2025/04/30 10:33:19 Increased receive buffer size to 14336 kiB 2025/04/30 10:33:19 Increased send buffer size to 14336 kiB 2025/04/30 10:33:19 Setting DF for IPv4 and IPv6. 2025/04/30 10:33:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 10:33:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 10:33:19 server Listening for udp connections on [::]:443 2025/04/30 10:33:19 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 10:33:19 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 10:33:19 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 10:33:21 Tracking 0 connection IDs and 0 reset tokens. 2025/04/30 10:33:21 server <- Received Initial packet. 2025/04/30 10:33:21 Created qlog file: /logs/qlog/6acc4d5d115105b4.sqlog 2025/04/30 10:33:21 server Changing connection ID to 9d619c73. 2025/04/30 10:33:21 Adding connection IDs 6acc4d5d115105b4 and 9d619c73 for a new connection. 2025/04/30 10:33:21 server <- Reading packet 1 (1200 bytes) for connection 6acc4d5d115105b4, Initial 2025/04/30 10:33:21 server Long Header{Type: Initial, DestConnectionID: 6acc4d5d115105b4, SrcConnectionID: 0f94652aedb5c185, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:21 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0f94652aedb5c185, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:21 Adding connection ID 5569cffd. 2025/04/30 10:33:21 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6acc4d5d115105b4 2025/04/30 10:33:21 server Long Header{Type: Initial, DestConnectionID: 0f94652aedb5c185, SrcConnectionID: 9d619c73, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 461, Version: v1} 2025/04/30 10:33:21 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:21 server Long Header{Type: Handshake, DestConnectionID: 0f94652aedb5c185, SrcConnectionID: 9d619c73, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 10:33:21 server Short Header{DestConnectionID: 0f94652aedb5c185, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5569cffd, StatelessResetToken: 0x8fab1564c31543ec5659de6558bf3f48} 2025/04/30 10:33:21 server <- Reading packet 1 (42 bytes) for connection 9d619c73, Handshake 2025/04/30 10:33:21 server Long Header{Type: Handshake, DestConnectionID: 9d619c73, SrcConnectionID: 0f94652aedb5c185, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:21 server Dropping Initial keys. 2025/04/30 10:33:21 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:21 server newly acked packets (1): [0] 2025/04/30 10:33:21 server updated RTT: 102.691736ms (σ: 51.345868ms) 2025/04/30 10:33:21 server Canceling loss detection timer. 2025/04/30 10:33:21 server Queueing packet (49 bytes) for later decryption 2025/04/30 10:33:21 server <- Reading packet 2 (76 bytes) for connection 9d619c73, Handshake 2025/04/30 10:33:21 server Long Header{Type: Handshake, DestConnectionID: 9d619c73, SrcConnectionID: 0f94652aedb5c185, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 Retiring connection ID 6acc4d5d115105b4 in 5s. 2025/04/30 10:33:21 server Dropping Handshake keys. 2025/04/30 10:33:21 server -> Sending packet 1 (259 bytes) for connection 6acc4d5d115105b4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 0f94652aedb5c185, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.NewTokenFrame{Token: 0xe1d7518ee0ed7fc02311404efa078bc0997106a5b72aa48ffc7082c6ccfe8588373b341e56b1741b16b13a4092893a54f91a9d5f44f6a5273ccd0c961fecb6f1d228b8adc68ed3d310d9d519e82b4f070eb1e52528fd} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:21 server <- Reading packet 0 (49 bytes) for connection 9d619c73, 1-RTT 2025/04/30 10:33:21 server Short Header{DestConnectionID: 9d619c73, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:21 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16ms} 2025/04/30 10:33:21 server newly acked packets (1): [0] 2025/04/30 10:33:21 server updated RTT: 104.213ms (σ: 41.554ms) 2025/04/30 10:33:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:21 server -> Sending packet 2 (33 bytes) for connection 6acc4d5d115105b4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 0f94652aedb5c185, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 113.806369ms} 2025/04/30 10:33:21 Received request: GET /horgonrypc 2025/04/30 10:33:21 server -> Sending packet 3 (1053 bytes) for connection 6acc4d5d115105b4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 0f94652aedb5c185, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:21 server <- Reading packet 1 (32 bytes) for connection 9d619c73, 1-RTT 2025/04/30 10:33:21 server Short Header{DestConnectionID: 9d619c73, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:21 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:21 Replacing connection for connection IDs [9d619c73 5569cffd] with a closed connection. 2025/04/30 10:33:21 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:21 server Connection 6acc4d5d115105b4 closed. 2025/04/30 10:33:21 server <- Received Initial packet. 2025/04/30 10:33:21 Created qlog file: /logs/qlog/2f1be33f25e4aae5.sqlog 2025/04/30 10:33:21 server Changing connection ID to 74f4f5a1. 2025/04/30 10:33:21 Adding connection IDs 2f1be33f25e4aae5 and 74f4f5a1 for a new connection. 2025/04/30 10:33:21 server <- Reading packet 0 (1200 bytes) for connection 2f1be33f25e4aae5, Initial 2025/04/30 10:33:21 server Long Header{Type: Initial, DestConnectionID: 2f1be33f25e4aae5, SrcConnectionID: 05a78961b722a923, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:21 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 05a78961b722a923, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:21 Adding connection ID 3e105250. 2025/04/30 10:33:21 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2f1be33f25e4aae5 2025/04/30 10:33:21 server Long Header{Type: Initial, DestConnectionID: 05a78961b722a923, SrcConnectionID: 74f4f5a1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 454, Version: v1} 2025/04/30 10:33:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:21 server Long Header{Type: Handshake, DestConnectionID: 05a78961b722a923, SrcConnectionID: 74f4f5a1, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 10:33:21 server Short Header{DestConnectionID: 05a78961b722a923, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e105250, StatelessResetToken: 0x4415870dc1a33855f8c62b867ba402c3} 2025/04/30 10:33:21 server <- Reading packet 0 (76 bytes) for connection 74f4f5a1, Handshake 2025/04/30 10:33:21 server Long Header{Type: Handshake, DestConnectionID: 74f4f5a1, SrcConnectionID: 05a78961b722a923, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:21 server Dropping Initial keys. 2025/04/30 10:33:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 Retiring connection ID 2f1be33f25e4aae5 in 5s. 2025/04/30 10:33:21 server Dropping Handshake keys. 2025/04/30 10:33:21 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:21 server -> Sending packet 1 (1366 bytes) for connection 2f1be33f25e4aae5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 05a78961b722a923, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.PingFrame{} 2025/04/30 10:33:21 server -> Sending packet 2 (256 bytes) for connection 2f1be33f25e4aae5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 05a78961b722a923, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:21 server -> &wire.NewTokenFrame{Token: 0xefd2cf2b6642ce3888093d2de6cabd39d9c6e9022f8d5a62e2b54d339975f3a527d3bcf5f65a9fcfd6d89e36eb341500d18bc22c8b5ebca2620819112aab5d12d6faf76fcfb47e61e13f0c5abdbcc84530212dfe3a44} 2025/04/30 10:33:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:21 server <- Reading packet 0 (49 bytes) for connection 74f4f5a1, 1-RTT 2025/04/30 10:33:21 server Short Header{DestConnectionID: 74f4f5a1, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:21 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 10:33:21 server newly acked packets (1): [0] 2025/04/30 10:33:21 server updated RTT: 46.993781ms (σ: 23.49689ms) 2025/04/30 10:33:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:21 server -> Sending packet 3 (32 bytes) for connection 2f1be33f25e4aae5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 05a78961b722a923, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 Received request: GET /uewzrlnxme 2025/04/30 10:33:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104.855µs} 2025/04/30 10:33:21 server -> Sending packet 4 (1053 bytes) for connection 2f1be33f25e4aae5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 05a78961b722a923, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:21 server <- Received Initial packet. 2025/04/30 10:33:21 Created qlog file: /logs/qlog/a161bbe4925db704.sqlog 2025/04/30 10:33:21 server Changing connection ID to 84b55705. 2025/04/30 10:33:21 Adding connection IDs a161bbe4925db704 and 84b55705 for a new connection. 2025/04/30 10:33:21 server <- Reading packet 0 (1200 bytes) for connection a161bbe4925db704, Initial 2025/04/30 10:33:21 server Long Header{Type: Initial, DestConnectionID: a161bbe4925db704, SrcConnectionID: 85a99c9780d205d0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:21 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:21 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 85a99c9780d205d0, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:21 Adding connection ID 520b9143. 2025/04/30 10:33:21 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a161bbe4925db704 2025/04/30 10:33:21 server Long Header{Type: Initial, DestConnectionID: 85a99c9780d205d0, SrcConnectionID: 84b55705, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 456, Version: v1} 2025/04/30 10:33:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:21 server Long Header{Type: Handshake, DestConnectionID: 85a99c9780d205d0, SrcConnectionID: 84b55705, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:33:21 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 520b9143, StatelessResetToken: 0x7fd4c1c2665c7f928b14e383bf0c568c} 2025/04/30 10:33:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:21 server -> Sending packet 6 (256 bytes) for connection 2f1be33f25e4aae5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 05a78961b722a923, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:21 server -> &wire.NewTokenFrame{Token: 0xefd2cf2b6642ce3888093d2de6cabd39d9c6e9022f8d5a62e2b54d339975f3a527d3bcf5f65a9fcfd6d89e36eb341500d18bc22c8b5ebca2620819112aab5d12d6faf76fcfb47e61e13f0c5abdbcc84530212dfe3a44} 2025/04/30 10:33:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:21 server Skipping packet number 5 2025/04/30 10:33:21 server -> Sending packet 7 (1053 bytes) for connection 2f1be33f25e4aae5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:21 server Short Header{DestConnectionID: 05a78961b722a923, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:21 server <- Reading packet 3 (31 bytes) for connection 74f4f5a1, 1-RTT 2025/04/30 10:33:21 server Short Header{DestConnectionID: 74f4f5a1, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:21 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:21 Replacing connection for connection IDs [74f4f5a1 3e105250] with a closed connection. 2025/04/30 10:33:21 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:21 server Connection 2f1be33f25e4aae5 closed. 2025/04/30 10:33:21 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:21 server -> Sending packet 1 (1280 bytes) for connection a161bbe4925db704, Initial 2025/04/30 10:33:21 server Long Header{Type: Initial, DestConnectionID: 85a99c9780d205d0, SrcConnectionID: 84b55705, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:21 server -> Sending packet 2 (1280 bytes) for connection a161bbe4925db704, Initial 2025/04/30 10:33:21 server Long Header{Type: Initial, DestConnectionID: 85a99c9780d205d0, SrcConnectionID: 84b55705, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:21 server Canceling loss detection timer. 2025/04/30 10:33:21 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 10:33:22 server <- Reading packet 0 (40 bytes) for connection 84b55705, Handshake 2025/04/30 10:33:22 server Long Header{Type: Handshake, DestConnectionID: 84b55705, SrcConnectionID: 85a99c9780d205d0, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:22 server Dropping Initial keys. 2025/04/30 10:33:22 server <- &wire.PingFrame{} 2025/04/30 10:33:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:22 server -> Sending packet 1 (756 bytes) for connection a161bbe4925db704, Handshake 2025/04/30 10:33:22 server Long Header{Type: Handshake, DestConnectionID: 85a99c9780d205d0, SrcConnectionID: 84b55705, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 10:33:22 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:33:22 server -> Sending packet 2 (751 bytes) for connection a161bbe4925db704, Handshake 2025/04/30 10:33:22 server Long Header{Type: Handshake, DestConnectionID: 85a99c9780d205d0, SrcConnectionID: 84b55705, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:33:22 server <- Reading packet 1 (76 bytes) for connection 84b55705, Handshake 2025/04/30 10:33:22 server Long Header{Type: Handshake, DestConnectionID: 84b55705, SrcConnectionID: 85a99c9780d205d0, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:22 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:22 Retiring connection ID a161bbe4925db704 in 5s. 2025/04/30 10:33:22 server Dropping Handshake keys. 2025/04/30 10:33:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:22 server -> Sending packet 2 (280 bytes) for connection a161bbe4925db704, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.NewTokenFrame{Token: 0xe70af3dec29baa797f52ed5f99fed6b20aec84235b1239cd799e6893aa0aa7df4169524b14ca9f11ea1047650c0e3821b2467bccac06ceb6f82be7684d957fc7106d6477913da2516ce9e4cf39198d15ede9a1e22929} 2025/04/30 10:33:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 520b9143, StatelessResetToken: 0x7fd4c1c2665c7f928b14e383bf0c568c} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:22 server -> Sending packet 3 (280 bytes) for connection a161bbe4925db704, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 520b9143, StatelessResetToken: 0x7fd4c1c2665c7f928b14e383bf0c568c} 2025/04/30 10:33:22 server -> &wire.NewTokenFrame{Token: 0xe70af3dec29baa797f52ed5f99fed6b20aec84235b1239cd799e6893aa0aa7df4169524b14ca9f11ea1047650c0e3821b2467bccac06ceb6f82be7684d957fc7106d6477913da2516ce9e4cf39198d15ede9a1e22929} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:22 server -> Sending packet 4 (1366 bytes) for connection a161bbe4925db704, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.PingFrame{} 2025/04/30 10:33:22 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:22 server <- Reading packet 1 (29 bytes) for connection 84b55705, 1-RTT 2025/04/30 10:33:22 server Short Header{DestConnectionID: 84b55705, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:22 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:33:22 server newly acked packets (1): [4] 2025/04/30 10:33:22 server updated RTT: 33.365952ms (σ: 16.682976ms) 2025/04/30 10:33:22 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:22 server setting loss timer for packet 3 (1-RTT) to 37.536696ms (in 2025-04-30 10:33:22.128613157 +0000 UTC m=+3.000232090) 2025/04/30 10:33:22 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:33:22.128613157 +0000 UTC m=+3.000232090 2025/04/30 10:33:22 server lost packet 3 (time threshold) 2025/04/30 10:33:22 server Canceling loss detection timer. 2025/04/30 10:33:22 server -> Sending packet 5 (280 bytes) for connection a161bbe4925db704, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.NewTokenFrame{Token: 0xe70af3dec29baa797f52ed5f99fed6b20aec84235b1239cd799e6893aa0aa7df4169524b14ca9f11ea1047650c0e3821b2467bccac06ceb6f82be7684d957fc7106d6477913da2516ce9e4cf39198d15ede9a1e22929} 2025/04/30 10:33:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 520b9143, StatelessResetToken: 0x7fd4c1c2665c7f928b14e383bf0c568c} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:22 server <- Reading packet 2 (43 bytes) for connection 84b55705, 1-RTT 2025/04/30 10:33:22 server Short Header{DestConnectionID: 84b55705, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:22 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:22 server -> Sending packet 6 (32 bytes) for connection a161bbe4925db704, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 89.917µs} 2025/04/30 10:33:22 Received request: GET /xxodkchfay 2025/04/30 10:33:22 server -> Sending packet 7 (1053 bytes) for connection a161bbe4925db704, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:22 server -> Sending packet 9 (280 bytes) for connection a161bbe4925db704, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 520b9143, StatelessResetToken: 0x7fd4c1c2665c7f928b14e383bf0c568c} 2025/04/30 10:33:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:22 server -> &wire.NewTokenFrame{Token: 0xe70af3dec29baa797f52ed5f99fed6b20aec84235b1239cd799e6893aa0aa7df4169524b14ca9f11ea1047650c0e3821b2467bccac06ceb6f82be7684d957fc7106d6477913da2516ce9e4cf39198d15ede9a1e22929} 2025/04/30 10:33:22 server Skipping packet number 8 2025/04/30 10:33:22 server -> Sending packet 10 (1053 bytes) for connection a161bbe4925db704, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:22 server -> Sending packet 11 (1409 bytes) for connection a161bbe4925db704, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 85a99c9780d205d0, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.PingFrame{} 2025/04/30 10:33:22 server <- Reading packet 4 (35 bytes) for connection 84b55705, 1-RTT 2025/04/30 10:33:22 server Short Header{DestConnectionID: 84b55705, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:22 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:22 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:22 Replacing connection for connection IDs [84b55705 520b9143] with a closed connection. 2025/04/30 10:33:22 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:22 server Connection a161bbe4925db704 closed. 2025/04/30 10:33:22 server <- Received Initial packet. 2025/04/30 10:33:22 Created qlog file: /logs/qlog/172eb6115f73c213.sqlog 2025/04/30 10:33:22 server Changing connection ID to 4f6088e0. 2025/04/30 10:33:22 Adding connection IDs 172eb6115f73c213 and 4f6088e0 for a new connection. 2025/04/30 10:33:22 server <- Reading packet 1 (1200 bytes) for connection 172eb6115f73c213, Initial 2025/04/30 10:33:22 server Long Header{Type: Initial, DestConnectionID: 172eb6115f73c213, SrcConnectionID: 8e06ccabcd218b3a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:22 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:22 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:22 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:22 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8e06ccabcd218b3a, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:22 Adding connection ID da68bc70. 2025/04/30 10:33:22 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 172eb6115f73c213 2025/04/30 10:33:22 server Long Header{Type: Initial, DestConnectionID: 8e06ccabcd218b3a, SrcConnectionID: 4f6088e0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 467, Version: v1} 2025/04/30 10:33:22 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:22 server Long Header{Type: Handshake, DestConnectionID: 8e06ccabcd218b3a, SrcConnectionID: 4f6088e0, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 10:33:22 server Short Header{DestConnectionID: 8e06ccabcd218b3a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da68bc70, StatelessResetToken: 0x8988fa4d777913d37f0ee69d412b5638} 2025/04/30 10:33:22 server <- Reading packet 3 (1201 bytes) for connection 4f6088e0, Initial 2025/04/30 10:33:22 server Long Header{Type: Initial, DestConnectionID: 4f6088e0, SrcConnectionID: 8e06ccabcd218b3a, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:22 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:22 server newly acked packets (1): [0] 2025/04/30 10:33:22 server updated RTT: 37.611876ms (σ: 18.805938ms) 2025/04/30 10:33:22 server <- Reading packet 0 (76 bytes) for connection 4f6088e0, Handshake 2025/04/30 10:33:22 server Long Header{Type: Handshake, DestConnectionID: 4f6088e0, SrcConnectionID: 8e06ccabcd218b3a, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:22 server Dropping Initial keys. 2025/04/30 10:33:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:22 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:22 Retiring connection ID 172eb6115f73c213 in 5s. 2025/04/30 10:33:22 server Dropping Handshake keys. 2025/04/30 10:33:22 server -> Sending packet 1 (259 bytes) for connection 172eb6115f73c213, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 8e06ccabcd218b3a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:22 server -> &wire.NewTokenFrame{Token: 0xa3c3a91630075d15b7cd6db200458dc48d47ac42c2fb6aa89d9dc3a9c7de4b8e3a2aef66fff1467d5dc54b41c30d9ff9b22f0f62fdb8727c733229f9a67627bb8b5abcc0821cf254d488e89fb81e94d3bb5d9758b1eb} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:22 server <- Reading packet 2 (28 bytes) for connection 4f6088e0, 1-RTT 2025/04/30 10:33:22 server Short Header{DestConnectionID: 4f6088e0, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:22 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:22 server newly acked packets (2): [0 1] 2025/04/30 10:33:22 server updated RTT: 39.361ms (σ: 17.603ms) 2025/04/30 10:33:22 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:22 server Canceling loss detection timer. 