2025/04/30 12:34:02 Increased receive buffer size to 14336 kiB 2025/04/30 12:34:02 Increased send buffer size to 14336 kiB 2025/04/30 12:34:02 Setting DF for IPv4 and IPv6. 2025/04/30 12:34:02 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:34:02 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:34:02 server Listening for udp connections on [::]:443 2025/04/30 12:34:03 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:34:03 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:34:03 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:34:03 server <- Received Initial packet. 2025/04/30 12:34:03 Created qlog file: /logs/qlog/015e17921cf73f20.sqlog 2025/04/30 12:34:03 server Changing connection ID to 43b15776. 2025/04/30 12:34:03 Adding connection IDs 015e17921cf73f20 and 43b15776 for a new connection. 2025/04/30 12:34:03 server Parsed a coalesced packet. Part 1: 296 bytes. Remaining: 904 bytes. 2025/04/30 12:34:03 server <- Reading packet 0 (296 bytes) for connection 015e17921cf73f20, Initial 2025/04/30 12:34:03 server Long Header{Type: Initial, DestConnectionID: 015e17921cf73f20, SrcConnectionID: 09ebfba246c237b9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 270, Version: v1} 2025/04/30 12:34:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 249, Offset + Data length: 249} 2025/04/30 12:34:03 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:34:03 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:34:03 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:34:03 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 09ebfba246c237b9, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 0, MaxUniStreamNum: 0, MaxIdleTimeout: 0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 12:34:03 Adding connection ID 49768be9. 2025/04/30 12:34:03 server coalesced packet has different destination connection ID: 00000000, expected 015e17921cf73f20 2025/04/30 12:34:03 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 015e17921cf73f20 2025/04/30 12:34:03 server Long Header{Type: Initial, DestConnectionID: 09ebfba246c237b9, SrcConnectionID: 43b15776, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 458, Version: v1} 2025/04/30 12:34:03 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:34:03 server Long Header{Type: Handshake, DestConnectionID: 09ebfba246c237b9, SrcConnectionID: 43b15776, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 12:34:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 12:34:03 server Short Header{DestConnectionID: 09ebfba246c237b9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:34:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 49768be9, StatelessResetToken: 0xc51606383803bcb6d81b95bbd995be65} 2025/04/30 12:34:03 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 12:34:03 server <- Reading packet 1 (44 bytes) for connection 43b15776, Initial 2025/04/30 12:34:03 server Long Header{Type: Initial, DestConnectionID: 43b15776, SrcConnectionID: 09ebfba246c237b9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:34:03 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:03 server newly acked packets (1): [0] 2025/04/30 12:34:03 server updated RTT: 33.233389ms (σ: 16.616694ms) 2025/04/30 12:34:03 server Parsed a coalesced packet. Part 2: 82 bytes. Remaining: 1074 bytes. 2025/04/30 12:34:03 server <- Reading packet 0 (82 bytes) for connection 43b15776, Handshake 2025/04/30 12:34:03 server Long Header{Type: Handshake, DestConnectionID: 43b15776, SrcConnectionID: 09ebfba246c237b9, PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 12:34:03 server Dropping Initial keys. 2025/04/30 12:34:03 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:03 server newly acked packets (1): [0] 2025/04/30 12:34:03 server updated RTT: 33.233ms (σ: 12.462ms) 2025/04/30 12:34:03 server Canceling loss detection timer. 2025/04/30 12:34:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:34:03 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:34:03 Retiring connection ID 015e17921cf73f20 in 5s. 2025/04/30 12:34:03 server Dropping Handshake keys. 2025/04/30 12:34:03 server <- Reading packet 0 (1074 bytes) for connection 43b15776, 1-RTT 2025/04/30 12:34:03 server Short Header{DestConnectionID: 43b15776, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:34:03 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:03 server newly acked packets (1): [0] 2025/04/30 12:34:03 server updated RTT: 33.233ms (σ: 9.346ms) 2025/04/30 12:34:03 server Canceling loss detection timer. 2025/04/30 12:34:03 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f8246d77df785bbc, StatelessResetToken: 0x24f825e24328fba46474d2cf46091d06} 2025/04/30 12:34:03 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 363014c3908cd63c, StatelessResetToken: 0x4a00fe5df87265413d051d549f0dcfe2} 2025/04/30 12:34:03 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb555f7366442d30, StatelessResetToken: 0x12b782fafa1d10666a4cc2396b48f956} 2025/04/30 12:34:03 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:34:03 server <- Reading packet 1 (42 bytes) for connection 43b15776, 1-RTT 2025/04/30 12:34:03 server Short Header{DestConnectionID: 43b15776, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:34:03 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:34:03 server -> Sending packet 1 (266 bytes) for connection 015e17921cf73f20, 1-RTT (ECN: ECT(0)) 2025/04/30 12:34:03 server Short Header{DestConnectionID: f8246d77df785bbc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:34:03 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 319.946µs} 2025/04/30 12:34:03 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:34:03 server -> &wire.NewTokenFrame{Token: 0xe694ef0cb2f8a5119fb4f4f046c2187cba1ca7ab8103dcee559aa9e5ecdf0f2f007353864fa15606e079c6eca1ab3b1890c92b1923a8ad5a30b12f6c65024aa64c5fb035d6d5fc9e8824ccb36758c7234e7a371f5061} 2025/04/30 12:34:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 12:34:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 12:34:03 Received request: GET /nkmqandwut 2025/04/30 12:34:03 server -> Sending packet 2 (1053 bytes) for connection 015e17921cf73f20, 1-RTT (ECN: ECT(0)) 2025/04/30 12:34:03 server Short Header{DestConnectionID: f8246d77df785bbc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:34:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:34:03 server <- Reading packet 2 (55 bytes) for connection 43b15776, 1-RTT 2025/04/30 12:34:03 server Short Header{DestConnectionID: 43b15776, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:34:03 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:03 server newly acked packets (1): [1] 2025/04/30 12:34:03 server updated RTT: 32.95ms (σ: 7.574ms) 2025/04/30 12:34:03 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 12:34:03 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 32ed6877d360c528, StatelessResetToken: 0x5d578e62e2285554d3b6419a9112b6f3} 2025/04/30 12:34:03 server Setting ACK timer to max ack delay: 25ms 2025/04/30 12:34:03 server Ignoring all packets below 2. 2025/04/30 12:34:03 server <- Reading packet 3 (26 bytes) for connection 43b15776, 1-RTT 2025/04/30 12:34:03 server Short Header{DestConnectionID: 43b15776, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:34:03 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:34:03 server Closing connection with error: NO_ERROR (remote) 2025/04/30 12:34:03 Replacing connection for connection IDs [43b15776 49768be9] with a closed connection. 2025/04/30 12:34:03 server Connection 015e17921cf73f20 closed. 2025/04/30 12:34:03 Error accepting stream: NO_ERROR (remote) 2025/04/30 12:34:04 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:34:06 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:34:08 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:34:08 Removing connection ID 015e17921cf73f20 after it has been retired. 2025/04/30 12:34:08 Removing connection IDs [43b15776 49768be9] for a closed connection after it has been retired. 2025/04/30 12:34:10 Tracking 0 connection IDs and 0 reset tokens.