2025/04/30 12:34:38 Increased receive buffer size to 14336 kiB 2025/04/30 12:34:38 Increased send buffer size to 14336 kiB 2025/04/30 12:34:38 Setting DF for IPv4 and IPv6. 2025/04/30 12:34:38 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 12:34:38 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 12:34:38 server Listening for udp connections on [::]:443 2025/04/30 12:34:39 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:34:39 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:34:39 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 12:34:40 server <- Received Initial packet. 2025/04/30 12:34:40 Created qlog file: /logs/qlog/36aff681561df8e5.sqlog 2025/04/30 12:34:40 server Changing connection ID to c6d65fe5. 2025/04/30 12:34:40 Adding connection IDs 36aff681561df8e5 and c6d65fe5 for a new connection. 2025/04/30 12:34:40 server Parsed a coalesced packet. Part 1: 296 bytes. Remaining: 904 bytes. 2025/04/30 12:34:40 server <- Reading packet 0 (296 bytes) for connection 36aff681561df8e5, Initial 2025/04/30 12:34:40 server Long Header{Type: Initial, DestConnectionID: 36aff681561df8e5, SrcConnectionID: f17e5fe8d276cbd3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 270, Version: v1} 2025/04/30 12:34:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 249, Offset + Data length: 249} 2025/04/30 12:34:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:34:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:34:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:34:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f17e5fe8d276cbd3, InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 1048576, MaxBidiStreamNum: 0, MaxUniStreamNum: 0, MaxIdleTimeout: 0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 12:34:40 Adding connection ID 95bc6933. 2025/04/30 12:34:40 server coalesced packet has different destination connection ID: 00000000, expected 36aff681561df8e5 2025/04/30 12:34:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 36aff681561df8e5 2025/04/30 12:34:40 server Long Header{Type: Initial, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 452, Version: v1} 2025/04/30 12:34:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:34:40 server Long Header{Type: Handshake, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 12:34:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 12:34:40 server Short Header{DestConnectionID: f17e5fe8d276cbd3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:34:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 95bc6933, StatelessResetToken: 0x8437f200a11ce594033846294a9693e2} 2025/04/30 12:34:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 12:34:40 server -> Sending packet 1 (1280 bytes) for connection 36aff681561df8e5, Initial 2025/04/30 12:34:40 server Long Header{Type: Initial, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:34:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:34:40 server -> Sending packet 2 (1280 bytes) for connection 36aff681561df8e5, Initial 2025/04/30 12:34:40 server Long Header{Type: Initial, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:34:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:34:40 server Canceling loss detection timer. 2025/04/30 12:34:40 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 12:34:40 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:34:41 server Parsed a coalesced packet. Part 1: 296 bytes. Remaining: 904 bytes. 2025/04/30 12:34:41 server <- Reading packet 1 (296 bytes) for connection 36aff681561df8e5, Initial 2025/04/30 12:34:41 server Long Header{Type: Initial, DestConnectionID: 36aff681561df8e5, SrcConnectionID: f17e5fe8d276cbd3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 270, Version: v1} 2025/04/30 12:34:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 249, Offset + Data length: 249} 2025/04/30 12:34:41 server coalesced packet has different destination connection ID: 00000000, expected 36aff681561df8e5 2025/04/30 12:34:41 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 12:34:41 server -> Sending packet 1 (755 bytes) for connection 36aff681561df8e5, Handshake 2025/04/30 12:34:41 server Long Header{Type: Handshake, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, PacketNumber: 1, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 12:34:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 12:34:41 server -> Sending packet 2 (755 bytes) for connection 36aff681561df8e5, Handshake 2025/04/30 12:34:41 server Long Header{Type: Handshake, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, PacketNumber: 2, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 12:34:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 12:34:41 server -> Sending packet 3 (45 bytes) for connection 36aff681561df8e5, Initial 2025/04/30 12:34:41 server Long Header{Type: Initial, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 12:34:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:41 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 12:34:41 server -> Sending packet 4 (1280 bytes) for connection 36aff681561df8e5, Initial 2025/04/30 12:34:41 server Long Header{Type: Initial, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:34:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:34:41 server -> Sending packet 5 (1280 bytes) for connection 36aff681561df8e5, Initial 2025/04/30 12:34:41 server Long Header{Type: Initial, DestConnectionID: f17e5fe8d276cbd3, SrcConnectionID: c6d65fe5, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 12:34:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 12:34:41 server Canceling loss detection timer. 