2025/04/30 10:33:22 server <- Reading packet 4 (43 bytes) for connection 4f6088e0, 1-RTT 2025/04/30 10:33:22 server Short Header{DestConnectionID: 4f6088e0, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:22 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:22 server -> Sending packet 2 (1366 bytes) for connection 172eb6115f73c213, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 8e06ccabcd218b3a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.PingFrame{} 2025/04/30 10:33:22 Received request: GET /dxowhutljj 2025/04/30 10:33:22 server -> Sending packet 3 (34 bytes) for connection 172eb6115f73c213, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 8e06ccabcd218b3a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 142.555µs} 2025/04/30 10:33:22 server -> Sending packet 4 (1053 bytes) for connection 172eb6115f73c213, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 8e06ccabcd218b3a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:22 server <- Reading packet 5 (43 bytes) for connection 4f6088e0, 1-RTT 2025/04/30 10:33:22 server Short Header{DestConnectionID: 4f6088e0, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:22 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:22 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:22 server -> Sending packet 5 (35 bytes) for connection 172eb6115f73c213, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 8e06ccabcd218b3a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25.230936ms} 2025/04/30 10:33:22 server <- Received Initial packet. 2025/04/30 10:33:22 Created qlog file: /logs/qlog/d3e0fd83e36b66c6.sqlog 2025/04/30 10:33:22 server Changing connection ID to 1ea433db. 2025/04/30 10:33:22 Adding connection IDs d3e0fd83e36b66c6 and 1ea433db for a new connection. 2025/04/30 10:33:22 server <- Reading packet 0 (1200 bytes) for connection d3e0fd83e36b66c6, Initial 2025/04/30 10:33:22 server Long Header{Type: Initial, DestConnectionID: d3e0fd83e36b66c6, SrcConnectionID: 883d4e73eab521e5, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:22 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:22 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:22 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:22 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 883d4e73eab521e5, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:22 Adding connection ID 264d8d12. 2025/04/30 10:33:22 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d3e0fd83e36b66c6 2025/04/30 10:33:22 server Long Header{Type: Initial, DestConnectionID: 883d4e73eab521e5, SrcConnectionID: 1ea433db, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 459, Version: v1} 2025/04/30 10:33:22 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:22 server Long Header{Type: Handshake, DestConnectionID: 883d4e73eab521e5, SrcConnectionID: 1ea433db, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 10:33:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:33:22 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 264d8d12, StatelessResetToken: 0x54250b847a00afe43487738319a50fbc} 2025/04/30 10:33:22 server <- Reading packet 1 (1201 bytes) for connection 1ea433db, Initial 2025/04/30 10:33:22 server Long Header{Type: Initial, DestConnectionID: 1ea433db, SrcConnectionID: 883d4e73eab521e5, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:22 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:22 server newly acked packets (1): [0] 2025/04/30 10:33:22 server updated RTT: 37.476885ms (σ: 18.738442ms) 2025/04/30 10:33:22 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 10:33:22 server <- Reading packet 1 (42 bytes) for connection 1ea433db, Handshake 2025/04/30 10:33:22 server Long Header{Type: Handshake, DestConnectionID: 1ea433db, SrcConnectionID: 883d4e73eab521e5, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:22 server Dropping Initial keys. 2025/04/30 10:33:22 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:22 server newly acked packets (1): [0] 2025/04/30 10:33:22 server updated RTT: 37.978ms (σ: 15.059ms) 2025/04/30 10:33:22 server Canceling loss detection timer. 2025/04/30 10:33:22 server Queueing packet (43 bytes) for later decryption 2025/04/30 10:33:22 server Queueing packet (28 bytes) for later decryption 2025/04/30 10:33:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:22 server -> Sending packet 7 (1053 bytes) for connection 172eb6115f73c213, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 8e06ccabcd218b3a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:22 server -> Sending packet 8 (1053 bytes) for connection 172eb6115f73c213, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:22 server Short Header{DestConnectionID: 8e06ccabcd218b3a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:23 server <- Reading packet 8 (33 bytes) for connection 4f6088e0, 1-RTT 2025/04/30 10:33:23 server Short Header{DestConnectionID: 4f6088e0, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:23 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:23 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:23 Replacing connection for connection IDs [4f6088e0 da68bc70] with a closed connection. 2025/04/30 10:33:23 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:23 server Connection 172eb6115f73c213 closed. 2025/04/30 10:33:23 server <- Reading packet 2 (76 bytes) for connection 1ea433db, Handshake 2025/04/30 10:33:23 server Long Header{Type: Handshake, DestConnectionID: 1ea433db, SrcConnectionID: 883d4e73eab521e5, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:23 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:23 Retiring connection ID d3e0fd83e36b66c6 in 5s. 2025/04/30 10:33:23 server Dropping Handshake keys. 2025/04/30 10:33:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:23 server -> Sending packet 2 (283 bytes) for connection d3e0fd83e36b66c6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:23 server -> &wire.NewTokenFrame{Token: 0x71f74778ba69421c25048af64ec098b064c3d0b2b10340adc0671788b4e38a2e7500f380a12c22c4d109eea6273ac30b1a505bf2e7a917e60f7ce0396529044167f4913151570a87cd4ba87fa836828e76c368040dbf} 2025/04/30 10:33:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 264d8d12, StatelessResetToken: 0x54250b847a00afe43487738319a50fbc} 2025/04/30 10:33:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:23 server -> Sending packet 3 (283 bytes) for connection d3e0fd83e36b66c6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:23 server -> &wire.NewTokenFrame{Token: 0x71f74778ba69421c25048af64ec098b064c3d0b2b10340adc0671788b4e38a2e7500f380a12c22c4d109eea6273ac30b1a505bf2e7a917e60f7ce0396529044167f4913151570a87cd4ba87fa836828e76c368040dbf} 2025/04/30 10:33:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 264d8d12, StatelessResetToken: 0x54250b847a00afe43487738319a50fbc} 2025/04/30 10:33:23 server <- Reading packet 0 (43 bytes) for connection 1ea433db, 1-RTT 2025/04/30 10:33:23 server Short Header{DestConnectionID: 1ea433db, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:23 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:23 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:23 server <- Reading packet 1 (28 bytes) for connection 1ea433db, 1-RTT 2025/04/30 10:33:23 server Short Header{DestConnectionID: 1ea433db, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:23 server -> Sending packet 4 (33 bytes) for connection d3e0fd83e36b66c6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 77.529297ms} 2025/04/30 10:33:23 Received request: GET /xawuhreiqn 2025/04/30 10:33:23 server -> Sending packet 5 (1053 bytes) for connection d3e0fd83e36b66c6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:23 server <- Reading packet 2 (43 bytes) for connection 1ea433db, 1-RTT 2025/04/30 10:33:23 server Short Header{DestConnectionID: 1ea433db, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:23 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:23 server <- Reading packet 3 (30 bytes) for connection 1ea433db, 1-RTT 2025/04/30 10:33:23 server Short Header{DestConnectionID: 1ea433db, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:23 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 19ms} 2025/04/30 10:33:23 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:23 server -> Sending packet 6 (33 bytes) for connection d3e0fd83e36b66c6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 6.16799ms} 2025/04/30 10:33:23 Tracking 15 connection IDs and 0 reset tokens. 2025/04/30 10:33:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:23 server -> Sending packet 8 (283 bytes) for connection d3e0fd83e36b66c6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 264d8d12, StatelessResetToken: 0x54250b847a00afe43487738319a50fbc} 2025/04/30 10:33:23 server -> &wire.NewTokenFrame{Token: 0x71f74778ba69421c25048af64ec098b064c3d0b2b10340adc0671788b4e38a2e7500f380a12c22c4d109eea6273ac30b1a505bf2e7a917e60f7ce0396529044167f4913151570a87cd4ba87fa836828e76c368040dbf} 2025/04/30 10:33:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:23 server Skipping packet number 7 2025/04/30 10:33:23 server -> Sending packet 9 (1053 bytes) for connection d3e0fd83e36b66c6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:23 server -> Sending packet 10 (1366 bytes) for connection d3e0fd83e36b66c6, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: 883d4e73eab521e5, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.PingFrame{} 2025/04/30 10:33:23 server <- Reading packet 4 (33 bytes) for connection 1ea433db, 1-RTT 2025/04/30 10:33:23 server Short Header{DestConnectionID: 1ea433db, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:23 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:23 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:23 Replacing connection for connection IDs [1ea433db 264d8d12] with a closed connection. 2025/04/30 10:33:23 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:23 server Connection d3e0fd83e36b66c6 closed. 2025/04/30 10:33:23 server <- Received Initial packet. 2025/04/30 10:33:23 Created qlog file: /logs/qlog/78298daee41986d5.sqlog 2025/04/30 10:33:23 server Changing connection ID to 0aa67f8a. 2025/04/30 10:33:23 Adding connection IDs 78298daee41986d5 and 0aa67f8a for a new connection. 2025/04/30 10:33:23 server <- Reading packet 0 (1200 bytes) for connection 78298daee41986d5, Initial 2025/04/30 10:33:23 server Long Header{Type: Initial, DestConnectionID: 78298daee41986d5, SrcConnectionID: e556843bc61f5198, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:23 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:23 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:23 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:23 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e556843bc61f5198, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:23 Adding connection ID 1106bd7e. 2025/04/30 10:33:23 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 78298daee41986d5 2025/04/30 10:33:23 server Long Header{Type: Initial, DestConnectionID: e556843bc61f5198, SrcConnectionID: 0aa67f8a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:23 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:23 server Long Header{Type: Handshake, DestConnectionID: e556843bc61f5198, SrcConnectionID: 0aa67f8a, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:23 server Short Header{DestConnectionID: e556843bc61f5198, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1106bd7e, StatelessResetToken: 0x8709d0bdb90650ab58ce8e0045e2715c} 2025/04/30 10:33:23 server <- Reading packet 1 (1200 bytes) for connection 78298daee41986d5, Initial 2025/04/30 10:33:23 server Long Header{Type: Initial, DestConnectionID: 78298daee41986d5, SrcConnectionID: e556843bc61f5198, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:23 server -> Sending packet 1 (45 bytes) for connection 78298daee41986d5, Initial 2025/04/30 10:33:23 server Long Header{Type: Initial, DestConnectionID: e556843bc61f5198, SrcConnectionID: 0aa67f8a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:23 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:23 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:23 server -> Sending packet 2 (1280 bytes) for connection 78298daee41986d5, Initial 2025/04/30 10:33:23 server Long Header{Type: Initial, DestConnectionID: e556843bc61f5198, SrcConnectionID: 0aa67f8a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:23 server -> Sending packet 3 (1280 bytes) for connection 78298daee41986d5, Initial 2025/04/30 10:33:23 server Long Header{Type: Initial, DestConnectionID: e556843bc61f5198, SrcConnectionID: 0aa67f8a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:23 server <- Reading packet 0 (40 bytes) for connection 0aa67f8a, Handshake 2025/04/30 10:33:23 server Long Header{Type: Handshake, DestConnectionID: 0aa67f8a, SrcConnectionID: e556843bc61f5198, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:23 server Dropping Initial keys. 2025/04/30 10:33:23 server <- &wire.PingFrame{} 2025/04/30 10:33:23 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:23 server -> Sending packet 1 (749 bytes) for connection 78298daee41986d5, Handshake 2025/04/30 10:33:23 server Long Header{Type: Handshake, DestConnectionID: e556843bc61f5198, SrcConnectionID: 0aa67f8a, PacketNumber: 1, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:23 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:23 server -> Sending packet 2 (744 bytes) for connection 78298daee41986d5, Handshake 2025/04/30 10:33:23 server Long Header{Type: Handshake, DestConnectionID: e556843bc61f5198, SrcConnectionID: 0aa67f8a, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:23 server <- Reading packet 1 (76 bytes) for connection 0aa67f8a, Handshake 2025/04/30 10:33:23 server Long Header{Type: Handshake, DestConnectionID: 0aa67f8a, SrcConnectionID: e556843bc61f5198, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:23 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:23 Retiring connection ID 78298daee41986d5 in 5s. 2025/04/30 10:33:23 server Dropping Handshake keys. 2025/04/30 10:33:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:23 server -> Sending packet 2 (280 bytes) for connection 78298daee41986d5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: e556843bc61f5198, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.NewTokenFrame{Token: 0xeb31a50305a1bb10cf81533b872538df7b274a0e87e2611d4c8f3b827e5d59624882b92b0b77c91093a28844b0ebb6264d03e1879004d67578e095c6710ff40a104784596156857f6bee5ff037c0896c93dba0d2c5c0} 2025/04/30 10:33:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1106bd7e, StatelessResetToken: 0x8709d0bdb90650ab58ce8e0045e2715c} 2025/04/30 10:33:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:23 server -> Sending packet 3 (280 bytes) for connection 78298daee41986d5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: e556843bc61f5198, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1106bd7e, StatelessResetToken: 0x8709d0bdb90650ab58ce8e0045e2715c} 2025/04/30 10:33:23 server -> &wire.NewTokenFrame{Token: 0xeb31a50305a1bb10cf81533b872538df7b274a0e87e2611d4c8f3b827e5d59624882b92b0b77c91093a28844b0ebb6264d03e1879004d67578e095c6710ff40a104784596156857f6bee5ff037c0896c93dba0d2c5c0} 2025/04/30 10:33:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:23 server -> Sending packet 4 (1366 bytes) for connection 78298daee41986d5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: e556843bc61f5198, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.PingFrame{} 2025/04/30 10:33:23 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:23 server <- Reading packet 4 (43 bytes) for connection 0aa67f8a, 1-RTT 2025/04/30 10:33:23 server Short Header{DestConnectionID: 0aa67f8a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:23 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:23 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:23 server -> Sending packet 5 (32 bytes) for connection 78298daee41986d5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: e556843bc61f5198, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 96.85µs} 2025/04/30 10:33:23 Received request: GET /bsyaikubgk 2025/04/30 10:33:23 server -> Sending packet 6 (1053 bytes) for connection 78298daee41986d5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:23 server Short Header{DestConnectionID: e556843bc61f5198, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:24 server <- Reading packet 5 (48 bytes) for connection 0aa67f8a, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: 0aa67f8a, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:24 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:24 server newly acked packets (1): [3] 2025/04/30 10:33:24 server updated RTT: 337.527427ms (σ: 168.763713ms) 2025/04/30 10:33:24 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:24 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:24 server <- Reading packet 6 (33 bytes) for connection 0aa67f8a, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: 0aa67f8a, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:24 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:24 Replacing connection for connection IDs [0aa67f8a 1106bd7e] with a closed connection. 2025/04/30 10:33:24 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:24 server Connection 78298daee41986d5 closed. 2025/04/30 10:33:24 server <- Received Initial packet. 2025/04/30 10:33:24 Created qlog file: /logs/qlog/bd370005c3efa281.sqlog 2025/04/30 10:33:24 server Changing connection ID to 2365c7b7. 2025/04/30 10:33:24 Adding connection IDs bd370005c3efa281 and 2365c7b7 for a new connection. 2025/04/30 10:33:24 server <- Reading packet 0 (1200 bytes) for connection bd370005c3efa281, Initial 2025/04/30 10:33:24 server Long Header{Type: Initial, DestConnectionID: bd370005c3efa281, SrcConnectionID: 901f763604c8bcf0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 901f763604c8bcf0, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:24 Adding connection ID d29edec9. 2025/04/30 10:33:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bd370005c3efa281 2025/04/30 10:33:24 server Long Header{Type: Initial, DestConnectionID: 901f763604c8bcf0, SrcConnectionID: 2365c7b7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 459, Version: v1} 2025/04/30 10:33:24 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:24 server Long Header{Type: Handshake, DestConnectionID: 901f763604c8bcf0, SrcConnectionID: 2365c7b7, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d29edec9, StatelessResetToken: 0x4d74facf382943cd11e7c64e98608638} 2025/04/30 10:33:24 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:24 server -> Sending packet 1 (1280 bytes) for connection bd370005c3efa281, Initial 2025/04/30 10:33:24 server Long Header{Type: Initial, DestConnectionID: 901f763604c8bcf0, SrcConnectionID: 2365c7b7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:24 server -> Sending packet 2 (1280 bytes) for connection bd370005c3efa281, Initial 2025/04/30 10:33:24 server Long Header{Type: Initial, DestConnectionID: 901f763604c8bcf0, SrcConnectionID: 2365c7b7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:24 server Canceling loss detection timer. 