2025/04/30 12:37:26 Increased receive buffer size to 14336 kiB 2025/04/30 12:37:26 Increased send buffer size to 14336 kiB 2025/04/30 12:37:26 Setting DF for IPv4 and IPv6. 2025/04/30 12:37:26 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:37:26 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:37:26 server Listening for udp connections on [::]:443 2025/04/30 12:37:26 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:37:26 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:37:26 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:37:27 server <- Received Initial packet. 2025/04/30 12:37:27 Created qlog file: /logs/qlog/2b6ae8558569da56.sqlog 2025/04/30 12:37:27 server Changing connection ID to 371c72e9. 2025/04/30 12:37:27 Adding connection IDs 2b6ae8558569da56 and 371c72e9 for a new connection. 2025/04/30 12:37:27 server Parsed a coalesced packet. Part 1: 296 bytes. Remaining: 904 bytes. 2025/04/30 12:37:27 server <- Reading packet 0 (296 bytes) for connection 2b6ae8558569da56, Initial 2025/04/30 12:37:27 server Long Header{Type: Initial, DestConnectionID: 2b6ae8558569da56, SrcConnectionID: 5d95a7c902a5575e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 270, Version: v1} 2025/04/30 12:37:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 249, Offset + Data length: 249} 2025/04/30 12:37:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:37:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:37:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:37:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 5d95a7c902a5575e, InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 65536, MaxBidiStreamNum: 0, MaxUniStreamNum: 0, MaxIdleTimeout: 0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 12:37:27 Adding connection ID 2b606850. 2025/04/30 12:37:27 server coalesced packet has different destination connection ID: 00000000, expected 2b6ae8558569da56 2025/04/30 12:37:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2b6ae8558569da56 2025/04/30 12:37:27 server Long Header{Type: Initial, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 117, Version: v1} 2025/04/30 12:37:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:37:27 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 0, PacketNumberLen: 2, Length: 1120, Version: v1} 2025/04/30 12:37:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 1098, Offset + Data length: 1098} 2025/04/30 12:37:27 server -> Sending packet 1 (1280 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:27 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:37:27 server -> &wire.CryptoFrame{Offset: 1098, Data length: 1236, Offset + Data length: 2334} 2025/04/30 12:37:27 server -> Sending packet 2 (1280 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:27 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 2, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:37:27 server -> &wire.CryptoFrame{Offset: 2334, Data length: 1236, Offset + Data length: 3570} 2025/04/30 12:37:27 server Canceling loss detection timer. 2025/04/30 12:37:27 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 12:37:27 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 12:37:28 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:37:28 server <- Reading packet 6 (41 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 6, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 12:37:28 server Dropping Initial keys. 2025/04/30 12:37:28 server <- &wire.PingFrame{} 2025/04/30 12:37:28 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 12:37:28 server -> Sending packet 3 (1146 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 3, PacketNumberLen: 2, Length: 1125, Version: v1} 2025/04/30 12:37:28 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 1098, Offset + Data length: 1098} 2025/04/30 12:37:28 server -> Sending packet 4 (1280 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 4, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 1098, Data length: 1236, Offset + Data length: 2334} 2025/04/30 12:37:28 server -> Sending packet 5 (1280 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 5, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 3570, Data length: 1236, Offset + Data length: 4806} 2025/04/30 12:37:28 server -> Sending packet 6 (1280 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 6, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 4806, Data length: 1236, Offset + Data length: 6042} 2025/04/30 12:37:28 server -> Sending packet 7 (1280 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 7, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 6042, Data length: 1236, Offset + Data length: 7278} 2025/04/30 12:37:28 server -> Sending packet 8 (1280 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 8, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 7278, Data length: 1236, Offset + Data length: 8514} 2025/04/30 12:37:28 server -> Sending packet 9 (1280 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 9, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 8514, Data length: 1236, Offset + Data length: 9750} 2025/04/30 12:37:28 server -> Sending packet 10 (288 bytes) for connection 2b6ae8558569da56, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 5d95a7c902a5575e, SrcConnectionID: 371c72e9, PacketNumber: 10, PacketNumberLen: 2, Length: 216, Version: v1} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 9750, Data length: 193, Offset + Data length: 9943} 2025/04/30 12:37:28 server Short Header{DestConnectionID: 5d95a7c902a5575e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:37:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2b606850, StatelessResetToken: 0xd9384c1c7fcb3e70512d3b8423963336} 2025/04/30 12:37:28 server <- Reading packet 7 (43 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 7, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (2): [2 3] 2025/04/30 12:37:28 server updated RTT: 31.716114ms (σ: 15.858057ms) 2025/04/30 12:37:28 server <- Reading packet 8 (43 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 8, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [4] 2025/04/30 12:37:28 server updated RTT: 31.827ms (σ: 12.117ms) 2025/04/30 12:37:28 server <- Reading packet 9 (43 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 9, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [5] 2025/04/30 12:37:28 server updated RTT: 32.05ms (σ: 9.534ms) 2025/04/30 12:37:28 server <- Reading packet 10 (43 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 10, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [6] 2025/04/30 12:37:28 server updated RTT: 32.359ms (σ: 7.77ms) 2025/04/30 12:37:28 server <- Reading packet 11 (43 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 11, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [7] 2025/04/30 12:37:28 server updated RTT: 32.758ms (σ: 6.626ms) 2025/04/30 12:37:28 server <- Reading packet 12 (43 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 12, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [8] 2025/04/30 12:37:28 server updated RTT: 33.235ms (σ: 5.924ms) 2025/04/30 12:37:28 server <- Reading packet 13 (43 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 13, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [9] 2025/04/30 12:37:28 server updated RTT: 33.778ms (σ: 5.53ms) 2025/04/30 12:37:28 server Parsed a coalesced packet. Part 1: 82 bytes. Remaining: 111 bytes. 2025/04/30 12:37:28 server <- Reading packet 14 (82 bytes) for connection 371c72e9, Handshake 2025/04/30 12:37:28 server Long Header{Type: Handshake, DestConnectionID: 371c72e9, SrcConnectionID: 5d95a7c902a5575e, PacketNumber: 14, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [10] 2025/04/30 12:37:28 server updated RTT: 34.35ms (σ: 5.292ms) 2025/04/30 12:37:28 server Canceling loss detection timer. 2025/04/30 12:37:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:37:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:37:28 Retiring connection ID 2b6ae8558569da56 in 5s. 2025/04/30 12:37:28 server Dropping Handshake keys. 2025/04/30 12:37:28 server <- Reading packet 0 (111 bytes) for connection 371c72e9, 1-RTT 2025/04/30 12:37:28 server Short Header{DestConnectionID: 371c72e9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [0] 2025/04/30 12:37:28 server updated RTT: 34.85ms (σ: 4.97ms) 2025/04/30 12:37:28 server Canceling loss detection timer. 2025/04/30 12:37:28 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3d23cfa9478c567e, StatelessResetToken: 0x43403162f9e9f3dd23f48d44546bf18f} 2025/04/30 12:37:28 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b9a065d4deec2be4, StatelessResetToken: 0xb3bf92c071767700f6d1f0b8afe6c514} 2025/04/30 12:37:28 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0515db3ca43b4152, StatelessResetToken: 0x12dd0e322c7c50187afbdff2dcfc4a92} 2025/04/30 12:37:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:37:28 server -> Sending packet 1 (266 bytes) for connection 2b6ae8558569da56, 1-RTT (ECN: ECT(0)) 2025/04/30 12:37:28 server Short Header{DestConnectionID: 3d23cfa9478c567e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:37:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 261.517µs} 2025/04/30 12:37:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 12:37:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 12:37:28 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:37:28 server -> &wire.NewTokenFrame{Token: 0xe52c4288159c665e195cb5feb7addc1543b002b329525e9e8912a93ce531e71f60efd3e649a0f91e5a9eff95c9330f161f4cb7af604d2f742a34a2595abd595e711200787281f82637b371f426ce633b929942aa6682} 2025/04/30 12:37:28 server <- Reading packet 1 (42 bytes) for connection 371c72e9, 1-RTT 2025/04/30 12:37:28 server Short Header{DestConnectionID: 