fde60e, StatelessResetToken: 0x2e0d384479e9762c327304c25dd383a5} 2025/04/30 09:22:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60d98cd4, StatelessResetToken: 0x143f6d2912c9beffd782f29bb16ed15a} 2025/04/30 09:22:04 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 09:22:04 server Parsed a coalesced packet. Part 1: 530 bytes. Remaining: 670 bytes. 2025/04/30 09:22:04 server <- Reading packet 1 (530 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:04 server Long Header{Type: Initial, DestConnectionID: 2b46ef5592045c84, SrcConnectionID: f08deba1d33a47c2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 504, Version: v1} 2025/04/30 09:22:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 482, Offset + Data length: 482} 2025/04/30 09:22:04 server coalesced packet has different destination connection ID: 00000000, expected 2b46ef5592045c84 2025/04/30 09:22:04 server -> Sending packet 1 (45 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:04 server Long Header{Type: Initial, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 09:22:04 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:22:04 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:22:04 server -> Sending packet 2 (1280 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:04 server Long Header{Type: Initial, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:22:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:22:04 server -> Sending packet 3 (1280 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:04 server Long Header{Type: Initial, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:22:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:22:04 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:22:04 server -> Sending packet 1 (754 bytes) for connection 2b46ef5592045c84, Handshake 2025/04/30 09:22:04 server Long Header{Type: Handshake, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 09:22:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:22:04 server -> Sending packet 2 (754 bytes) for connection 2b46ef5592045c84, Handshake 2025/04/30 09:22:04 server Long Header{Type: Handshake, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 09:22:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:22:04 server Parsed a coalesced packet. Part 1: 530 bytes. Remaining: 670 bytes. 2025/04/30 09:22:04 server <- Reading packet 2 (530 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:04 server Long Header{Type: Initial, DestConnectionID: 2b46ef5592045c84, SrcConnectionID: f08deba1d33a47c2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 504, Version: v1} 2025/04/30 09:22:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 482, Offset + Data length: 482} 2025/04/30 09:22:04 server coalesced packet has different destination connection ID: 00000000, expected 2b46ef5592045c84 2025/04/30 09:22:04 server -> Sending packet 4 (45 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:04 server Long Header{Type: Initial, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 09:22:04 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:22:05 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:22:05 server -> Sending packet 5 (1280 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:05 server Long Header{Type: Initial, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:22:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:22:05 server -> Sending packet 6 (1280 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:05 server Long Header{Type: Initial, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 09:22:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 09:22:05 server Parsed a coalesced packet. Part 1: 530 bytes. Remaining: 670 bytes. 2025/04/30 09:22:05 server <- Reading packet 3 (530 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:05 server Long Header{Type: Initial, DestConnectionID: 2b46ef5592045c84, SrcConnectionID: f08deba1d33a47c2, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 504, Version: v1} 2025/04/30 09:22:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 482, Offset + Data length: 482} 2025/04/30 09:22:05 server coalesced packet has different destination connection ID: 00000000, expected 2b46ef5592045c84 2025/04/30 09:22:05 server -> Sending packet 7 (45 bytes) for connection 2b46ef5592045c84, Initial 2025/04/30 09:22:05 server Long Header{Type: Initial, DestConnectionID: f08deba1d33a47c2, SrcConnectionID: 3f126aeb, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 09:22:05 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 09:22:05 server Parsed a coalesced packet. Part 1: 46 bytes. Remaining: 1154 bytes. 2025/04/30 09:22:05 server <- Reading packet 4 (46 bytes) for connection 3f126aeb, Initial 2025/04/30 09:22:05 server Long Header{Type: Initial, DestConnectionID: 3f126aeb, SrcConnectionID: f08deba1d33a47c2, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 24, Version: v1} 2025/04/30 09:22:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 09:22:05 server Parsed a coalesced packet. Part 2: 85 bytes. Remaining: 1069 bytes. 2025/04/30 09:22:05 server <- Reading packet 5 (85 bytes) for connection 3f126aeb, Handshake 2025/04/30 09:22:05 server Long Header{Type: Handshake, DestConnectionID: 3f126aeb, SrcConnectionID: f08deba1d33a47c2, PacketNumber: 5, PacketNumberLen: 2, Length: 64, Version: v1} 2025/04/30 09:22:05 server Dropping Initial keys. 2025/04/30 09:22:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 09:22:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:22:05 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:22:05 Retiring connection ID 2b46ef5592045c84 in 5s. 2025/04/30 09:22:05 server Dropping Handshake keys. 2025/04/30 09:22:05 server <- Reading packet 6 (1069 bytes) for connection 3f126aeb, 1-RTT 2025/04/30 09:22:05 server Short Header{DestConnectionID: 3f126aeb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2ms} 2025/04/30 09:22:05 server newly acked packets (1): [0] 2025/04/30 09:22:05 server updated RTT: 1.505043926s (σ: 752.521963ms) 2025/04/30 09:22:05 server Canceling loss detection timer. 