2025/04/30 10:33:24 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 10:33:24 server <- Reading packet 2 (1201 bytes) for connection 2365c7b7, Initial 2025/04/30 10:33:24 server Long Header{Type: Initial, DestConnectionID: 2365c7b7, SrcConnectionID: 901f763604c8bcf0, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:24 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:24 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:24 server -> Sending packet 1 (748 bytes) for connection bd370005c3efa281, Handshake 2025/04/30 10:33:24 server Long Header{Type: Handshake, DestConnectionID: 901f763604c8bcf0, SrcConnectionID: 2365c7b7, PacketNumber: 1, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:33:24 server -> Sending packet 2 (748 bytes) for connection bd370005c3efa281, Handshake 2025/04/30 10:33:24 server Long Header{Type: Handshake, DestConnectionID: 901f763604c8bcf0, SrcConnectionID: 2365c7b7, PacketNumber: 2, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 10:33:24 server <- Reading packet 0 (76 bytes) for connection 2365c7b7, Handshake 2025/04/30 10:33:24 server Long Header{Type: Handshake, DestConnectionID: 2365c7b7, SrcConnectionID: 901f763604c8bcf0, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:24 server Dropping Initial keys. 2025/04/30 10:33:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:24 Retiring connection ID bd370005c3efa281 in 5s. 2025/04/30 10:33:24 server Dropping Handshake keys. 2025/04/30 10:33:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:24 server -> Sending packet 2 (280 bytes) for connection bd370005c3efa281, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d29edec9, StatelessResetToken: 0x4d74facf382943cd11e7c64e98608638} 2025/04/30 10:33:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:24 server -> &wire.NewTokenFrame{Token: 0x52c6e7d80202ce0542f388b4f4c256476433ed04da9b6c1889597b5fbb8a72027c6d561efc32b832986a5433464f9bebb0692c2125d54d97499f6e97fbc4f7a17b7be89693d1bf46998d80721c7bfc7e9bc713ad2e59} 2025/04/30 10:33:24 server -> Sending packet 3 (280 bytes) for connection bd370005c3efa281, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:24 server -> &wire.NewTokenFrame{Token: 0x52c6e7d80202ce0542f388b4f4c256476433ed04da9b6c1889597b5fbb8a72027c6d561efc32b832986a5433464f9bebb0692c2125d54d97499f6e97fbc4f7a17b7be89693d1bf46998d80721c7bfc7e9bc713ad2e59} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d29edec9, StatelessResetToken: 0x4d74facf382943cd11e7c64e98608638} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:24 server -> Sending packet 4 (1366 bytes) for connection bd370005c3efa281, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.PingFrame{} 2025/04/30 10:33:24 server <- Reading packet 1 (29 bytes) for connection 2365c7b7, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: 2365c7b7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:33:24 server newly acked packets (1): [4] 2025/04/30 10:33:24 server updated RTT: 32.869649ms (σ: 16.434824ms) 2025/04/30 10:33:24 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:24 server setting loss timer for packet 3 (1-RTT) to 36.978355ms (in 2025-04-30 10:33:24.500442108 +0000 UTC m=+5.372061041) 2025/04/30 10:33:24 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:33:24.500442108 +0000 UTC m=+5.372061041 2025/04/30 10:33:24 server lost packet 3 (time threshold) 2025/04/30 10:33:24 server Canceling loss detection timer. 2025/04/30 10:33:24 server -> Sending packet 5 (280 bytes) for connection bd370005c3efa281, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d29edec9, StatelessResetToken: 0x4d74facf382943cd11e7c64e98608638} 2025/04/30 10:33:24 server -> &wire.NewTokenFrame{Token: 0x52c6e7d80202ce0542f388b4f4c256476433ed04da9b6c1889597b5fbb8a72027c6d561efc32b832986a5433464f9bebb0692c2125d54d97499f6e97fbc4f7a17b7be89693d1bf46998d80721c7bfc7e9bc713ad2e59} 2025/04/30 10:33:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:24 server -> Sending packet 7 (280 bytes) for connection bd370005c3efa281, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d29edec9, StatelessResetToken: 0x4d74facf382943cd11e7c64e98608638} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:24 server -> &wire.NewTokenFrame{Token: 0x52c6e7d80202ce0542f388b4f4c256476433ed04da9b6c1889597b5fbb8a72027c6d561efc32b832986a5433464f9bebb0692c2125d54d97499f6e97fbc4f7a17b7be89693d1bf46998d80721c7bfc7e9bc713ad2e59} 2025/04/30 10:33:24 server -> Sending packet 8 (280 bytes) for connection bd370005c3efa281, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d29edec9, StatelessResetToken: 0x4d74facf382943cd11e7c64e98608638} 2025/04/30 10:33:24 server -> &wire.NewTokenFrame{Token: 0x52c6e7d80202ce0542f388b4f4c256476433ed04da9b6c1889597b5fbb8a72027c6d561efc32b832986a5433464f9bebb0692c2125d54d97499f6e97fbc4f7a17b7be89693d1bf46998d80721c7bfc7e9bc713ad2e59} 2025/04/30 10:33:24 server <- Reading packet 3 (32 bytes) for connection 2365c7b7, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: 2365c7b7, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 19ms} 2025/04/30 10:33:24 server -> Sending packet 9 (1409 bytes) for connection bd370005c3efa281, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.PingFrame{} 2025/04/30 10:33:24 server <- Reading packet 4 (43 bytes) for connection 2365c7b7, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: 2365c7b7, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:24 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:24 server -> Sending packet 10 (34 bytes) for connection bd370005c3efa281, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 111.388µs} 2025/04/30 10:33:24 Received request: GET /xrulxfjgga 2025/04/30 10:33:24 server -> Sending packet 11 (1053 bytes) for connection bd370005c3efa281, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 901f763604c8bcf0, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:24 server <- Reading packet 6 (31 bytes) for connection 2365c7b7, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: 2365c7b7, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:24 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:24 Replacing connection for connection IDs [2365c7b7 d29edec9] with a closed connection. 2025/04/30 10:33:24 server Connection bd370005c3efa281 closed. 2025/04/30 10:33:24 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:24 server <- Received Initial packet. 2025/04/30 10:33:24 Created qlog file: /logs/qlog/b17cae4f2bbb14a9.sqlog 2025/04/30 10:33:24 server Changing connection ID to f3e99ee5. 2025/04/30 10:33:24 Adding connection IDs b17cae4f2bbb14a9 and f3e99ee5 for a new connection. 2025/04/30 10:33:24 server <- Reading packet 0 (1200 bytes) for connection b17cae4f2bbb14a9, Initial 2025/04/30 10:33:24 server Long Header{Type: Initial, DestConnectionID: b17cae4f2bbb14a9, SrcConnectionID: 1023a71d67dbddf3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 1023a71d67dbddf3, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:24 Adding connection ID daa1afdb. 2025/04/30 10:33:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b17cae4f2bbb14a9 2025/04/30 10:33:24 server Long Header{Type: Initial, DestConnectionID: 1023a71d67dbddf3, SrcConnectionID: f3e99ee5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 456, Version: v1} 2025/04/30 10:33:24 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:24 server Long Header{Type: Handshake, DestConnectionID: 1023a71d67dbddf3, SrcConnectionID: f3e99ee5, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:33:24 server Short Header{DestConnectionID: 1023a71d67dbddf3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: daa1afdb, StatelessResetToken: 0x484f9c538a2997e050dd121892900c74} 2025/04/30 10:33:24 server <- Reading packet 1 (1201 bytes) for connection f3e99ee5, Initial 2025/04/30 10:33:24 server Long Header{Type: Initial, DestConnectionID: f3e99ee5, SrcConnectionID: 1023a71d67dbddf3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:24 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:24 server newly acked packets (1): [0] 2025/04/30 10:33:24 server updated RTT: 36.825544ms (σ: 18.412772ms) 2025/04/30 10:33:24 server <- Reading packet 1 (42 bytes) for connection f3e99ee5, Handshake 2025/04/30 10:33:24 server Long Header{Type: Handshake, DestConnectionID: f3e99ee5, SrcConnectionID: 1023a71d67dbddf3, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:24 server Dropping Initial keys. 2025/04/30 10:33:24 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:24 server newly acked packets (1): [0] 2025/04/30 10:33:24 server updated RTT: 37.121ms (σ: 14.402ms) 2025/04/30 10:33:24 server Canceling loss detection timer. 2025/04/30 10:33:24 server Queueing packet (43 bytes) for later decryption 2025/04/30 10:33:24 server Queueing packet (28 bytes) for later decryption 2025/04/30 10:33:24 server <- Reading packet 2 (76 bytes) for connection f3e99ee5, Handshake 2025/04/30 10:33:24 server Long Header{Type: Handshake, DestConnectionID: f3e99ee5, SrcConnectionID: 1023a71d67dbddf3, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:24 Retiring connection ID b17cae4f2bbb14a9 in 5s. 2025/04/30 10:33:24 server Dropping Handshake keys. 2025/04/30 10:33:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:24 server -> Sending packet 2 (283 bytes) for connection b17cae4f2bbb14a9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 1023a71d67dbddf3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: daa1afdb, StatelessResetToken: 0x484f9c538a2997e050dd121892900c74} 2025/04/30 10:33:24 server -> &wire.NewTokenFrame{Token: 0xf2dbac71e957df38860c61bed765ca276eff881caf7fe1962009d46e738dbe45607e2b9e96a819a13504ca342e355015e7b194831de7896038410454955a236cd46fcbca8eb69f637ea48cd81a8562157fbf5f2343f6} 2025/04/30 10:33:24 server -> Sending packet 3 (283 bytes) for connection b17cae4f2bbb14a9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 1023a71d67dbddf3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.NewTokenFrame{Token: 0xf2dbac71e957df38860c61bed765ca276eff881caf7fe1962009d46e738dbe45607e2b9e96a819a13504ca342e355015e7b194831de7896038410454955a236cd46fcbca8eb69f637ea48cd81a8562157fbf5f2343f6} 2025/04/30 10:33:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: daa1afdb, StatelessResetToken: 0x484f9c538a2997e050dd121892900c74} 2025/04/30 10:33:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:24 server <- Reading packet 0 (43 bytes) for connection f3e99ee5, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: f3e99ee5, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:24 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:24 server <- Reading packet 1 (28 bytes) for connection f3e99ee5, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: f3e99ee5, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:24 server -> Sending packet 4 (33 bytes) for connection b17cae4f2bbb14a9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 1023a71d67dbddf3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 77.551857ms} 2025/04/30 10:33:24 Received request: GET /lhqbdbyxgw 2025/04/30 10:33:24 server -> Sending packet 5 (1053 bytes) for connection b17cae4f2bbb14a9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 1023a71d67dbddf3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:24 server <- Reading packet 3 (30 bytes) for connection f3e99ee5, 1-RTT 2025/04/30 10:33:24 server Short Header{DestConnectionID: f3e99ee5, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:24 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:33:24 server newly acked packets (1): [3] 2025/04/30 10:33:24 server updated RTT: 39.008ms (σ: 14.576ms) 2025/04/30 10:33:24 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:24 server -> Sending packet 7 (1053 bytes) for connection b17cae4f2bbb14a9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 1023a71d67dbddf3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:24 server -> Sending packet 8 (1053 bytes) for connection b17cae4f2bbb14a9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:24 server Short Header{DestConnectionID: 1023a71d67dbddf3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:25 server <- Reading packet 4 (39 bytes) for connection f3e99ee5, 1-RTT 2025/04/30 10:33:25 server Short Header{DestConnectionID: f3e99ee5, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:25 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:25 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:25 Replacing connection for connection IDs [f3e99ee5 daa1afdb] with a closed connection. 2025/04/30 10:33:25 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:25 server Connection b17cae4f2bbb14a9 closed. 2025/04/30 10:33:25 server <- Received Initial packet. 2025/04/30 10:33:25 Created qlog file: /logs/qlog/4a21a9b22a527164.sqlog 2025/04/30 10:33:25 server Changing connection ID to 2d394322. 2025/04/30 10:33:25 Adding connection IDs 4a21a9b22a527164 and 2d394322 for a new connection. 2025/04/30 10:33:25 server <- Reading packet 0 (1200 bytes) for connection 4a21a9b22a527164, Initial 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: 4a21a9b22a527164, SrcConnectionID: df5ff439d3b254e8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:25 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:25 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:25 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:25 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: df5ff439d3b254e8, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:25 Adding connection ID 95fe10fb. 2025/04/30 10:33:25 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4a21a9b22a527164 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: df5ff439d3b254e8, SrcConnectionID: 2d394322, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 462, Version: v1} 2025/04/30 10:33:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: df5ff439d3b254e8, SrcConnectionID: 2d394322, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:25 server Short Header{DestConnectionID: df5ff439d3b254e8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 95fe10fb, StatelessResetToken: 0x89b6285e22c355cb25d0c860d1f22d74} 2025/04/30 10:33:25 server <- Reading packet 1 (1201 bytes) for connection 2d394322, Initial 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: 2d394322, SrcConnectionID: df5ff439d3b254e8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:25 server newly acked packets (1): [0] 2025/04/30 10:33:25 server updated RTT: 36.029574ms (σ: 18.014787ms) 2025/04/30 10:33:25 server <- Reading packet 0 (76 bytes) for connection 2d394322, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: 2d394322, SrcConnectionID: df5ff439d3b254e8, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:25 server Dropping Initial keys. 2025/04/30 10:33:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:25 Retiring connection ID 4a21a9b22a527164 in 5s. 2025/04/30 10:33:25 server Dropping Handshake keys. 2025/04/30 10:33:25 server -> Sending packet 1 (259 bytes) for connection 4a21a9b22a527164, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:25 server Short Header{DestConnectionID: df5ff439d3b254e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:25 server -> &wire.NewTokenFrame{Token: 0x20381f0e5ffd36471fb8191ef8e1a4d4c9076e731e7406f0b89500307aef0d45f1a5f17d58c66ed61677d29e0931a31536914cb00e3c31f6527684c014283c5359d34ade00e4e3702c5818441d20c64016d3e9f7beca} 2025/04/30 10:33:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:25 server <- Reading packet 0 (48 bytes) for connection 2d394322, 1-RTT 2025/04/30 10:33:25 server Short Header{DestConnectionID: 2d394322, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:25 server newly acked packets (1): [0] 2025/04/30 10:33:25 server updated RTT: 36.409ms (σ: 14.272ms) 2025/04/30 10:33:25 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:25 server -> Sending packet 2 (32 bytes) for connection 4a21a9b22a527164, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:25 server Short Header{DestConnectionID: df5ff439d3b254e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 79.498µs} 2025/04/30 10:33:25 Received request: GET /yuwntlzukd 2025/04/30 10:33:25 server -> Sending packet 3 (1053 bytes) for connection 4a21a9b22a527164, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:25 server Short Header{DestConnectionID: df5ff439d3b254e8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:25 server <- Reading packet 1 (28 bytes) for connection 2d394322, 1-RTT 2025/04/30 10:33:25 server Short Header{DestConnectionID: 2d394322, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:25 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 1ms} 2025/04/30 10:33:25 server newly acked packets (2): [1 3] 2025/04/30 10:33:25 server updated RTT: 35.93ms (σ: 11.661ms) 2025/04/30 10:33:25 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:25 server Canceling loss detection timer. 2025/04/30 10:33:25 server -> Sending packet 4 (30 bytes) for connection 4a21a9b22a527164, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:25 server Short Header{DestConnectionID: df5ff439d3b254e8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:33:25 server <- Reading packet 2 (31 bytes) for connection 2d394322, 1-RTT 2025/04/30 10:33:25 server Short Header{DestConnectionID: 2d394322, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:25 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:25 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:25 Replacing connection for connection IDs [2d394322 95fe10fb] with a closed connection. 2025/04/30 10:33:25 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:25 server Connection 4a21a9b22a527164 closed. 2025/04/30 10:33:25 server <- Received Initial packet. 2025/04/30 10:33:25 Created qlog file: /logs/qlog/6858aa364c8d44a8.sqlog 2025/04/30 10:33:25 server Changing connection ID to c4cfbc2a. 2025/04/30 10:33:25 Adding connection IDs 6858aa364c8d44a8 and c4cfbc2a for a new connection. 2025/04/30 10:33:25 server <- Reading packet 0 (1200 bytes) for connection 6858aa364c8d44a8, Initial 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: 6858aa364c8d44a8, SrcConnectionID: 044e8681394dc0c7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:25 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:25 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:25 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:25 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 044e8681394dc0c7, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:25 Adding connection ID 70de38fd. 2025/04/30 10:33:25 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6858aa364c8d44a8 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 462, Version: v1} 2025/04/30 10:33:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:25 server Short Header{DestConnectionID: 044e8681394dc0c7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 70de38fd, StatelessResetToken: 0x79f6eabaef59b6c342143482487c7131} 2025/04/30 10:33:25 Tracking 30 connection IDs and 0 reset tokens. 