2025/04/30 12:34:41 server Amplification window limited. Received 2400 bytes, already sent out 7955 bytes 2025/04/30 12:34:42 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 12:34:42 server <- Reading packet 2 (44 bytes) for connection c6d65fe5, Initial 2025/04/30 12:34:42 server Long Header{Type: Initial, DestConnectionID: c6d65fe5, SrcConnectionID: f17e5fe8d276cbd3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 12:34:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:42 server Parsed a coalesced packet. Part 2: 82 bytes. Remaining: 1074 bytes. 2025/04/30 12:34:42 server <- Reading packet 0 (82 bytes) for connection c6d65fe5, Handshake 2025/04/30 12:34:42 server Long Header{Type: Handshake, DestConnectionID: c6d65fe5, SrcConnectionID: f17e5fe8d276cbd3, PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 12:34:42 server Dropping Initial keys. 2025/04/30 12:34:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 12:34:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 12:34:42 Retiring connection ID 36aff681561df8e5 in 5s. 2025/04/30 12:34:42 server Dropping Handshake keys. 2025/04/30 12:34:42 server <- Reading packet 0 (1074 bytes) for connection c6d65fe5, 1-RTT 2025/04/30 12:34:42 server Short Header{DestConnectionID: c6d65fe5, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:34:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:42 server newly acked packets (1): [0] 2025/04/30 12:34:42 server updated RTT: 1.503420023s (σ: 751.710011ms) 2025/04/30 12:34:42 server Canceling loss detection timer. 2025/04/30 12:34:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 88f3bf2dd6db3b75, StatelessResetToken: 0x83950a6cdda42737fc611f9d16ee77c0} 2025/04/30 12:34:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ebf06f3f739765d3, StatelessResetToken: 0x409786628abe408c2a99d87402e8cd83} 2025/04/30 12:34:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f512112d7df2bd8f, StatelessResetToken: 0xc8acb8d58d35d2c863f0428017462bef} 2025/04/30 12:34:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 12:34:42 server <- Reading packet 1 (42 bytes) for connection c6d65fe5, 1-RTT 2025/04/30 12:34:42 server Short Header{DestConnectionID: c6d65fe5, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:34:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 12:34:42 server -> Sending packet 1 (263 bytes) for connection 36aff681561df8e5, 1-RTT (ECN: ECT(0)) 2025/04/30 12:34:42 server Short Header{DestConnectionID: 88f3bf2dd6db3b75, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:34:42 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 388.584µs} 2025/04/30 12:34:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 12:34:42 server -> &wire.NewTokenFrame{Token: 0xb14fc3e8c84f00f650401a5d35741531d82f0d2506c138b7809fde900ce6397035dec23ae55e2b4b620da492454eff72eec8304a96e424f4cf3c860e4076d861a60e20536152c8d4daadd20da858ea9981dab64dbd4b} 2025/04/30 12:34:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 12:34:42 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 12:34:42 Received request: GET /lfudzzirhn 2025/04/30 12:34:42 server -> Sending packet 2 (1053 bytes) for connection 36aff681561df8e5, 1-RTT (ECN: ECT(0)) 2025/04/30 12:34:42 server Short Header{DestConnectionID: 88f3bf2dd6db3b75, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 12:34:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 12:34:42 Tracking 3 connection IDs and 1 reset tokens. 2025/04/30 12:34:43 server Dropping %!s(logging.PacketType=1) packet (43 bytes) because we already dropped the keys. 2025/04/30 12:34:43 server Dropping %!s(logging.PacketType=1) packet (43 bytes) because we already dropped the keys. 2025/04/30 12:34:43 server <- Reading packet 2 (55 bytes) for connection c6d65fe5, 1-RTT 2025/04/30 12:34:43 server Short Header{DestConnectionID: c6d65fe5, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:34:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 12:34:43 server newly acked packets (1): [1] 2025/04/30 12:34:43 server updated RTT: 1.503152s (σ: 564.317ms) 2025/04/30 12:34:43 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 12:34:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: ad22a43e5ccf7714, StatelessResetToken: 0xa9098c41221ad21f39d04ff96cf719cd} 2025/04/30 12:34:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 12:34:43 server Ignoring all packets below 2. 2025/04/30 12:34:43 server <- Reading packet 3 (26 bytes) for connection c6d65fe5, 1-RTT 2025/04/30 12:34:43 server Short Header{DestConnectionID: c6d65fe5, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 12:34:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 12:34:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 12:34:43 Replacing connection for connection IDs [c6d65fe5 95bc6933] with a closed connection. 2025/04/30 12:34:43 server Connection 36aff681561df8e5 closed. 2025/04/30 12:34:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 12:34:44 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:34:46 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 12:34:47 Removing connection ID 36aff681561df8e5 after it has been retired. 2025/04/30 12:34:48 Removing connection IDs [c6d65fe5 95bc6933] for a closed connection after it has been retired. 2025/04/30 12:34:48 Tracking 0 connection IDs and 0 reset tokens.