2025/04/30 09:22:05 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 702ef5471becc6e7, StatelessResetToken: 0x13e22c22006a51024bfd572509118632} 2025/04/30 09:22:05 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aeaacb1cc666b680, StatelessResetToken: 0x6b5485759cffd9efd6aa74169458df4b} 2025/04/30 09:22:05 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9d170b6ad7235667, StatelessResetToken: 0x3c066a677804034c6fe307fb7bbbcbd8} 2025/04/30 09:22:05 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:22:05 server <- Reading packet 7 (44 bytes) for connection 3f126aeb, 1-RTT 2025/04/30 09:22:05 server Short Header{DestConnectionID: 3f126aeb, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:05 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:22:05 server -> Sending packet 1 (263 bytes) for connection 2b46ef5592045c84, 1-RTT (ECN: ECT(0)) 2025/04/30 09:22:05 server Short Header{DestConnectionID: 702ef5471becc6e7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:05 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 372.597µs} 2025/04/30 09:22:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:22:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:22:05 server -> &wire.NewTokenFrame{Token: 0x0ecc6464a099135f8882746efba0327d834932e50e3f522ec13be4ef285415c7f7db2d9115bc57d074d7fa771918a02f492e30766614413aa859abb7281e9c9bdc7cb7542625239c1f4698f7c648709ceffd9ae4ceb7} 2025/04/30 09:22:05 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:22:05 Received request: GET /gjrbamjdjk 2025/04/30 09:22:05 server -> Sending packet 2 (1053 bytes) for connection 2b46ef5592045c84, 1-RTT (ECN: ECT(0)) 2025/04/30 09:22:05 server Short Header{DestConnectionID: 702ef5471becc6e7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:22:05 server Dropping %!s(logging.PacketType=1) packet (79 bytes) because we already dropped the keys. 2025/04/30 09:22:05 server Dropping %!s(logging.PacketType=1) packet (44 bytes) because we already dropped the keys. 2025/04/30 09:22:05 server Dropping %!s(logging.PacketType=1) packet (44 bytes) because we already dropped the keys. 2025/04/30 09:22:06 Tracking 7 connection IDs and 1 reset tokens. 2025/04/30 09:22:06 server Dropping %!s(logging.PacketType=1) packet (79 bytes) because we already dropped the keys. 2025/04/30 09:22:06 server Dropping %!s(logging.PacketType=1) packet (79 bytes) because we already dropped the keys. 2025/04/30 09:22:07 server <- Reading packet 13 (51 bytes) for connection 3f126aeb, 1-RTT 2025/04/30 09:22:07 server Short Header{DestConnectionID: 3f126aeb, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:07 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 482711880335047f, StatelessResetToken: 0x61df542c603164e5b68c3d7da1fb0e5e} 2025/04/30 09:22:07 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:22:07 server -> Sending packet 3 (34 bytes) for connection 2b46ef5592045c84, 1-RTT (ECN: ECT(0)) 2025/04/30 09:22:07 server Short Header{DestConnectionID: 702ef5471becc6e7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:07 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 7, Smallest: 6}}, DelayTime: 87.153µs} 2025/04/30 09:22:07 server <- Reading packet 14 (28 bytes) for connection 3f126aeb, 1-RTT 2025/04/30 09:22:07 server Short Header{DestConnectionID: 3f126aeb, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:07 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 88µs} 2025/04/30 09:22:07 server newly acked packets (2): [1 2] 2025/04/30 09:22:07 server updated RTT: 1.504645s (σ: 565.185ms) 2025/04/30 09:22:07 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 09:22:07 server Canceling loss detection timer. 2025/04/30 09:22:07 server Ignoring all packets below 8. 2025/04/30 09:22:07 server -> Sending packet 4 (30 bytes) for connection 2b46ef5592045c84, 1-RTT (ECN: Not-ECT) 2025/04/30 09:22:07 server Short Header{DestConnectionID: 702ef5471becc6e7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:07 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:22:07 server <- Reading packet 15 (27 bytes) for connection 3f126aeb, 1-RTT 2025/04/30 09:22:07 server Short Header{DestConnectionID: 3f126aeb, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:07 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x100, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:22:07 server Closing connection with error: Application error 0x100 (remote) 2025/04/30 09:22:07 Replacing connection for connection IDs [9cde9524 0d21b708 ad9dcf0a d7fde60e 3f126aeb 60d98cd4] with a closed connection. 2025/04/30 09:22:07 server Connection 2b46ef5592045c84 closed. 2025/04/30 09:22:07 Error accepting stream: Application error 0x100 (remote) 2025/04/30 09:22:08 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 09:22:10 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 09:22:10 Removing connection ID 2b46ef5592045c84 after it has been retired. 2025/04/30 09:22:12 Removing connection IDs [9cde9524 0d21b708 ad9dcf0a d7fde60e 3f126aeb 60d98cd4] for a closed connection after it has been retired. 2025/04/30 09:22:12 Tracking 0 connection IDs and 0 reset tokens.