2025/04/30 10:33:25 server <- Reading packet 1 (1200 bytes) for connection 6858aa364c8d44a8, Initial 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: 6858aa364c8d44a8, SrcConnectionID: 044e8681394dc0c7, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:25 server -> Sending packet 1 (45 bytes) for connection 6858aa364c8d44a8, Initial 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:25 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:25 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:25 server -> Sending packet 2 (1280 bytes) for connection 6858aa364c8d44a8, Initial 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:25 server -> Sending packet 3 (1280 bytes) for connection 6858aa364c8d44a8, Initial 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:25 server <- Reading packet 2 (1201 bytes) for connection c4cfbc2a, Initial 2025/04/30 10:33:25 server Long Header{Type: Initial, DestConnectionID: c4cfbc2a, SrcConnectionID: 044e8681394dc0c7, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:25 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:25 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:25 server -> Sending packet 1 (745 bytes) for connection 6858aa364c8d44a8, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, PacketNumber: 1, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:25 server -> Sending packet 2 (745 bytes) for connection 6858aa364c8d44a8, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, PacketNumber: 2, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:25 server <- Reading packet 0 (40 bytes) for connection c4cfbc2a, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: c4cfbc2a, SrcConnectionID: 044e8681394dc0c7, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:25 server Dropping Initial keys. 2025/04/30 10:33:25 server <- &wire.PingFrame{} 2025/04/30 10:33:25 server -> Sending packet 3 (44 bytes) for connection 6858aa364c8d44a8, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:25 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:25 server -> Sending packet 4 (745 bytes) for connection 6858aa364c8d44a8, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, PacketNumber: 4, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:25 server -> Sending packet 5 (745 bytes) for connection 6858aa364c8d44a8, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: 044e8681394dc0c7, SrcConnectionID: c4cfbc2a, PacketNumber: 5, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:25 server <- Reading packet 2 (44 bytes) for connection c4cfbc2a, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: c4cfbc2a, SrcConnectionID: 044e8681394dc0c7, PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 10:33:25 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:33:25 server <- Reading packet 3 (76 bytes) for connection c4cfbc2a, Handshake 2025/04/30 10:33:25 server Long Header{Type: Handshake, DestConnectionID: c4cfbc2a, SrcConnectionID: 044e8681394dc0c7, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:25 Retiring connection ID 6858aa364c8d44a8 in 5s. 2025/04/30 10:33:25 server Dropping Handshake keys. 2025/04/30 10:33:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:25 server -> Sending packet 2 (280 bytes) for connection 6858aa364c8d44a8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:25 server Short Header{DestConnectionID: 044e8681394dc0c7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 70de38fd, StatelessResetToken: 0x79f6eabaef59b6c342143482487c7131} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:25 server -> &wire.NewTokenFrame{Token: 0x2f57bf39f0840f6317d9466ae7e4e87ab2856626a0f4bc56f7365d0015b7464a60e357afee1660473e016ac2ccac5e89332f75d9392c86b679340a0b50351fe63779da54dec8c4ea92f67a65651bef68c95bfeba8376} 2025/04/30 10:33:25 server -> Sending packet 3 (280 bytes) for connection 6858aa364c8d44a8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:25 server Short Header{DestConnectionID: 044e8681394dc0c7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:25 server -> &wire.NewTokenFrame{Token: 0x2f57bf39f0840f6317d9466ae7e4e87ab2856626a0f4bc56f7365d0015b7464a60e357afee1660473e016ac2ccac5e89332f75d9392c86b679340a0b50351fe63779da54dec8c4ea92f67a65651bef68c95bfeba8376} 2025/04/30 10:33:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 70de38fd, StatelessResetToken: 0x79f6eabaef59b6c342143482487c7131} 2025/04/30 10:33:25 server -> Sending packet 4 (1366 bytes) for connection 6858aa364c8d44a8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:25 server Short Header{DestConnectionID: 044e8681394dc0c7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.PingFrame{} 2025/04/30 10:33:25 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:25 server <- Reading packet 1 (43 bytes) for connection c4cfbc2a, 1-RTT 2025/04/30 10:33:25 server Short Header{DestConnectionID: c4cfbc2a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:25 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:25 server -> Sending packet 5 (32 bytes) for connection 6858aa364c8d44a8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:25 server Short Header{DestConnectionID: 044e8681394dc0c7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 100.137µs} 2025/04/30 10:33:25 Received request: GET /woystjcxnt 2025/04/30 10:33:25 server -> Sending packet 6 (1053 bytes) for connection 6858aa364c8d44a8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:25 server Short Header{DestConnectionID: 044e8681394dc0c7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:25 server <- Reading packet 3 (28 bytes) for connection c4cfbc2a, 1-RTT 2025/04/30 10:33:25 server Short Header{DestConnectionID: c4cfbc2a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:25 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 19ms} 2025/04/30 10:33:25 server newly acked packets (2): [3 4] 2025/04/30 10:33:25 server updated RTT: 52.233494ms (σ: 26.116747ms) 2025/04/30 10:33:25 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:26 server <- Reading packet 4 (33 bytes) for connection c4cfbc2a, 1-RTT 2025/04/30 10:33:26 server Short Header{DestConnectionID: c4cfbc2a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:26 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:26 Replacing connection for connection IDs [c4cfbc2a 70de38fd] with a closed connection. 2025/04/30 10:33:26 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:26 server Connection 6858aa364c8d44a8 closed. 2025/04/30 10:33:26 Removing connection ID 6acc4d5d115105b4 after it has been retired. 2025/04/30 10:33:26 Removing connection IDs [9d619c73 5569cffd] for a closed connection after it has been retired. 2025/04/30 10:33:26 Removing connection ID 2f1be33f25e4aae5 after it has been retired. 2025/04/30 10:33:26 server <- Received Initial packet. 2025/04/30 10:33:26 Created qlog file: /logs/qlog/45c3ebbab72cebf4.sqlog 2025/04/30 10:33:26 server Changing connection ID to 19b8a847. 2025/04/30 10:33:26 Adding connection IDs 45c3ebbab72cebf4 and 19b8a847 for a new connection. 2025/04/30 10:33:26 server <- Reading packet 3 (1200 bytes) for connection 45c3ebbab72cebf4, Initial 2025/04/30 10:33:26 server Long Header{Type: Initial, DestConnectionID: 45c3ebbab72cebf4, SrcConnectionID: 7b97af7592aabcb5, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7b97af7592aabcb5, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:26 Adding connection ID ba5d5bcc. 2025/04/30 10:33:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 45c3ebbab72cebf4 2025/04/30 10:33:26 server Long Header{Type: Initial, DestConnectionID: 7b97af7592aabcb5, SrcConnectionID: 19b8a847, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 466, Version: v1} 2025/04/30 10:33:26 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:33:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:26 server Long Header{Type: Handshake, DestConnectionID: 7b97af7592aabcb5, SrcConnectionID: 19b8a847, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 10:33:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:33:26 server Short Header{DestConnectionID: 7b97af7592aabcb5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ba5d5bcc, StatelessResetToken: 0x9673df7f79c80d45ceb36f28e3d17222} 2025/04/30 10:33:26 server <- Reading packet 4 (1200 bytes) for connection 19b8a847, Initial 2025/04/30 10:33:26 server Long Header{Type: Initial, DestConnectionID: 19b8a847, SrcConnectionID: 7b97af7592aabcb5, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 10:33:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:26 server -> Sending packet 1 (45 bytes) for connection 45c3ebbab72cebf4, Initial 2025/04/30 10:33:26 server Long Header{Type: Initial, DestConnectionID: 7b97af7592aabcb5, SrcConnectionID: 19b8a847, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:26 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:33:26 server <- Reading packet 5 (1201 bytes) for connection 19b8a847, Initial 2025/04/30 10:33:26 server Long Header{Type: Initial, DestConnectionID: 19b8a847, SrcConnectionID: 7b97af7592aabcb5, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:26 server newly acked packets (1): [0] 2025/04/30 10:33:26 server updated RTT: 36.702424ms (σ: 18.351212ms) 2025/04/30 10:33:26 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 10:33:26 server <- Reading packet 1 (42 bytes) for connection 19b8a847, Handshake 2025/04/30 10:33:26 server Long Header{Type: Handshake, DestConnectionID: 19b8a847, SrcConnectionID: 7b97af7592aabcb5, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:26 server Dropping Initial keys. 2025/04/30 10:33:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:26 server newly acked packets (1): [0] 2025/04/30 10:33:26 server updated RTT: 37.051ms (σ: 14.463ms) 2025/04/30 10:33:26 server Canceling loss detection timer. 2025/04/30 10:33:26 server Queueing packet (48 bytes) for later decryption 2025/04/30 10:33:26 Removing connection IDs [74f4f5a1 3e105250] for a closed connection after it has been retired. 2025/04/30 10:33:26 server <- Reading packet 4 (76 bytes) for connection 19b8a847, Handshake 2025/04/30 10:33:26 server Long Header{Type: Handshake, DestConnectionID: 19b8a847, SrcConnectionID: 7b97af7592aabcb5, PacketNumber: 4, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:26 Retiring connection ID 45c3ebbab72cebf4 in 5s. 2025/04/30 10:33:26 server Dropping Handshake keys. 2025/04/30 10:33:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:26 server -> Sending packet 2 (283 bytes) for connection 45c3ebbab72cebf4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:26 server Short Header{DestConnectionID: 7b97af7592aabcb5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ba5d5bcc, StatelessResetToken: 0x9673df7f79c80d45ceb36f28e3d17222} 2025/04/30 10:33:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:26 server -> &wire.NewTokenFrame{Token: 0xf16ed329e06481d13ee43404d7c6f3cc4df10f6d6b0e0252ed6a5c48075cd66bc4c56b7a8124f5999a3c45d5cf1ed61fac5ab8a2eb68439e9616cf26d1a1cff5f6db5b9500dd134a39c3b150ce08147c7ee374ad943a} 2025/04/30 10:33:26 server -> Sending packet 3 (283 bytes) for connection 45c3ebbab72cebf4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:26 server Short Header{DestConnectionID: 7b97af7592aabcb5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ba5d5bcc, StatelessResetToken: 0x9673df7f79c80d45ceb36f28e3d17222} 2025/04/30 10:33:26 server -> &wire.NewTokenFrame{Token: 0xf16ed329e06481d13ee43404d7c6f3cc4df10f6d6b0e0252ed6a5c48075cd66bc4c56b7a8124f5999a3c45d5cf1ed61fac5ab8a2eb68439e9616cf26d1a1cff5f6db5b9500dd134a39c3b150ce08147c7ee374ad943a} 2025/04/30 10:33:26 server <- Reading packet 0 (48 bytes) for connection 19b8a847, 1-RTT 2025/04/30 10:33:26 server Short Header{DestConnectionID: 19b8a847, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:26 server -> Sending packet 4 (35 bytes) for connection 45c3ebbab72cebf4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:26 server Short Header{DestConnectionID: 7b97af7592aabcb5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 291.886876ms} 2025/04/30 10:33:26 Received request: GET /zdcvhlomgp 2025/04/30 10:33:26 server -> Sending packet 5 (1053 bytes) for connection 45c3ebbab72cebf4, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:26 server Short Header{DestConnectionID: 7b97af7592aabcb5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:26 server <- Reading packet 3 (33 bytes) for connection 19b8a847, 1-RTT 2025/04/30 10:33:26 server Short Header{DestConnectionID: 19b8a847, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:26 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:26 Replacing connection for connection IDs [ba5d5bcc 19b8a847] with a closed connection. 2025/04/30 10:33:26 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:26 server Connection 45c3ebbab72cebf4 closed. 2025/04/30 10:33:26 server <- Received Initial packet. 2025/04/30 10:33:26 Created qlog file: /logs/qlog/33b7d5f464d93c86.sqlog 2025/04/30 10:33:26 server Changing connection ID to 118457c9. 2025/04/30 10:33:26 Adding connection IDs 33b7d5f464d93c86 and 118457c9 for a new connection. 2025/04/30 10:33:26 server <- Reading packet 0 (1200 bytes) for connection 33b7d5f464d93c86, Initial 2025/04/30 10:33:26 server Long Header{Type: Initial, DestConnectionID: 33b7d5f464d93c86, SrcConnectionID: 5c08e833c93581a9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 5c08e833c93581a9, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:26 Adding connection ID 6388107d. 2025/04/30 10:33:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 33b7d5f464d93c86 2025/04/30 10:33:26 server Long Header{Type: Initial, DestConnectionID: 5c08e833c93581a9, SrcConnectionID: 118457c9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:26 server Long Header{Type: Handshake, DestConnectionID: 5c08e833c93581a9, SrcConnectionID: 118457c9, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:26 server Short Header{DestConnectionID: 5c08e833c93581a9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6388107d, StatelessResetToken: 0xfb92914eccd89a14d0a6f1106444cce2} 2025/04/30 10:33:27 server <- Reading packet 1 (1201 bytes) for connection 118457c9, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: 118457c9, SrcConnectionID: 5c08e833c93581a9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 35.810762ms (σ: 17.905381ms) 2025/04/30 10:33:27 server <- Reading packet 0 (76 bytes) for connection 118457c9, Handshake 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: 118457c9, SrcConnectionID: 5c08e833c93581a9, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:27 server Dropping Initial keys. 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 Retiring connection ID 33b7d5f464d93c86 in 5s. 2025/04/30 10:33:27 server Dropping Handshake keys. 2025/04/30 10:33:27 server -> Sending packet 1 (259 bytes) for connection 33b7d5f464d93c86, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 5c08e833c93581a9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0x8bc5befd435b68cd9e46a75f19bc7c10a8016dc69e14ffe0a2077c8ae00e3d4ed4a1914400ba9fb6b712cd31c71f031c4f212c2b132d70a9853b0f03dbcb7585903e9803ec7276e604361a6e5ca313c345552949f41e} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:27 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:27 server <- Reading packet 0 (43 bytes) for connection 118457c9, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: 118457c9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:27 server -> Sending packet 2 (32 bytes) for connection 33b7d5f464d93c86, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 5c08e833c93581a9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 65.102µs} 2025/04/30 10:33:27 Received request: GET /wyivsmreyu 2025/04/30 10:33:27 server -> Sending packet 3 (1053 bytes) for connection 33b7d5f464d93c86, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 5c08e833c93581a9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:27 server <- Reading packet 1 (28 bytes) for connection 118457c9, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: 118457c9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 36.163ms (σ: 14.134ms) 2025/04/30 10:33:27 server <- Received Initial packet. 2025/04/30 10:33:27 Created qlog file: /logs/qlog/c86aa4d394ed20ee.sqlog 2025/04/30 10:33:27 server Changing connection ID to d49ad7d5. 2025/04/30 10:33:27 Adding connection IDs c86aa4d394ed20ee and d49ad7d5 for a new connection. 2025/04/30 10:33:27 server <- Reading packet 0 (1200 bytes) for connection c86aa4d394ed20ee, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: c86aa4d394ed20ee, SrcConnectionID: cdee62edbd4acf98, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: cdee62edbd4acf98, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:27 Adding connection ID 8716ec4f. 2025/04/30 10:33:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c86aa4d394ed20ee 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: cdee62edbd4acf98, SrcConnectionID: d49ad7d5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 457, Version: v1} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: cdee62edbd4acf98, SrcConnectionID: d49ad7d5, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:33:27 server Short Header{DestConnectionID: cdee62edbd4acf98, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8716ec4f, StatelessResetToken: 0xb6562b2615e51dd0c4a69e481e4227bb} 2025/04/30 10:33:27 server <- Reading packet 1 (1201 bytes) for connection d49ad7d5, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: d49ad7d5, SrcConnectionID: cdee62edbd4acf98, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 36.435134ms (σ: 18.217567ms) 2025/04/30 10:33:27 Removing connection ID a161bbe4925db704 after it has been retired. 2025/04/30 10:33:27 server <- Reading packet 0 (76 bytes) for connection d49ad7d5, Handshake 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: d49ad7d5, SrcConnectionID: cdee62edbd4acf98, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:27 server Dropping Initial keys. 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 Retiring connection ID c86aa4d394ed20ee in 5s. 2025/04/30 10:33:27 server Dropping Handshake keys. 2025/04/30 10:33:27 server -> Sending packet 1 (259 bytes) for connection c86aa4d394ed20ee, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: cdee62edbd4acf98, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0x3dbfd3a8832acffa01f3d5f0961714b04fa2f174176a2d9ac9e17d25067b898c3eef9f158e9b94a9fbe46db7b13ddc8e8601df3085a19f46239142f84ef3c62767031e5c561e8f67b7aee5ce961060dc6b91a99a839e} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 Tracking 32 connection IDs and 0 reset tokens. 2025/04/30 10:33:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:27 server -> Sending packet 5 (259 bytes) for connection 33b7d5f464d93c86, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 5c08e833c93581a9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0x8bc5befd435b68cd9e46a75f19bc7c10a8016dc69e14ffe0a2077c8ae00e3d4ed4a1914400ba9fb6b712cd31c71f031c4f212c2b132d70a9853b0f03dbcb7585903e9803ec7276e604361a6e5ca313c345552949f41e} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 server Skipping packet number 4 2025/04/30 10:33:27 server -> Sending packet 6 (1053 bytes) for connection 33b7d5f464d93c86, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 5c08e833c93581a9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:27 server <- Reading packet 1 (28 bytes) for connection d49ad7d5, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: d49ad7d5, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:27 server newly acked packets (2): [0 1] 2025/04/30 10:33:27 server updated RTT: 38.285ms (σ: 17.364ms) 2025/04/30 10:33:27 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:27 server Canceling loss detection timer. 2025/04/30 10:33:27 server <- Reading packet 3 (33 bytes) for connection 118457c9, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: 118457c9, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:27 Replacing connection for connection IDs [118457c9 6388107d] with a closed connection. 2025/04/30 10:33:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:27 server Connection 33b7d5f464d93c86 closed. 2025/04/30 10:33:27 server <- Reading packet 2 (43 bytes) for connection d49ad7d5, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: d49ad7d5, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:27 server -> Sending packet 2 (32 bytes) for connection c86aa4d394ed20ee, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:27 server Short Header{DestConnectionID: cdee62edbd4acf98, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 98.814µs} 2025/04/30 10:33:27 Received request: GET /ozdyhzxdqx 2025/04/30 10:33:27 server -> Sending packet 3 (1053 bytes) for connection c86aa4d394ed20ee, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:27 server Short Header{DestConnectionID: cdee62edbd4acf98, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:27 server <- Reading packet 3 (43 bytes) for connection d49ad7d5, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: d49ad7d5, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:27 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:27 server <- Reading packet 4 (31 bytes) for connection d49ad7d5, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: d49ad7d5, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:27 Replacing connection for connection IDs [d49ad7d5 8716ec4f] with a closed connection. 2025/04/30 10:33:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:27 server Connection c86aa4d394ed20ee closed. 