371c72e9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:37:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:37:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 12:37:28 Received request: GET /btpoqfnptb 2025/04/30 12:37:28 server -> Sending packet 2 (1280 bytes) for connection 2b6ae8558569da56, 1-RTT (ECN: ECT(0)) 2025/04/30 12:37:28 server Short Header{DestConnectionID: 3d23cfa9478c567e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:37:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 554.253µs} 2025/04/30 12:37:28 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1245, Offset + Data length: 1245} 2025/04/30 12:37:28 server -> Sending packet 3 (1280 bytes) for connection 2b6ae8558569da56, 1-RTT (ECN: ECT(0)) 2025/04/30 12:37:28 server Short Header{DestConnectionID: 3d23cfa9478c567e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:37:28 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1245, Data length: 1249, Offset + Data length: 2494} 2025/04/30 12:37:28 server -> Sending packet 4 (1280 bytes) for connection 2b6ae8558569da56, 1-RTT (ECN: ECT(0)) 2025/04/30 12:37:28 server Short Header{DestConnectionID: 3d23cfa9478c567e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:37:28 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2494, Data length: 1249, Offset + Data length: 3743} 2025/04/30 12:37:28 server -> Sending packet 5 (1280 bytes) for connection 2b6ae8558569da56, 1-RTT (ECN: ECT(0)) 2025/04/30 12:37:28 server Short Header{DestConnectionID: 3d23cfa9478c567e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:37:28 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3743, Data length: 1249, Offset + Data length: 4992} 2025/04/30 12:37:28 server -> Sending packet 6 (159 bytes) for connection 2b6ae8558569da56, 1-RTT (ECN: ECT(0)) 2025/04/30 12:37:28 server Short Header{DestConnectionID: 3d23cfa9478c567e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:37:28 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4992, Data length: 128, Offset + Data length: 5120} 2025/04/30 12:37:28 server -> Sending packet 7 (31 bytes) for connection 2b6ae8558569da56, 1-RTT (ECN: ECT(0)) 2025/04/30 12:37:28 server Short Header{DestConnectionID: 3d23cfa9478c567e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:37:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 5120, Data length: 0, Offset + Data length: 5120} 2025/04/30 12:37:28 server <- Reading packet 2 (55 bytes) for connection 371c72e9, 1-RTT 2025/04/30 12:37:28 server Short Header{DestConnectionID: 371c72e9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (1): [1] 2025/04/30 12:37:28 server updated RTT: 34.365ms (σ: 4.696ms) 2025/04/30 12:37:28 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 12:37:28 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f5b844d9696be19a, StatelessResetToken: 0x9f6aea3deb0e3a5ddaeb76b7381955c2} 2025/04/30 12:37:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 12:37:28 server Ignoring all packets below 1. 2025/04/30 12:37:28 server <- Reading packet 3 (27 bytes) for connection 371c72e9, 1-RTT 2025/04/30 12:37:28 server Short Header{DestConnectionID: 371c72e9, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (2): [2 3] 2025/04/30 12:37:28 server updated RTT: 34.154ms (σ: 3.942ms) 2025/04/30 12:37:28 server Ignoring all packets below 2. 2025/04/30 12:37:28 server <- Reading packet 4 (27 bytes) for connection 371c72e9, 1-RTT 2025/04/30 12:37:28 server Short Header{DestConnectionID: 371c72e9, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (2): [4 5] 2025/04/30 12:37:28 server updated RTT: 34.235ms (σ: 3.119ms) 2025/04/30 12:37:28 server <- Reading packet 5 (27 bytes) for connection 371c72e9, 1-RTT 2025/04/30 12:37:28 server Short Header{DestConnectionID: 371c72e9, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:37:28 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:37:28 server newly acked packets (2): [6 7] 2025/04/30 12:37:28 server updated RTT: 34.347ms (σ: 2.563ms) 2025/04/30 12:37:28 server Canceling loss detection timer. 2025/04/30 12:37:28 server <- Reading packet 6 (26 bytes) for connection 371c72e9, 1-RTT 2025/04/30 12:37:28 server Short Header{DestConnectionID: 371c72e9, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:37:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:37:28 server Closing connection with error: NO_ERROR (remote) 2025/04/30 12:37:28 Replacing connection for connection IDs [371c72e9 2b606850] with a closed connection. 2025/04/30 12:37:28 Error accepting stream: NO_ERROR (remote) 2025/04/30 12:37:28 server Connection 2b6ae8558569da56 closed. 2025/04/30 12:37:30 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:37:32 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:37:33 Removing connection ID 2b6ae8558569da56 after it has been retired. 2025/04/30 12:37:33 Removing connection IDs [371c72e9 2b606850] for a closed connection after it has been retired. 2025/04/30 12:37:34 Tracking 0 connection IDs and 0 reset tokens.