2025/04/30 17:37:31 Increased receive buffer size to 14336 kiB 2025/04/30 17:37:31 Increased send buffer size to 14336 kiB 2025/04/30 17:37:31 Setting DF for IPv4 and IPv6. 2025/04/30 17:37:31 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 17:37:31 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 17:37:31 server Listening for udp connections on [::]:443 2025/04/30 17:37:31 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:37:31 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:37:31 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:37:33 server <- Received Initial packet. 2025/04/30 17:37:33 Created qlog file: /logs/qlog/62e264a222753879.sqlog 2025/04/30 17:37:33 server Changing connection ID to 2e267b22. 2025/04/30 17:37:33 Adding connection IDs 62e264a222753879 and 2e267b22 for a new connection. 2025/04/30 17:37:33 server <- Reading packet 0 (1200 bytes) for connection 62e264a222753879, Initial 2025/04/30 17:37:33 server Long Header{Type: Initial, DestConnectionID: 62e264a222753879, SrcConnectionID: b5ba8bb4f9f1147e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:37:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:37:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:37:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:37:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:37:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b5ba8bb4f9f1147e, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:37:33 Adding connection ID 4d989706. 2025/04/30 17:37:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 62e264a222753879 2025/04/30 17:37:33 server Long Header{Type: Initial, DestConnectionID: b5ba8bb4f9f1147e, SrcConnectionID: 2e267b22, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 17:37:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:37:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:37:33 server Long Header{Type: Handshake, DestConnectionID: b5ba8bb4f9f1147e, SrcConnectionID: 2e267b22, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 17:37:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 17:37:33 server Short Header{DestConnectionID: b5ba8bb4f9f1147e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:37:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d989706, StatelessResetToken: 0x06a98cc8f936f9177d85de908784b39e} 2025/04/30 17:37:33 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 17:37:33 server <- Reading packet 1 (1201 bytes) for connection 2e267b22, Initial 2025/04/30 17:37:33 server Long Header{Type: Initial, DestConnectionID: 2e267b22, SrcConnectionID: b5ba8bb4f9f1147e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:37:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:37:33 server newly acked packets (1): [0] 2025/04/30 17:37:33 server updated RTT: 78.815447ms (σ: 39.407723ms) 2025/04/30 17:37:33 server <- Reading packet 0 (76 bytes) for connection 2e267b22, Handshake 2025/04/30 17:37:33 server Long Header{Type: Handshake, DestConnectionID: 2e267b22, SrcConnectionID: b5ba8bb4f9f1147e, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:37:33 server Dropping Initial keys. 2025/04/30 17:37:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:37:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:37:33 Retiring connection ID 62e264a222753879 in 5s. 2025/04/30 17:37:33 server Dropping Handshake keys. 2025/04/30 17:37:33 server -> Sending packet 1 (259 bytes) for connection 62e264a222753879, 1-RTT (ECN: ECT(0)) 2025/04/30 17:37:33 server Short Header{DestConnectionID: b5ba8bb4f9f1147e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:37:33 server -> &wire.NewTokenFrame{Token: 0xb41b58cec5112515a6201f2fd3ae7de4690a494e313a7423b795c993f07c43310ceaf8705d5535e14982cdbf7ff71cf3f7970cab71de4ae5af3c96e2d22ac19d6889f7bcf050d6c03f6a0c00c809b5cf964c6b36a909} 2025/04/30 17:37:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:37:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:37:33 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:37:33 server <- Reading packet 0 (49 bytes) for connection 2e267b22, 1-RTT 2025/04/30 17:37:33 server Short Header{DestConnectionID: 2e267b22, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:37:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:37:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 7ms} 2025/04/30 17:37:33 server newly acked packets (1): [0] 2025/04/30 17:37:33 server updated RTT: 84.172ms (σ: 40.27ms) 2025/04/30 17:37:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:37:33 server -> Sending packet 2 (32 bytes) for connection 62e264a222753879, 1-RTT (ECN: ECT(0)) 2025/04/30 17:37:33 server Short Header{DestConnectionID: b5ba8bb4f9f1147e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:37:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 152.164µs} 2025/04/30 17:37:33 Received request: GET /hbnwovkykk 2025/04/30 17:37:33 server -> Sending packet 3 (1053 bytes) for connection 62e264a222753879, 1-RTT (ECN: ECT(0)) 2025/04/30 17:37:33 server Short Header{DestConnectionID: b5ba8bb4f9f1147e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:37:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:37:33 server <- Reading packet 1 (28 bytes) for connection 2e267b22, 1-RTT 2025/04/30 17:37:33 server Short Header{DestConnectionID: 2e267b22, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:37:33 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 13ms} 2025/04/30 17:37:33 server newly acked packets (2): [1 3] 2025/04/30 17:37:33 server updated RTT: 77.779ms (σ: 42.986ms) 2025/04/30 17:37:33 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:37:33 server Canceling loss detection timer. 2025/04/30 17:37:33 server -> Sending packet 4 (30 bytes) for connection 62e264a222753879, 1-RTT (ECN: Not-ECT) 2025/04/30 17:37:33 server Short Header{DestConnectionID: b5ba8bb4f9f1147e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:37:33 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:37:33 server <- Reading packet 2 (31 bytes) for connection 2e267b22, 1-RTT 2025/04/30 17:37:33 server Short Header{DestConnectionID: 2e267b22, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:37:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:37:33 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:37:33 Replacing connection for connection IDs [2e267b22 4d989706] with a closed connection. 2025/04/30 17:37:33 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:37:33 server Connection 62e264a222753879 closed. 2025/04/30 17:37:35 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 17:37:37 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 17:37:38 Removing connection ID 62e264a222753879 after it has been retired. 2025/04/30 17:37:38 Removing connection IDs [2e267b22 4d989706] for a closed connection after it has been retired. 2025/04/30 17:37:39 Tracking 0 connection IDs and 0 reset tokens.