2025/04/30 10:33:27 server <- Received Initial packet. 2025/04/30 10:33:27 Created qlog file: /logs/qlog/ef2c41b5dca3ccc1.sqlog 2025/04/30 10:33:27 server Changing connection ID to 47b78a67. 2025/04/30 10:33:27 Adding connection IDs ef2c41b5dca3ccc1 and 47b78a67 for a new connection. 2025/04/30 10:33:27 server <- Reading packet 0 (1200 bytes) for connection ef2c41b5dca3ccc1, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: ef2c41b5dca3ccc1, SrcConnectionID: 0599c8ece57f27ac, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0599c8ece57f27ac, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:27 Adding connection ID 4ec6ea1d. 2025/04/30 10:33:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ef2c41b5dca3ccc1 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: 0599c8ece57f27ac, SrcConnectionID: 47b78a67, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 456, Version: v1} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: 0599c8ece57f27ac, SrcConnectionID: 47b78a67, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0599c8ece57f27ac, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4ec6ea1d, StatelessResetToken: 0x214bc9d2a1fbd30271932f893f569180} 2025/04/30 10:33:27 server <- Reading packet 0 (76 bytes) for connection 47b78a67, Handshake 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: 47b78a67, SrcConnectionID: 0599c8ece57f27ac, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:27 server Dropping Initial keys. 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 Retiring connection ID ef2c41b5dca3ccc1 in 5s. 2025/04/30 10:33:27 server Dropping Handshake keys. 2025/04/30 10:33:27 server -> Sending packet 1 (1366 bytes) for connection ef2c41b5dca3ccc1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0599c8ece57f27ac, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.PingFrame{} 2025/04/30 10:33:27 server -> Sending packet 2 (256 bytes) for connection ef2c41b5dca3ccc1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0599c8ece57f27ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0x46f466e4e946215db9f49ff0b311f0b1ba95d79f3be93241cdaa13cd2dca1e8c60db379a27ea5ed1f9ea149ec0b707b08df04e8c436535fcba94c900f67c18b6ecefb4f866850229522fea6d7a83cc6997c1c409fde9} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 server <- Reading packet 0 (48 bytes) for connection 47b78a67, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: 47b78a67, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 38.632339ms (σ: 19.316169ms) 2025/04/30 10:33:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:27 Received request: GET /kpvwyenato 2025/04/30 10:33:27 server -> Sending packet 3 (32 bytes) for connection ef2c41b5dca3ccc1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0599c8ece57f27ac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 105.727µs} 2025/04/30 10:33:27 server -> Sending packet 4 (1053 bytes) for connection ef2c41b5dca3ccc1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0599c8ece57f27ac, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:27 server <- Reading packet 1 (27 bytes) for connection 47b78a67, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: 47b78a67, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (2): [2 4] 2025/04/30 10:33:27 server updated RTT: 37.821ms (σ: 16.108ms) 2025/04/30 10:33:27 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:27 server lost packet 1 (reordering threshold) 2025/04/30 10:33:27 server Canceling loss detection timer. 2025/04/30 10:33:27 server -> Sending packet 5 (30 bytes) for connection ef2c41b5dca3ccc1, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0599c8ece57f27ac, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:33:27 server <- Reading packet 2 (31 bytes) for connection 47b78a67, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: 47b78a67, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:27 Replacing connection for connection IDs [47b78a67 4ec6ea1d] with a closed connection. 2025/04/30 10:33:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:27 server Connection ef2c41b5dca3ccc1 closed. 2025/04/30 10:33:27 server <- Received Initial packet. 2025/04/30 10:33:27 Created qlog file: /logs/qlog/24583d899f48db23.sqlog 2025/04/30 10:33:27 server Changing connection ID to e41da938. 2025/04/30 10:33:27 Adding connection IDs 24583d899f48db23 and e41da938 for a new connection. 2025/04/30 10:33:27 server <- Reading packet 0 (1200 bytes) for connection 24583d899f48db23, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: 24583d899f48db23, SrcConnectionID: e345d6a4d46b9eab, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e345d6a4d46b9eab, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:27 Adding connection ID 830fb444. 2025/04/30 10:33:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 24583d899f48db23 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: e345d6a4d46b9eab, SrcConnectionID: e41da938, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 464, Version: v1} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: e345d6a4d46b9eab, SrcConnectionID: e41da938, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:33:27 server Short Header{DestConnectionID: e345d6a4d46b9eab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 830fb444, StatelessResetToken: 0xe7a2e9321fbce6d96fff42471a2f646b} 2025/04/30 10:33:27 server <- Reading packet 1 (1201 bytes) for connection e41da938, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: e41da938, SrcConnectionID: e345d6a4d46b9eab, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 36.287749ms (σ: 18.143874ms) 2025/04/30 10:33:27 server <- Reading packet 0 (76 bytes) for connection e41da938, Handshake 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: e41da938, SrcConnectionID: e345d6a4d46b9eab, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:27 server Dropping Initial keys. 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 Retiring connection ID 24583d899f48db23 in 5s. 2025/04/30 10:33:27 server Dropping Handshake keys. 2025/04/30 10:33:27 server -> Sending packet 1 (259 bytes) for connection 24583d899f48db23, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: e345d6a4d46b9eab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0x20e2d0cb4fb4424ccd161043974c66d9828559e9ccee5c5ad243a48553eb16630b7814c896e2da6f483ff80fda1a599598b287d4da546362eb45b6abdaad2424b7f88d34545bf2b139a9886a1c7805492a19e19c2d7c} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 server <- Reading packet 0 (48 bytes) for connection e41da938, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: e41da938, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 36.612ms (σ: 14.257ms) 2025/04/30 10:33:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:27 server -> Sending packet 2 (32 bytes) for connection 24583d899f48db23, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: e345d6a4d46b9eab, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 92.542µs} 2025/04/30 10:33:27 Received request: GET /vaizzisohj 2025/04/30 10:33:27 server -> Sending packet 3 (1053 bytes) for connection 24583d899f48db23, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: e345d6a4d46b9eab, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:27 Removing connection IDs [84b55705 520b9143] for a closed connection after it has been retired. 2025/04/30 10:33:27 server <- Reading packet 1 (31 bytes) for connection e41da938, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: e41da938, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:27 Replacing connection for connection IDs [e41da938 830fb444] with a closed connection. 2025/04/30 10:33:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:27 server Connection 24583d899f48db23 closed. 2025/04/30 10:33:27 server <- Received Initial packet. 2025/04/30 10:33:27 Created qlog file: /logs/qlog/7472e4be6d0f61ef.sqlog 2025/04/30 10:33:27 server Changing connection ID to b9558d93. 2025/04/30 10:33:27 Adding connection IDs 7472e4be6d0f61ef and b9558d93 for a new connection. 2025/04/30 10:33:27 server <- Reading packet 0 (1200 bytes) for connection 7472e4be6d0f61ef, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: 7472e4be6d0f61ef, SrcConnectionID: 1cb8f618f32257e4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 1cb8f618f32257e4, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:27 Adding connection ID d6d1ffb7. 2025/04/30 10:33:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7472e4be6d0f61ef 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: 1cb8f618f32257e4, SrcConnectionID: b9558d93, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 452, Version: v1} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: 1cb8f618f32257e4, SrcConnectionID: b9558d93, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 10:33:27 server Short Header{DestConnectionID: 1cb8f618f32257e4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d6d1ffb7, StatelessResetToken: 0x8421c6c3ec213029026010b98943c34c} 2025/04/30 10:33:27 server <- Reading packet 1 (1201 bytes) for connection b9558d93, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: b9558d93, SrcConnectionID: 1cb8f618f32257e4, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 35.692291ms (σ: 17.846145ms) 2025/04/30 10:33:27 server <- Reading packet 0 (76 bytes) for connection b9558d93, Handshake 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: b9558d93, SrcConnectionID: 1cb8f618f32257e4, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:27 server Dropping Initial keys. 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 Retiring connection ID 7472e4be6d0f61ef in 5s. 2025/04/30 10:33:27 server Dropping Handshake keys. 2025/04/30 10:33:27 server -> Sending packet 1 (259 bytes) for connection 7472e4be6d0f61ef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 1cb8f618f32257e4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0x9b41bfab6f2839038fcd623aad2724324893a2ecc6b6d82fa417e1374033707a0e7c1d70ff21dd477e8573acdf687ba37eeee3cf9e51aa17355cc8262a4c2fdd37a40991538887f90e29247e45a33bc81e32d90742a8} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:27 Removing connection ID 172eb6115f73c213 after it has been retired. 2025/04/30 10:33:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:27 server -> Sending packet 3 (51 bytes) for connection 7472e4be6d0f61ef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 1cb8f618f32257e4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d6d1ffb7, StatelessResetToken: 0x8421c6c3ec213029026010b98943c34c} 2025/04/30 10:33:27 server Skipping packet number 2 2025/04/30 10:33:27 server -> Sending packet 4 (259 bytes) for connection 7472e4be6d0f61ef, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 1cb8f618f32257e4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0x9b41bfab6f2839038fcd623aad2724324893a2ecc6b6d82fa417e1374033707a0e7c1d70ff21dd477e8573acdf687ba37eeee3cf9e51aa17355cc8262a4c2fdd37a40991538887f90e29247e45a33bc81e32d90742a8} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 server <- Reading packet 1 (29 bytes) for connection b9558d93, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: b9558d93, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (2): [3 4] 2025/04/30 10:33:27 server updated RTT: 35.255ms (σ: 14.258ms) 2025/04/30 10:33:27 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:27 server Canceling loss detection timer. 2025/04/30 10:33:27 server <- Reading packet 2 (43 bytes) for connection b9558d93, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: b9558d93, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:27 server -> Sending packet 5 (32 bytes) for connection 7472e4be6d0f61ef, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 1cb8f618f32257e4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 96.039µs} 2025/04/30 10:33:27 Received request: GET /zofcxtheqs 2025/04/30 10:33:27 server -> Sending packet 6 (1053 bytes) for connection 7472e4be6d0f61ef, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 1cb8f618f32257e4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:27 server <- Reading packet 3 (35 bytes) for connection b9558d93, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: b9558d93, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:27 Replacing connection for connection IDs [b9558d93 d6d1ffb7] with a closed connection. 2025/04/30 10:33:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:27 server Connection 7472e4be6d0f61ef closed. 2025/04/30 10:33:27 server <- Received Initial packet. 2025/04/30 10:33:27 Created qlog file: /logs/qlog/eb106e68ac61a77f.sqlog 2025/04/30 10:33:27 server Changing connection ID to f78eca7c. 2025/04/30 10:33:27 Adding connection IDs eb106e68ac61a77f and f78eca7c for a new connection. 2025/04/30 10:33:27 server <- Reading packet 0 (1200 bytes) for connection eb106e68ac61a77f, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: eb106e68ac61a77f, SrcConnectionID: 0359b14046d7629f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0359b14046d7629f, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:27 Adding connection ID 7d0d2cae. 2025/04/30 10:33:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection eb106e68ac61a77f 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: 0359b14046d7629f, SrcConnectionID: f78eca7c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 452, Version: v1} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: 0359b14046d7629f, SrcConnectionID: f78eca7c, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0359b14046d7629f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d0d2cae, StatelessResetToken: 0xc45f7ff8a68f5b5716c7653844129aef} 2025/04/30 10:33:27 server <- Reading packet 1 (1201 bytes) for connection f78eca7c, Initial 2025/04/30 10:33:27 server Long Header{Type: Initial, DestConnectionID: f78eca7c, SrcConnectionID: 0359b14046d7629f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 35.59116ms (σ: 17.79558ms) 2025/04/30 10:33:27 server <- Reading packet 1 (42 bytes) for connection f78eca7c, Handshake 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: f78eca7c, SrcConnectionID: 0359b14046d7629f, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:27 server Dropping Initial keys. 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:27 server newly acked packets (1): [0] 2025/04/30 10:33:27 server updated RTT: 35.816ms (σ: 13.797ms) 2025/04/30 10:33:27 server Canceling loss detection timer. 2025/04/30 10:33:27 server <- Reading packet 2 (76 bytes) for connection f78eca7c, Handshake 2025/04/30 10:33:27 server Long Header{Type: Handshake, DestConnectionID: f78eca7c, SrcConnectionID: 0359b14046d7629f, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:27 Retiring connection ID eb106e68ac61a77f in 5s. 2025/04/30 10:33:27 server Dropping Handshake keys. 2025/04/30 10:33:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:27 server -> Sending packet 2 (283 bytes) for connection eb106e68ac61a77f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0359b14046d7629f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d0d2cae, StatelessResetToken: 0xc45f7ff8a68f5b5716c7653844129aef} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0xafe507da0ef103f3971b53b69b4d713b297b14cf6575d2f080e028412f977f6225b7582f85adcc21265ef44cb032496fbb3664bae28814a3283f84d18f2117a6104783d05316f355282bdab0171e3ae841d7f664c299} 2025/04/30 10:33:27 server -> Sending packet 3 (283 bytes) for connection eb106e68ac61a77f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0359b14046d7629f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.NewTokenFrame{Token: 0xafe507da0ef103f3971b53b69b4d713b297b14cf6575d2f080e028412f977f6225b7582f85adcc21265ef44cb032496fbb3664bae28814a3283f84d18f2117a6104783d05316f355282bdab0171e3ae841d7f664c299} 2025/04/30 10:33:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d0d2cae, StatelessResetToken: 0xc45f7ff8a68f5b5716c7653844129aef} 2025/04/30 10:33:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:27 server <- Reading packet 1 (43 bytes) for connection f78eca7c, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: f78eca7c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:27 server -> Sending packet 4 (32 bytes) for connection eb106e68ac61a77f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 Received request: GET /gvuonmgxab 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0359b14046d7629f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 115.725µs} 2025/04/30 10:33:27 server -> Sending packet 5 (1053 bytes) for connection eb106e68ac61a77f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:27 server Short Header{DestConnectionID: 0359b14046d7629f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:27 server <- Reading packet 2 (30 bytes) for connection f78eca7c, 1-RTT 2025/04/30 10:33:27 server Short Header{DestConnectionID: f78eca7c, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:27 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:33:28 Removing connection IDs [4f6088e0 da68bc70] for a closed connection after it has been retired. 2025/04/30 10:33:28 Removing connection ID d3e0fd83e36b66c6 after it has been retired. 2025/04/30 10:33:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:28 server -> Sending packet 7 (283 bytes) for connection eb106e68ac61a77f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 0359b14046d7629f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d0d2cae, StatelessResetToken: 0xc45f7ff8a68f5b5716c7653844129aef} 2025/04/30 10:33:28 server -> &wire.NewTokenFrame{Token: 0xafe507da0ef103f3971b53b69b4d713b297b14cf6575d2f080e028412f977f6225b7582f85adcc21265ef44cb032496fbb3664bae28814a3283f84d18f2117a6104783d05316f355282bdab0171e3ae841d7f664c299} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:28 server Skipping packet number 6 2025/04/30 10:33:28 server -> Sending packet 8 (1053 bytes) for connection eb106e68ac61a77f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 0359b14046d7629f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:28 server -> Sending packet 9 (1366 bytes) for connection eb106e68ac61a77f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 0359b14046d7629f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.PingFrame{} 2025/04/30 10:33:28 server <- Received Initial packet. 2025/04/30 10:33:28 Created qlog file: /logs/qlog/e0c1337be5b16925.sqlog 2025/04/30 10:33:28 server Changing connection ID to 010da3d7. 2025/04/30 10:33:28 Adding connection IDs e0c1337be5b16925 and 010da3d7 for a new connection. 2025/04/30 10:33:28 server <- Reading packet 1 (1200 bytes) for connection e0c1337be5b16925, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: e0c1337be5b16925, SrcConnectionID: e167106238aca880, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e167106238aca880, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:28 Adding connection ID 286daa48. 2025/04/30 10:33:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e0c1337be5b16925 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: e167106238aca880, SrcConnectionID: 010da3d7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:28 server Long Header{Type: Handshake, DestConnectionID: e167106238aca880, SrcConnectionID: 010da3d7, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:28 server Short Header{DestConnectionID: e167106238aca880, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 286daa48, StatelessResetToken: 0xe1b9660f5bf507b8a4eade76a108da90} 2025/04/30 10:33:28 server <- Reading packet 4 (35 bytes) for connection f78eca7c, 1-RTT 2025/04/30 10:33:28 server Short Header{DestConnectionID: f78eca7c, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:28 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:28 Replacing connection for connection IDs [f78eca7c 7d0d2cae] with a closed connection. 2025/04/30 10:33:28 server Connection eb106e68ac61a77f closed. 2025/04/30 10:33:28 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:28 server <- Reading packet 0 (76 bytes) for connection 010da3d7, Handshake 2025/04/30 10:33:28 server Long Header{Type: Handshake, DestConnectionID: 010da3d7, SrcConnectionID: e167106238aca880, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:28 server Dropping Initial keys. 2025/04/30 10:33:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 Retiring connection ID e0c1337be5b16925 in 5s. 2025/04/30 10:33:28 server Dropping Handshake keys. 2025/04/30 10:33:28 server -> Sending packet 1 (1366 bytes) for connection e0c1337be5b16925, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: e167106238aca880, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.PingFrame{} 2025/04/30 10:33:28 server -> Sending packet 2 (256 bytes) for connection e0c1337be5b16925, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: e167106238aca880, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.NewTokenFrame{Token: 0x3ec46fa6703aad8ba705a3c3ed4396a7923cf7e518bd8000f0c013c668d7c1848388ec5f85aa886d9d6ffc22ebe161cd99a6d852ad8ad6ff43570041a71a414fe2d01e67732c1bb69f463efbb9784ec81965005828da} 2025/04/30 10:33:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:28 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 10:33:28 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:28 server <- Reading packet 0 (48 bytes) for connection 010da3d7, 1-RTT 2025/04/30 10:33:28 server Short Header{DestConnectionID: 010da3d7, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:28 server newly acked packets (1): [0] 2025/04/30 10:33:28 server updated RTT: 39.307871ms (σ: 19.653935ms) 2025/04/30 10:33:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:28 Received request: GET /jushxaudtt 2025/04/30 10:33:28 server -> Sending packet 3 (32 bytes) for connection e0c1337be5b16925, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: e167106238aca880, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 129.521µs} 2025/04/30 10:33:28 server -> Sending packet 4 (1053 bytes) for connection e0c1337be5b16925, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: e167106238aca880, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:28 server <- Reading packet 1 (27 bytes) for connection 010da3d7, 1-RTT 2025/04/30 10:33:28 server Short Header{DestConnectionID: 010da3d7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:28 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:28 server newly acked packets (2): [1 2] 2025/04/30 10:33:28 server updated RTT: 38.51ms (σ: 16.333ms) 2025/04/30 10:33:28 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:28 server <- Reading packet 2 (31 bytes) for connection 010da3d7, 1-RTT 2025/04/30 10:33:28 server Short Header{DestConnectionID: 010da3d7, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:28 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:28 Replacing connection for connection IDs [010da3d7 286daa48] with a closed connection. 2025/04/30 10:33:28 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:28 server Connection e0c1337be5b16925 closed. 2025/04/30 10:33:28 server <- Received Initial packet. 2025/04/30 10:33:28 Created qlog file: /logs/qlog/da6d5a1179776798.sqlog 2025/04/30 10:33:28 server Changing connection ID to f38930c0. 2025/04/30 10:33:28 Adding connection IDs da6d5a1179776798 and f38930c0 for a new connection. 2025/04/30 10:33:28 server <- Reading packet 0 (1200 bytes) for connection da6d5a1179776798, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: da6d5a1179776798, SrcConnectionID: 3cd5a67eb993c995, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3cd5a67eb993c995, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:28 Adding connection ID 754aa1df. 2025/04/30 10:33:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection da6d5a1179776798 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: 3cd5a67eb993c995, SrcConnectionID: f38930c0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 464, Version: v1} 2025/04/30 10:33:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:28 server Long Header{Type: Handshake, DestConnectionID: 3cd5a67eb993c995, SrcConnectionID: f38930c0, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 754aa1df, StatelessResetToken: 0x459ef9ef76cd6b3ee0bb63e81e707ddf} 2025/04/30 10:33:28 Removing connection IDs [1ea433db 264d8d12] for a closed connection after it has been retired. 2025/04/30 10:33:28 server <- Reading packet 1 (1200 bytes) for connection da6d5a1179776798, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: da6d5a1179776798, SrcConnectionID: 3cd5a67eb993c995, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:28 server -> Sending packet 1 (45 bytes) for connection da6d5a1179776798, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: 3cd5a67eb993c995, SrcConnectionID: f38930c0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:28 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:28 server -> Sending packet 2 (1280 bytes) for connection da6d5a1179776798, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: 3cd5a67eb993c995, SrcConnectionID: f38930c0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:28 server -> Sending packet 3 (1280 bytes) for connection da6d5a1179776798, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: 3cd5a67eb993c995, SrcConnectionID: f38930c0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:28 server <- Reading packet 2 (1201 bytes) for connection f38930c0, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: f38930c0, SrcConnectionID: 3cd5a67eb993c995, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:33:28 server newly acked packets (1): [3] 2025/04/30 10:33:28 server updated RTT: 36.452995ms (σ: 18.226497ms) 2025/04/30 10:33:28 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:28 server -> Sending packet 1 (743 bytes) for connection da6d5a1179776798, Handshake 2025/04/30 10:33:28 server Long Header{Type: Handshake, DestConnectionID: 3cd5a67eb993c995, SrcConnectionID: f38930c0, PacketNumber: 1, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:33:28 server -> Sending packet 2 (743 bytes) for connection da6d5a1179776798, Handshake 2025/04/30 10:33:28 server Long Header{Type: Handshake, DestConnectionID: 3cd5a67eb993c995, SrcConnectionID: f38930c0, PacketNumber: 2, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:33:28 server <- Reading packet 0 (76 bytes) for connection f38930c0, Handshake 2025/04/30 10:33:28 server Long Header{Type: Handshake, DestConnectionID: f38930c0, SrcConnectionID: 3cd5a67eb993c995, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:28 server Dropping Initial keys. 2025/04/30 10:33:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 Retiring connection ID da6d5a1179776798 in 5s. 2025/04/30 10:33:28 server Dropping Handshake keys. 2025/04/30 10:33:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:28 server -> Sending packet 2 (283 bytes) for connection da6d5a1179776798, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.NewTokenFrame{Token: 0xe4b1729f1c157d0ce8bbd25a5f1124acc85c705df2ffcd08dd474a93456578b9366b8a4b215228442396a10200fe964f6226d2f00a26933f6311b05a1f18bf13c72b4ad7845f6fa38c82f2f3653bc7430139e571bad6} 2025/04/30 10:33:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 754aa1df, StatelessResetToken: 0x459ef9ef76cd6b3ee0bb63e81e707ddf} 2025/04/30 10:33:28 server -> Sending packet 3 (283 bytes) for connection da6d5a1179776798, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 754aa1df, StatelessResetToken: 0x459ef9ef76cd6b3ee0bb63e81e707ddf} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:28 server -> &wire.NewTokenFrame{Token: 0xe4b1729f1c157d0ce8bbd25a5f1124acc85c705df2ffcd08dd474a93456578b9366b8a4b215228442396a10200fe964f6226d2f00a26933f6311b05a1f18bf13c72b4ad7845f6fa38c82f2f3653bc7430139e571bad6} 2025/04/30 10:33:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:28 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:28 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 10:33:28 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:28 server <- Reading packet 0 (43 bytes) for connection f38930c0, 1-RTT 2025/04/30 10:33:28 server Short Header{DestConnectionID: f38930c0, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:28 server -> Sending packet 4 (32 bytes) for connection da6d5a1179776798, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 79.017µs} 2025/04/30 10:33:28 Received request: GET /jypyhsqyux 2025/04/30 10:33:28 server -> Sending packet 5 (1053 bytes) for connection da6d5a1179776798, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:28 server <- Reading packet 1 (28 bytes) for connection f38930c0, 1-RTT 2025/04/30 10:33:28 server Short Header{DestConnectionID: f38930c0, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:28 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 19ms} 2025/04/30 10:33:28 server newly acked packets (1): [3] 2025/04/30 10:33:28 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:28 server -> Sending packet 7 (1053 bytes) for connection da6d5a1179776798, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:28 server -> Sending packet 8 (1053 bytes) for connection da6d5a1179776798, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:28 server <- Received Initial packet. 2025/04/30 10:33:28 Created qlog file: /logs/qlog/e9c1c4d8e4a0fd6e.sqlog 2025/04/30 10:33:28 server Changing connection ID to fef75666. 2025/04/30 10:33:28 Adding connection IDs e9c1c4d8e4a0fd6e and fef75666 for a new connection. 2025/04/30 10:33:28 server <- Reading packet 0 (1200 bytes) for connection e9c1c4d8e4a0fd6e, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: e9c1c4d8e4a0fd6e, SrcConnectionID: 285c2c342227a3ca, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 285c2c342227a3ca, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:28 Adding connection ID 6c17db86. 2025/04/30 10:33:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e9c1c4d8e4a0fd6e 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: 285c2c342227a3ca, SrcConnectionID: fef75666, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:28 server Long Header{Type: Handshake, DestConnectionID: 285c2c342227a3ca, SrcConnectionID: fef75666, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:28 server Short Header{DestConnectionID: 285c2c342227a3ca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c17db86, StatelessResetToken: 0x249bd5e37921c3c69c8c09964ec95b21} 2025/04/30 10:33:28 server <- Reading packet 1 (1201 bytes) for connection fef75666, Initial 2025/04/30 10:33:28 server Long Header{Type: Initial, DestConnectionID: fef75666, SrcConnectionID: 285c2c342227a3ca, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:28 server newly acked packets (1): [0] 2025/04/30 10:33:28 server updated RTT: 35.984939ms (σ: 17.992469ms) 2025/04/30 10:33:28 server <- Reading packet 0 (76 bytes) for connection fef75666, Handshake 2025/04/30 10:33:28 server Long Header{Type: Handshake, DestConnectionID: fef75666, SrcConnectionID: 285c2c342227a3ca, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:28 server Dropping Initial keys. 2025/04/30 10:33:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:28 Retiring connection ID e9c1c4d8e4a0fd6e in 5s. 2025/04/30 10:33:28 server Dropping Handshake keys. 2025/04/30 10:33:28 server -> Sending packet 1 (259 bytes) for connection e9c1c4d8e4a0fd6e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 285c2c342227a3ca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:28 server -> &wire.NewTokenFrame{Token: 0xc5e1d8178ea3379f5523b1df7b526c20a56c5daf03a45093678f5b02438a0354d3e2a980278723b820f3ec5b303c1b6ac2d30923a510d72e6646599bf579cbd516c6be44f4f7914f070178da7038d10a9951ef879e7d} 2025/04/30 10:33:28 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:28 server <- Reading packet 1 (28 bytes) for connection fef75666, 1-RTT 2025/04/30 10:33:28 server Short Header{DestConnectionID: fef75666, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:28 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:28 server newly acked packets (2): [0 1] 2025/04/30 10:33:28 server updated RTT: 37.839ms (σ: 17.205ms) 2025/04/30 10:33:28 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:28 server Canceling loss detection timer. 2025/04/30 10:33:28 Removing connection ID 78298daee41986d5 after it has been retired. 2025/04/30 10:33:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:28 server -> Sending packet 10 (1053 bytes) for connection da6d5a1179776798, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:28 server -> Sending packet 11 (1053 bytes) for connection da6d5a1179776798, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:28 server -> Sending packet 12 (1366 bytes) for connection da6d5a1179776798, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:28 server Short Header{DestConnectionID: 3cd5a67eb993c995, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:28 server -> &wire.PingFrame{} 2025/04/30 10:33:28 server <- Reading packet 3 (33 bytes) for connection f38930c0, 1-RTT 2025/04/30 10:33:28 server Short Header{DestConnectionID: f38930c0, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:28 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:28 Replacing connection for connection IDs [f38930c0 754aa1df] with a closed connection. 2025/04/30 10:33:28 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:28 server Connection da6d5a1179776798 closed. 2025/04/30 10:33:29 Removing connection IDs [0aa67f8a 1106bd7e] for a closed connection after it has been retired. 2025/04/30 10:33:29 Tracking 42 connection IDs and 0 reset tokens. 2025/04/30 10:33:29 Removing connection ID bd370005c3efa281 after it has been retired. 2025/04/30 10:33:29 server <- Reading packet 5 (43 bytes) for connection fef75666, 1-RTT 2025/04/30 10:33:29 server Short Header{DestConnectionID: fef75666, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:29 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:29 server -> Sending packet 2 (1366 bytes) for connection e9c1c4d8e4a0fd6e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 285c2c342227a3ca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.PingFrame{} 2025/04/30 10:33:29 server -> Sending packet 3 (34 bytes) for connection e9c1c4d8e4a0fd6e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 285c2c342227a3ca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 Received request: GET /xwoccsaiwa 2025/04/30 10:33:29 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 146.943µs} 2025/04/30 10:33:29 server -> Sending packet 4 (1053 bytes) for connection e9c1c4d8e4a0fd6e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 285c2c342227a3ca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:29 server <- Reading packet 7 (43 bytes) for connection fef75666, 1-RTT 2025/04/30 10:33:29 server Short Header{DestConnectionID: fef75666, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:29 server Queuing ACK because there's a new missing packet to report. 2025/04/30 10:33:29 server -> Sending packet 5 (36 bytes) for connection e9c1c4d8e4a0fd6e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 285c2c342227a3ca, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 126.055µs} 2025/04/30 10:33:29 server <- Reading packet 8 (31 bytes) for connection fef75666, 1-RTT 2025/04/30 10:33:29 server Short Header{DestConnectionID: fef75666, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:29 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:29 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:29 Replacing connection for connection IDs [fef75666 6c17db86] with a closed connection. 2025/04/30 10:33:29 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:29 server Connection e9c1c4d8e4a0fd6e closed. 2025/04/30 10:33:29 server <- Received Initial packet. 2025/04/30 10:33:29 Created qlog file: /logs/qlog/ed41e3e27b01a25b.sqlog 2025/04/30 10:33:29 server Changing connection ID to 3ba5269c. 2025/04/30 10:33:29 Adding connection IDs ed41e3e27b01a25b and 3ba5269c for a new connection. 2025/04/30 10:33:29 server <- Reading packet 0 (1200 bytes) for connection ed41e3e27b01a25b, Initial 2025/04/30 10:33:29 server Long Header{Type: Initial, DestConnectionID: ed41e3e27b01a25b, SrcConnectionID: 50eb6ceaac6fa6c9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 50eb6ceaac6fa6c9, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:29 Adding connection ID b76a33a1. 2025/04/30 10:33:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ed41e3e27b01a25b 2025/04/30 10:33:29 server Long Header{Type: Initial, DestConnectionID: 50eb6ceaac6fa6c9, SrcConnectionID: 3ba5269c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 458, Version: v1} 2025/04/30 10:33:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:29 server Long Header{Type: Handshake, DestConnectionID: 50eb6ceaac6fa6c9, SrcConnectionID: 3ba5269c, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b76a33a1, StatelessResetToken: 0x3d4fde52a393fff02482b1573805b8bd} 2025/04/30 10:33:29 server <- Reading packet 1 (1201 bytes) for connection 3ba5269c, Initial 2025/04/30 10:33:29 server Long Header{Type: Initial, DestConnectionID: 3ba5269c, SrcConnectionID: 50eb6ceaac6fa6c9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:29 server newly acked packets (1): [0] 2025/04/30 10:33:29 server updated RTT: 35.618706ms (σ: 17.809353ms) 2025/04/30 10:33:29 server <- Reading packet 1 (42 bytes) for connection 3ba5269c, Handshake 2025/04/30 10:33:29 server Long Header{Type: Handshake, DestConnectionID: 3ba5269c, SrcConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:29 server Dropping Initial keys. 2025/04/30 10:33:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:29 server newly acked packets (1): [0] 2025/04/30 10:33:29 server updated RTT: 35.934ms (σ: 13.988ms) 2025/04/30 10:33:29 server Canceling loss detection timer. 2025/04/30 10:33:29 server Queueing packet (48 bytes) for later decryption 2025/04/30 10:33:29 server <- Reading packet 2 (76 bytes) for connection 3ba5269c, Handshake 2025/04/30 10:33:29 server Long Header{Type: Handshake, DestConnectionID: 3ba5269c, SrcConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:29 Retiring connection ID ed41e3e27b01a25b in 5s. 2025/04/30 10:33:29 server Dropping Handshake keys. 2025/04/30 10:33:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:29 server -> Sending packet 2 (283 bytes) for connection ed41e3e27b01a25b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.NewTokenFrame{Token: 0xfea3c156b070e157ebc566c90b88b69a23be5e45088d873e778eb96c3596a2950580e65cda3c3fb99ae54e18478b8b177b787e999b30cb09f147072591deb352dc850b116e06b8a87e6cdd8e992e42caf2829731a0a9} 2025/04/30 10:33:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b76a33a1, StatelessResetToken: 0x3d4fde52a393fff02482b1573805b8bd} 2025/04/30 10:33:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:29 server -> Sending packet 3 (283 bytes) for connection ed41e3e27b01a25b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:29 server -> &wire.NewTokenFrame{Token: 0xfea3c156b070e157ebc566c90b88b69a23be5e45088d873e778eb96c3596a2950580e65cda3c3fb99ae54e18478b8b177b787e999b30cb09f147072591deb352dc850b116e06b8a87e6cdd8e992e42caf2829731a0a9} 2025/04/30 10:33:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b76a33a1, StatelessResetToken: 0x3d4fde52a393fff02482b1573805b8bd} 2025/04/30 10:33:29 server <- Reading packet 0 (48 bytes) for connection 3ba5269c, 1-RTT 2025/04/30 10:33:29 server Short Header{DestConnectionID: 3ba5269c, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:29 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:29 server -> Sending packet 4 (33 bytes) for connection ed41e3e27b01a25b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.320525ms} 2025/04/30 10:33:29 Received request: GET /wesixvpvdd 2025/04/30 10:33:29 server -> Sending packet 5 (1053 bytes) for connection ed41e3e27b01a25b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:29 server <- Reading packet 1 (43 bytes) for connection 3ba5269c, 1-RTT 2025/04/30 10:33:29 server Short Header{DestConnectionID: 3ba5269c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:29 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:29 server <- Reading packet 2 (30 bytes) for connection 3ba5269c, 1-RTT 2025/04/30 10:33:29 server Short Header{DestConnectionID: 3ba5269c, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:29 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:33:29 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:29 server -> Sending packet 6 (33 bytes) for connection ed41e3e27b01a25b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 6.285489ms} 2025/04/30 10:33:29 Removing connection IDs [2365c7b7 d29edec9] for a closed connection after it has been retired. 2025/04/30 10:33:29 Removing connection ID b17cae4f2bbb14a9 after it has been retired. 2025/04/30 10:33:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:29 server -> Sending packet 8 (283 bytes) for connection ed41e3e27b01a25b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b76a33a1, StatelessResetToken: 0x3d4fde52a393fff02482b1573805b8bd} 2025/04/30 10:33:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:29 server -> &wire.NewTokenFrame{Token: 0xfea3c156b070e157ebc566c90b88b69a23be5e45088d873e778eb96c3596a2950580e65cda3c3fb99ae54e18478b8b177b787e999b30cb09f147072591deb352dc850b116e06b8a87e6cdd8e992e42caf2829731a0a9} 2025/04/30 10:33:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:29 server Skipping packet number 7 2025/04/30 10:33:29 server -> Sending packet 9 (1053 bytes) for connection ed41e3e27b01a25b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:29 server -> Sending packet 10 (1366 bytes) for connection ed41e3e27b01a25b, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: 50eb6ceaac6fa6c9, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.PingFrame{} 2025/04/30 10:33:29 server <- Reading packet 5 (33 bytes) for connection 3ba5269c, 1-RTT 2025/04/30 10:33:29 server Short Header{DestConnectionID: 3ba5269c, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:29 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:29 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:29 Replacing connection for connection IDs [3ba5269c b76a33a1] with a closed connection. 2025/04/30 10:33:29 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:29 server Connection ed41e3e27b01a25b closed. 2025/04/30 10:33:29 server <- Received Initial packet. 2025/04/30 10:33:29 Created qlog file: /logs/qlog/ab3f035a99425fb8.sqlog 2025/04/30 10:33:29 server Changing connection ID to bd995a8e. 2025/04/30 10:33:29 Adding connection IDs ab3f035a99425fb8 and bd995a8e for a new connection. 2025/04/30 10:33:29 server <- Reading packet 0 (1200 bytes) for connection ab3f035a99425fb8, Initial 2025/04/30 10:33:29 server Long Header{Type: Initial, DestConnectionID: ab3f035a99425fb8, SrcConnectionID: debc37ba0e210118, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: debc37ba0e210118, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:29 Adding connection ID 4604bf4c. 2025/04/30 10:33:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ab3f035a99425fb8 2025/04/30 10:33:29 server Long Header{Type: Initial, DestConnectionID: debc37ba0e210118, SrcConnectionID: bd995a8e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 456, Version: v1} 2025/04/30 10:33:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:29 server Long Header{Type: Handshake, DestConnectionID: debc37ba0e210118, SrcConnectionID: bd995a8e, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 10:33:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 10:33:29 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4604bf4c, StatelessResetToken: 0xf736ccee60cb6cfcab03c33ff80f4d3a} 2025/04/30 10:33:29 server <- Reading packet 1 (1201 bytes) for connection bd995a8e, Initial 2025/04/30 10:33:29 server Long Header{Type: Initial, DestConnectionID: bd995a8e, SrcConnectionID: debc37ba0e210118, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:29 server newly acked packets (1): [0] 2025/04/30 10:33:29 server updated RTT: 36.189214ms (σ: 18.094607ms) 2025/04/30 10:33:29 server <- Reading packet 0 (76 bytes) for connection bd995a8e, Handshake 2025/04/30 10:33:29 server Long Header{Type: Handshake, DestConnectionID: bd995a8e, SrcConnectionID: debc37ba0e210118, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:29 server Dropping Initial keys. 2025/04/30 10:33:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:29 Retiring connection ID ab3f035a99425fb8 in 5s. 2025/04/30 10:33:29 server Dropping Handshake keys. 2025/04/30 10:33:29 server -> Sending packet 1 (259 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:29 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:29 server -> &wire.NewTokenFrame{Token: 0x7923d28d6379a53f2242575ec017a64c0fa75808cf25d1d29a287bccbb99eadf70b5ace51ba9cf4f677e64385a4d89e317600146d4a06b1f43f5759a82f69c254063434b6233266e75bcfd9b32b209b980c61a246123} 2025/04/30 10:33:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:29 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:30 Removing connection IDs [f3e99ee5 daa1afdb] for a closed connection after it has been retired. 2025/04/30 10:33:30 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:30 Removing connection ID 4a21a9b22a527164 after it has been retired. 2025/04/30 10:33:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:30 server -> Sending packet 3 (51 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4604bf4c, StatelessResetToken: 0xf736ccee60cb6cfcab03c33ff80f4d3a} 2025/04/30 10:33:30 server Skipping packet number 2 2025/04/30 10:33:30 server -> Sending packet 4 (259 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.NewTokenFrame{Token: 0x7923d28d6379a53f2242575ec017a64c0fa75808cf25d1d29a287bccbb99eadf70b5ace51ba9cf4f677e64385a4d89e317600146d4a06b1f43f5759a82f69c254063434b6233266e75bcfd9b32b209b980c61a246123} 2025/04/30 10:33:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:30 Removing connection IDs [2d394322 95fe10fb] for a closed connection after it has been retired. 2025/04/30 10:33:30 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:30 server -> Sending packet 6 (51 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4604bf4c, StatelessResetToken: 0xf736ccee60cb6cfcab03c33ff80f4d3a} 2025/04/30 10:33:30 server Skipping packet number 5 2025/04/30 10:33:30 server -> Sending packet 7 (259 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:30 server -> &wire.NewTokenFrame{Token: 0x7923d28d6379a53f2242575ec017a64c0fa75808cf25d1d29a287bccbb99eadf70b5ace51ba9cf4f677e64385a4d89e317600146d4a06b1f43f5759a82f69c254063434b6233266e75bcfd9b32b209b980c61a246123} 2025/04/30 10:33:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:30 server -> Sending packet 8 (1366 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.PingFrame{} 2025/04/30 10:33:30 server <- Reading packet 2 (32 bytes) for connection bd995a8e, 1-RTT 2025/04/30 10:33:30 server Short Header{DestConnectionID: bd995a8e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:30 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:33:30 server newly acked packets (1): [8] 2025/04/30 10:33:30 server updated RTT: 38.192ms (σ: 17.576ms) 2025/04/30 10:33:30 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:30 server setting loss timer for packet 6 (1-RTT) to 58.741112ms (in 2025-04-30 10:33:30.411945555 +0000 UTC m=+11.283564468) 2025/04/30 10:33:30 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 10:33:30.411945555 +0000 UTC m=+11.283564468 2025/04/30 10:33:30 server lost packet 6 (time threshold) 2025/04/30 10:33:30 server lost packet 7 (time threshold) 2025/04/30 10:33:30 server Canceling loss detection timer. 2025/04/30 10:33:30 server -> Sending packet 9 (283 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4604bf4c, StatelessResetToken: 0xf736ccee60cb6cfcab03c33ff80f4d3a} 2025/04/30 10:33:30 server -> &wire.NewTokenFrame{Token: 0x7923d28d6379a53f2242575ec017a64c0fa75808cf25d1d29a287bccbb99eadf70b5ace51ba9cf4f677e64385a4d89e317600146d4a06b1f43f5759a82f69c254063434b6233266e75bcfd9b32b209b980c61a246123} 2025/04/30 10:33:30 server <- Reading packet 3 (43 bytes) for connection bd995a8e, 1-RTT 2025/04/30 10:33:30 server Short Header{DestConnectionID: bd995a8e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:30 server -> Sending packet 10 (32 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 88.635µs} 2025/04/30 10:33:30 Received request: GET /sfdhsjxfui 2025/04/30 10:33:30 server -> Sending packet 11 (1053 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:30 server <- Reading packet 4 (43 bytes) for connection bd995a8e, 1-RTT 2025/04/30 10:33:30 server Short Header{DestConnectionID: bd995a8e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:30 server <- Reading packet 5 (32 bytes) for connection bd995a8e, 1-RTT 2025/04/30 10:33:30 server Short Header{DestConnectionID: bd995a8e, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:30 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:33:30 server newly acked packets (1): [9] 2025/04/30 10:33:30 server updated RTT: 39.865ms (σ: 16.529ms) 2025/04/30 10:33:30 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:30 server -> Sending packet 12 (33 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 7.137414ms} 2025/04/30 10:33:30 server <- Reading packet 6 (48 bytes) for connection bd995a8e, 1-RTT 2025/04/30 10:33:30 server Short Header{DestConnectionID: bd995a8e, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:30 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 0s} 2025/04/30 10:33:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:30 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:30 server -> Sending packet 13 (33 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 25.287028ms} 2025/04/30 10:33:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:30 server -> Sending packet 15 (1053 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:30 server -> Sending packet 16 (1053 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:30 server -> Sending packet 17 (1409 bytes) for connection ab3f035a99425fb8, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:30 server Short Header{DestConnectionID: debc37ba0e210118, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.PingFrame{} 2025/04/30 10:33:30 server <- Reading packet 7 (35 bytes) for connection bd995a8e, 1-RTT 2025/04/30 10:33:30 server Short Header{DestConnectionID: bd995a8e, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:30 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:30 Replacing connection for connection IDs [bd995a8e 4604bf4c] with a closed connection. 2025/04/30 10:33:30 server Connection ab3f035a99425fb8 closed. 2025/04/30 10:33:30 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:30 server <- Received Initial packet. 2025/04/30 10:33:30 Created qlog file: /logs/qlog/4fe2a9e3e19736c9.sqlog 2025/04/30 10:33:30 server Changing connection ID to 09eb316a. 2025/04/30 10:33:30 Adding connection IDs 4fe2a9e3e19736c9 and 09eb316a for a new connection. 2025/04/30 10:33:30 server <- Reading packet 0 (1200 bytes) for connection 4fe2a9e3e19736c9, Initial 2025/04/30 10:33:30 server Long Header{Type: Initial, DestConnectionID: 4fe2a9e3e19736c9, SrcConnectionID: b15cfc564142aedd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b15cfc564142aedd, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:30 Adding connection ID 90e472a9. 2025/04/30 10:33:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4fe2a9e3e19736c9 2025/04/30 10:33:30 server Long Header{Type: Initial, DestConnectionID: b15cfc564142aedd, SrcConnectionID: 09eb316a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 458, Version: v1} 2025/04/30 10:33:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:30 server Long Header{Type: Handshake, DestConnectionID: b15cfc564142aedd, SrcConnectionID: 09eb316a, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:30 server Short Header{DestConnectionID: b15cfc564142aedd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 90e472a9, StatelessResetToken: 0xfbb8d0558464af9c454a6e25d3e94949} 2025/04/30 10:33:30 server <- Reading packet 1 (1201 bytes) for connection 09eb316a, Initial 2025/04/30 10:33:30 server Long Header{Type: Initial, DestConnectionID: 09eb316a, SrcConnectionID: b15cfc564142aedd, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:30 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:30 server newly acked packets (1): [0] 2025/04/30 10:33:30 server updated RTT: 35.609091ms (σ: 17.804545ms) 2025/04/30 10:33:30 server Queueing packet (48 bytes) for later decryption 2025/04/30 10:33:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:30 server -> Sending packet 1 (749 bytes) for connection 4fe2a9e3e19736c9, Handshake 2025/04/30 10:33:30 server Long Header{Type: Handshake, DestConnectionID: b15cfc564142aedd, SrcConnectionID: 09eb316a, PacketNumber: 1, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:30 server -> Sending packet 2 (749 bytes) for connection 4fe2a9e3e19736c9, Handshake 2025/04/30 10:33:30 server Long Header{Type: Handshake, DestConnectionID: b15cfc564142aedd, SrcConnectionID: 09eb316a, PacketNumber: 2, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:30 server -> Sending packet 3 (749 bytes) for connection 4fe2a9e3e19736c9, Handshake 2025/04/30 10:33:30 server Long Header{Type: Handshake, DestConnectionID: b15cfc564142aedd, SrcConnectionID: 09eb316a, PacketNumber: 3, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:30 server -> Sending packet 4 (749 bytes) for connection 4fe2a9e3e19736c9, Handshake 2025/04/30 10:33:30 server Long Header{Type: Handshake, DestConnectionID: b15cfc564142aedd, SrcConnectionID: 09eb316a, PacketNumber: 4, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:30 Removing connection ID 6858aa364c8d44a8 after it has been retired. 2025/04/30 10:33:30 server <- Reading packet 3 (76 bytes) for connection 09eb316a, Handshake 2025/04/30 10:33:30 server Long Header{Type: Handshake, DestConnectionID: 09eb316a, SrcConnectionID: b15cfc564142aedd, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:30 server Dropping Initial keys. 2025/04/30 10:33:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:30 Retiring connection ID 4fe2a9e3e19736c9 in 5s. 2025/04/30 10:33:30 server Dropping Handshake keys. 2025/04/30 10:33:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:30 server -> Sending packet 2 (283 bytes) for connection 4fe2a9e3e19736c9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: b15cfc564142aedd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 90e472a9, StatelessResetToken: 0xfbb8d0558464af9c454a6e25d3e94949} 2025/04/30 10:33:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:30 server -> &wire.NewTokenFrame{Token: 0x498bd95a7153cbf1feea478b459cdc6d4a742b31ee7b84c8475851941d03b85596c36249ef0f3b073dd8f3f7d44cfff482c7bb41f5bba8925cbe8bc2b732d8fb8e0d4d42aeee8586b73e5afc88fd5a4e3a6044f59f7e} 2025/04/30 10:33:30 server -> Sending packet 3 (283 bytes) for connection 4fe2a9e3e19736c9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: b15cfc564142aedd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:30 server -> &wire.NewTokenFrame{Token: 0x498bd95a7153cbf1feea478b459cdc6d4a742b31ee7b84c8475851941d03b85596c36249ef0f3b073dd8f3f7d44cfff482c7bb41f5bba8925cbe8bc2b732d8fb8e0d4d42aeee8586b73e5afc88fd5a4e3a6044f59f7e} 2025/04/30 10:33:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 90e472a9, StatelessResetToken: 0xfbb8d0558464af9c454a6e25d3e94949} 2025/04/30 10:33:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:30 server <- Reading packet 0 (48 bytes) for connection 09eb316a, 1-RTT 2025/04/30 10:33:30 server Short Header{DestConnectionID: 09eb316a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:30 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:30 server -> Sending packet 4 (35 bytes) for connection 4fe2a9e3e19736c9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: b15cfc564142aedd, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 290.783672ms} 2025/04/30 10:33:30 Received request: GET /qgzxeidhcl 2025/04/30 10:33:30 server -> Sending packet 5 (1053 bytes) for connection 4fe2a9e3e19736c9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: b15cfc564142aedd, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:30 server Dropping %!s(logging.PacketType=1) packet (44 bytes) because we already dropped the keys. 2025/04/30 10:33:30 server Dropping %!s(logging.PacketType=1) packet (44 bytes) because we already dropped the keys. 2025/04/30 10:33:30 server <- Reading packet 1 (43 bytes) for connection 09eb316a, 1-RTT 2025/04/30 10:33:30 server Short Header{DestConnectionID: 09eb316a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:30 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:30 server -> Sending packet 6 (33 bytes) for connection 4fe2a9e3e19736c9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:30 server Short Header{DestConnectionID: b15cfc564142aedd, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:30 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.271244ms} 2025/04/30 10:33:31 Removing connection IDs [c4cfbc2a 70de38fd] for a closed connection after it has been retired. 2025/04/30 10:33:31 server <- Reading packet 4 (31 bytes) for connection 09eb316a, 1-RTT 2025/04/30 10:33:31 server Short Header{DestConnectionID: 09eb316a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:31 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:31 Replacing connection for connection IDs [09eb316a 90e472a9] with a closed connection. 2025/04/30 10:33:31 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:31 server Connection 4fe2a9e3e19736c9 closed. 2025/04/30 10:33:31 Tracking 39 connection IDs and 0 reset tokens. 2025/04/30 10:33:31 server <- Received Initial packet. 2025/04/30 10:33:31 Created qlog file: /logs/qlog/6aed6b2c6eb40c81.sqlog 2025/04/30 10:33:31 server Changing connection ID to c1dafc0e. 2025/04/30 10:33:31 Adding connection IDs 6aed6b2c6eb40c81 and c1dafc0e for a new connection. 2025/04/30 10:33:31 server <- Reading packet 1 (1200 bytes) for connection 6aed6b2c6eb40c81, Initial 2025/04/30 10:33:31 server Long Header{Type: Initial, DestConnectionID: 6aed6b2c6eb40c81, SrcConnectionID: abd07adb3b1d2504, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: abd07adb3b1d2504, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:31 Adding connection ID c1892595. 2025/04/30 10:33:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6aed6b2c6eb40c81 2025/04/30 10:33:31 server Long Header{Type: Initial, DestConnectionID: abd07adb3b1d2504, SrcConnectionID: c1dafc0e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 462, Version: v1} 2025/04/30 10:33:31 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:31 server Long Header{Type: Handshake, DestConnectionID: abd07adb3b1d2504, SrcConnectionID: c1dafc0e, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:31 server Short Header{DestConnectionID: abd07adb3b1d2504, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c1892595, StatelessResetToken: 0x1ba1511c89d55ef4653d8d1183fd8a41} 2025/04/30 10:33:31 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:31 server -> Sending packet 1 (1280 bytes) for connection 6aed6b2c6eb40c81, Initial 2025/04/30 10:33:31 server Long Header{Type: Initial, DestConnectionID: abd07adb3b1d2504, SrcConnectionID: c1dafc0e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:31 server -> Sending packet 2 (1280 bytes) for connection 6aed6b2c6eb40c81, Initial 2025/04/30 10:33:31 server Long Header{Type: Initial, DestConnectionID: abd07adb3b1d2504, SrcConnectionID: c1dafc0e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:31 server Canceling loss detection timer. 2025/04/30 10:33:31 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 10:33:31 server <- Reading packet 2 (1201 bytes) for connection c1dafc0e, Initial 2025/04/30 10:33:31 server Long Header{Type: Initial, DestConnectionID: c1dafc0e, SrcConnectionID: abd07adb3b1d2504, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:31 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:31 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:31 server -> Sending packet 1 (745 bytes) for connection 6aed6b2c6eb40c81, Handshake 2025/04/30 10:33:31 server Long Header{Type: Handshake, DestConnectionID: abd07adb3b1d2504, SrcConnectionID: c1dafc0e, PacketNumber: 1, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:31 server -> Sending packet 2 (745 bytes) for connection 6aed6b2c6eb40c81, Handshake 2025/04/30 10:33:31 server Long Header{Type: Handshake, DestConnectionID: abd07adb3b1d2504, SrcConnectionID: c1dafc0e, PacketNumber: 2, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:31 server <- Reading packet 0 (40 bytes) for connection c1dafc0e, Handshake 2025/04/30 10:33:31 server Long Header{Type: Handshake, DestConnectionID: c1dafc0e, SrcConnectionID: abd07adb3b1d2504, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:31 server Dropping Initial keys. 2025/04/30 10:33:31 server <- &wire.PingFrame{} 2025/04/30 10:33:31 server -> Sending packet 3 (44 bytes) for connection 6aed6b2c6eb40c81, Handshake 2025/04/30 10:33:31 server Long Header{Type: Handshake, DestConnectionID: abd07adb3b1d2504, SrcConnectionID: c1dafc0e, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:31 server <- Reading packet 1 (76 bytes) for connection c1dafc0e, Handshake 2025/04/30 10:33:31 server Long Header{Type: Handshake, DestConnectionID: c1dafc0e, SrcConnectionID: abd07adb3b1d2504, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:31 Retiring connection ID 6aed6b2c6eb40c81 in 5s. 2025/04/30 10:33:31 server Dropping Handshake keys. 2025/04/30 10:33:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:31 server -> Sending packet 2 (280 bytes) for connection 6aed6b2c6eb40c81, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:31 server Short Header{DestConnectionID: abd07adb3b1d2504, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c1892595, StatelessResetToken: 0x1ba1511c89d55ef4653d8d1183fd8a41} 2025/04/30 10:33:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:31 server -> &wire.NewTokenFrame{Token: 0xc8169774e76905b37e73af921fe5e6d5fac764993f8b0c3dd0757d90ade1b003b8ba69154c4f941eb51e4202a814eca58ecdf0714b2416266b4a5cbce5c3cd3286e52699b2e815db94021b9b998632923a68df55f0a4} 2025/04/30 10:33:31 server -> Sending packet 3 (280 bytes) for connection 6aed6b2c6eb40c81, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:31 server Short Header{DestConnectionID: abd07adb3b1d2504, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c1892595, StatelessResetToken: 0x1ba1511c89d55ef4653d8d1183fd8a41} 2025/04/30 10:33:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:31 server -> &wire.NewTokenFrame{Token: 0xc8169774e76905b37e73af921fe5e6d5fac764993f8b0c3dd0757d90ade1b003b8ba69154c4f941eb51e4202a814eca58ecdf0714b2416266b4a5cbce5c3cd3286e52699b2e815db94021b9b998632923a68df55f0a4} 2025/04/30 10:33:31 server -> Sending packet 4 (1366 bytes) for connection 6aed6b2c6eb40c81, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:31 server Short Header{DestConnectionID: abd07adb3b1d2504, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:31 server -> &wire.PingFrame{} 2025/04/30 10:33:31 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:31 server <- Reading packet 1 (27 bytes) for connection c1dafc0e, 1-RTT 2025/04/30 10:33:31 server Short Header{DestConnectionID: c1dafc0e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:31 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:31 server newly acked packets (1): [3] 2025/04/30 10:33:31 server updated RTT: 32.403713ms (σ: 16.201856ms) 2025/04/30 10:33:31 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:31 server Canceling loss detection timer. 2025/04/30 10:33:31 Removing connection ID 45c3ebbab72cebf4 after it has been retired. 2025/04/30 10:33:31 server <- Reading packet 4 (43 bytes) for connection c1dafc0e, 1-RTT 2025/04/30 10:33:31 server Short Header{DestConnectionID: c1dafc0e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:31 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:31 server -> Sending packet 5 (34 bytes) for connection 6aed6b2c6eb40c81, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:31 server Short Header{DestConnectionID: abd07adb3b1d2504, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:31 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 121.446µs} 2025/04/30 10:33:31 Received request: GET /fegthmvfba 2025/04/30 10:33:31 server -> Sending packet 6 (1053 bytes) for connection 6aed6b2c6eb40c81, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:31 server Short Header{DestConnectionID: abd07adb3b1d2504, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:31 server <- Reading packet 5 (43 bytes) for connection c1dafc0e, 1-RTT 2025/04/30 10:33:31 server Short Header{DestConnectionID: c1dafc0e, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:31 Removing connection IDs [ba5d5bcc 19b8a847] for a closed connection after it has been retired. 2025/04/30 10:33:31 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:31 server -> Sending packet 7 (35 bytes) for connection 6aed6b2c6eb40c81, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:31 server Short Header{DestConnectionID: abd07adb3b1d2504, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:31 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 25.327938ms} 2025/04/30 10:33:31 server <- Reading packet 6 (33 bytes) for connection c1dafc0e, 1-RTT 2025/04/30 10:33:31 server Short Header{DestConnectionID: c1dafc0e, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:31 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:31 Replacing connection for connection IDs [c1dafc0e c1892595] with a closed connection. 2025/04/30 10:33:31 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:31 server Connection 6aed6b2c6eb40c81 closed. 2025/04/30 10:33:32 server <- Received Initial packet. 2025/04/30 10:33:32 Created qlog file: /logs/qlog/6d6c904487241dd9.sqlog 2025/04/30 10:33:32 server Changing connection ID to 0320f8d4. 2025/04/30 10:33:32 Adding connection IDs 6d6c904487241dd9 and 0320f8d4 for a new connection. 2025/04/30 10:33:32 server <- Reading packet 0 (1200 bytes) for connection 6d6c904487241dd9, Initial 2025/04/30 10:33:32 server Long Header{Type: Initial, DestConnectionID: 6d6c904487241dd9, SrcConnectionID: 26dd132ebe32001e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 26dd132ebe32001e, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:32 Adding connection ID 5d3ee6f1. 2025/04/30 10:33:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d6c904487241dd9 2025/04/30 10:33:32 server Long Header{Type: Initial, DestConnectionID: 26dd132ebe32001e, SrcConnectionID: 0320f8d4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 462, Version: v1} 2025/04/30 10:33:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:32 server Long Header{Type: Handshake, DestConnectionID: 26dd132ebe32001e, SrcConnectionID: 0320f8d4, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 10:33:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5d3ee6f1, StatelessResetToken: 0xf880019e9e106a1d229ae326618beab5} 2025/04/30 10:33:32 Removing connection ID 33b7d5f464d93c86 after it has been retired. 2025/04/30 10:33:32 server <- Reading packet 0 (76 bytes) for connection 0320f8d4, Handshake 2025/04/30 10:33:32 server Long Header{Type: Handshake, DestConnectionID: 0320f8d4, SrcConnectionID: 26dd132ebe32001e, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:32 server Dropping Initial keys. 2025/04/30 10:33:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:32 Retiring connection ID 6d6c904487241dd9 in 5s. 2025/04/30 10:33:32 server Dropping Handshake keys. 2025/04/30 10:33:32 server -> Sending packet 1 (1366 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.PingFrame{} 2025/04/30 10:33:32 server -> Sending packet 2 (256 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:32 server -> &wire.NewTokenFrame{Token: 0x21f9278fdc050cfddaa43da9dcdd3920a4414ad433441598e257ee5eead51092e95825343818ae376b943cc64989fc38782a223881a1f76e5ff3fd7f6a46be67aa13a6245d8f7d78d68cbb55248091449ae383fb62b4} 2025/04/30 10:33:32 server <- Reading packet 1 (27 bytes) for connection 0320f8d4, 1-RTT 2025/04/30 10:33:32 server Short Header{DestConnectionID: 0320f8d4, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:32 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:32 server newly acked packets (3): [0 1 2] 2025/04/30 10:33:32 server updated RTT: 32.851457ms (σ: 16.425728ms) 2025/04/30 10:33:32 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:32 server Canceling loss detection timer. 2025/04/30 10:33:32 Removing connection ID c86aa4d394ed20ee after it has been retired. 2025/04/30 10:33:32 Removing connection IDs [118457c9 6388107d] for a closed connection after it has been retired. 2025/04/30 10:33:32 Removing connection IDs [d49ad7d5 8716ec4f] for a closed connection after it has been retired. 2025/04/30 10:33:32 Removing connection ID ef2c41b5dca3ccc1 after it has been retired. 2025/04/30 10:33:32 Removing connection IDs [47b78a67 4ec6ea1d] for a closed connection after it has been retired. 2025/04/30 10:33:32 Removing connection ID 24583d899f48db23 after it has been retired. 2025/04/30 10:33:32 Removing connection IDs [e41da938 830fb444] for a closed connection after it has been retired. 2025/04/30 10:33:32 server <- Reading packet 3 (43 bytes) for connection 0320f8d4, 1-RTT 2025/04/30 10:33:32 server Short Header{DestConnectionID: 0320f8d4, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:32 server -> Sending packet 3 (1409 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:32 Received request: GET /hntnstgnul 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.PingFrame{} 2025/04/30 10:33:32 server -> Sending packet 4 (34 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 191.206µs} 2025/04/30 10:33:32 server -> Sending packet 5 (1053 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:32 server <- Reading packet 4 (43 bytes) for connection 0320f8d4, 1-RTT 2025/04/30 10:33:32 server Short Header{DestConnectionID: 0320f8d4, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:32 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:32 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:32 server -> Sending packet 6 (35 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.257772ms} 2025/04/30 10:33:32 server <- Reading packet 5 (48 bytes) for connection 0320f8d4, 1-RTT 2025/04/30 10:33:32 server Short Header{DestConnectionID: 0320f8d4, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:32 Removing connection ID 7472e4be6d0f61ef after it has been retired. 2025/04/30 10:33:32 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:33:32 server newly acked packets (1): [3] 2025/04/30 10:33:32 server updated RTT: 32.878ms (σ: 12.373ms) 2025/04/30 10:33:32 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:32 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:32 server -> Sending packet 7 (35 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.27315ms} 2025/04/30 10:33:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:32 server -> Sending packet 9 (1053 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:32 server -> Sending packet 10 (1053 bytes) for connection 6d6c904487241dd9, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 26dd132ebe32001e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:32 server <- Reading packet 6 (35 bytes) for connection 0320f8d4, 1-RTT 2025/04/30 10:33:32 server Short Header{DestConnectionID: 0320f8d4, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:32 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:32 Replacing connection for connection IDs [0320f8d4 5d3ee6f1] with a closed connection. 2025/04/30 10:33:32 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:32 server Connection 6d6c904487241dd9 closed. 2025/04/30 10:33:32 Removing connection IDs [b9558d93 d6d1ffb7] for a closed connection after it has been retired. 2025/04/30 10:33:32 server <- Received Initial packet. 2025/04/30 10:33:32 Created qlog file: /logs/qlog/c832116fc671b6ed.sqlog 2025/04/30 10:33:32 server Changing connection ID to de8d7457. 2025/04/30 10:33:32 Adding connection IDs c832116fc671b6ed and de8d7457 for a new connection. 2025/04/30 10:33:32 server <- Reading packet 1 (1200 bytes) for connection c832116fc671b6ed, Initial 2025/04/30 10:33:32 server Long Header{Type: Initial, DestConnectionID: c832116fc671b6ed, SrcConnectionID: 79f01090e5166891, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 79f01090e5166891, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:32 Adding connection ID 4c4c621f. 2025/04/30 10:33:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c832116fc671b6ed 2025/04/30 10:33:32 server Long Header{Type: Initial, DestConnectionID: 79f01090e5166891, SrcConnectionID: de8d7457, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 452, Version: v1} 2025/04/30 10:33:32 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:32 server Long Header{Type: Handshake, DestConnectionID: 79f01090e5166891, SrcConnectionID: de8d7457, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 10:33:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 10:33:32 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c4c621f, StatelessResetToken: 0xbeb63cf1bd39db95b1654dc0a4a7376b} 2025/04/30 10:33:32 Removing connection ID eb106e68ac61a77f after it has been retired. 2025/04/30 10:33:32 server <- Reading packet 2 (1200 bytes) for connection de8d7457, Initial 2025/04/30 10:33:32 server Long Header{Type: Initial, DestConnectionID: de8d7457, SrcConnectionID: 79f01090e5166891, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 10:33:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:32 server -> Sending packet 1 (45 bytes) for connection c832116fc671b6ed, Initial 2025/04/30 10:33:32 server Long Header{Type: Initial, DestConnectionID: 79f01090e5166891, SrcConnectionID: de8d7457, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:32 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:32 server <- Reading packet 3 (1201 bytes) for connection de8d7457, Initial 2025/04/30 10:33:32 server Long Header{Type: Initial, DestConnectionID: de8d7457, SrcConnectionID: 79f01090e5166891, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:32 server newly acked packets (1): [0] 2025/04/30 10:33:32 server updated RTT: 35.907093ms (σ: 17.953546ms) 2025/04/30 10:33:32 server <- Reading packet 1 (42 bytes) for connection de8d7457, Handshake 2025/04/30 10:33:32 server Long Header{Type: Handshake, DestConnectionID: de8d7457, SrcConnectionID: 79f01090e5166891, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:32 server Dropping Initial keys. 2025/04/30 10:33:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:32 server newly acked packets (1): [0] 2025/04/30 10:33:32 server updated RTT: 36.16ms (σ: 13.971ms) 2025/04/30 10:33:32 server Canceling loss detection timer. 2025/04/30 10:33:32 server Queueing packet (28 bytes) for later decryption 2025/04/30 10:33:32 server <- Reading packet 2 (76 bytes) for connection de8d7457, Handshake 2025/04/30 10:33:32 server Long Header{Type: Handshake, DestConnectionID: de8d7457, SrcConnectionID: 79f01090e5166891, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:32 Retiring connection ID c832116fc671b6ed in 5s. 2025/04/30 10:33:32 server Dropping Handshake keys. 2025/04/30 10:33:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:32 server -> Sending packet 2 (283 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c4c621f, StatelessResetToken: 0xbeb63cf1bd39db95b1654dc0a4a7376b} 2025/04/30 10:33:32 server -> &wire.NewTokenFrame{Token: 0x919109848e1740cc53ad7b0bcc22dec80ac571b4620c2f63fbae4b71e9590a264d3419172d04da0c0118e11980f8438a09733a45c88249be5a17ba1a50c1667e1c5dcf0f67e05f6c17ca3367c8dbf5ce2aee962ff3b2} 2025/04/30 10:33:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:32 server -> Sending packet 3 (283 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:32 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c4c621f, StatelessResetToken: 0xbeb63cf1bd39db95b1654dc0a4a7376b} 2025/04/30 10:33:32 server -> &wire.NewTokenFrame{Token: 0x919109848e1740cc53ad7b0bcc22dec80ac571b4620c2f63fbae4b71e9590a264d3419172d04da0c0118e11980f8438a09733a45c88249be5a17ba1a50c1667e1c5dcf0f67e05f6c17ca3367c8dbf5ce2aee962ff3b2} 2025/04/30 10:33:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:32 server <- Reading packet 1 (28 bytes) for connection de8d7457, 1-RTT 2025/04/30 10:33:32 server Short Header{DestConnectionID: de8d7457, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:33 Removing connection IDs [f78eca7c 7d0d2cae] for a closed connection after it has been retired. 2025/04/30 10:33:33 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:33 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:33 Removing connection ID e0c1337be5b16925 after it has been retired. 2025/04/30 10:33:33 Removing connection IDs [010da3d7 286daa48] for a closed connection after it has been retired. 2025/04/30 10:33:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:33 server -> Sending packet 5 (283 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.NewTokenFrame{Token: 0x919109848e1740cc53ad7b0bcc22dec80ac571b4620c2f63fbae4b71e9590a264d3419172d04da0c0118e11980f8438a09733a45c88249be5a17ba1a50c1667e1c5dcf0f67e05f6c17ca3367c8dbf5ce2aee962ff3b2} 2025/04/30 10:33:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c4c621f, StatelessResetToken: 0xbeb63cf1bd39db95b1654dc0a4a7376b} 2025/04/30 10:33:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:33 server -> Sending packet 6 (283 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c4c621f, StatelessResetToken: 0xbeb63cf1bd39db95b1654dc0a4a7376b} 2025/04/30 10:33:33 server -> &wire.NewTokenFrame{Token: 0x919109848e1740cc53ad7b0bcc22dec80ac571b4620c2f63fbae4b71e9590a264d3419172d04da0c0118e11980f8438a09733a45c88249be5a17ba1a50c1667e1c5dcf0f67e05f6c17ca3367c8dbf5ce2aee962ff3b2} 2025/04/30 10:33:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:33 server -> Sending packet 7 (1366 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.PingFrame{} 2025/04/30 10:33:33 Tracking 24 connection IDs and 0 reset tokens. 2025/04/30 10:33:33 server <- Reading packet 2 (43 bytes) for connection de8d7457, 1-RTT 2025/04/30 10:33:33 server Short Header{DestConnectionID: de8d7457, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:33 server -> Sending packet 8 (32 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 97.963µs} 2025/04/30 10:33:33 Received request: GET /xburzpsfyc 2025/04/30 10:33:33 server -> Sending packet 9 (1053 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:33 server <- Reading packet 3 (30 bytes) for connection de8d7457, 1-RTT 2025/04/30 10:33:33 server Short Header{DestConnectionID: de8d7457, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:33 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 10:33:33 server <- Reading packet 4 (48 bytes) for connection de8d7457, 1-RTT 2025/04/30 10:33:33 server Short Header{DestConnectionID: de8d7457, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:33 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/04/30 10:33:33 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:33 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:33 server -> Sending packet 10 (33 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 25.306698ms} 2025/04/30 10:33:33 Removing connection ID da6d5a1179776798 after it has been retired. 2025/04/30 10:33:33 Removing connection ID e9c1c4d8e4a0fd6e after it has been retired. 2025/04/30 10:33:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 10:33:33 server -> Sending packet 12 (283 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:33 server -> &wire.NewTokenFrame{Token: 0x919109848e1740cc53ad7b0bcc22dec80ac571b4620c2f63fbae4b71e9590a264d3419172d04da0c0118e11980f8438a09733a45c88249be5a17ba1a50c1667e1c5dcf0f67e05f6c17ca3367c8dbf5ce2aee962ff3b2} 2025/04/30 10:33:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c4c621f, StatelessResetToken: 0xbeb63cf1bd39db95b1654dc0a4a7376b} 2025/04/30 10:33:33 server Skipping packet number 11 2025/04/30 10:33:33 server -> Sending packet 13 (1053 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:33 server <- Reading packet 5 (32 bytes) for connection de8d7457, 1-RTT 2025/04/30 10:33:33 server Short Header{DestConnectionID: de8d7457, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:33 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 8, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}}, DelayTime: 19ms} 2025/04/30 10:33:33 server newly acked packets (1): [12] 2025/04/30 10:33:33 server updated RTT: 38.038ms (σ: 14.235ms) 2025/04/30 10:33:33 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:33 server lost packet 7 (time threshold) 2025/04/30 10:33:33 server -> Sending packet 14 (1323 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.PingFrame{} 2025/04/30 10:33:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:33 server -> Sending packet 16 (1053 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:33 server -> Sending packet 17 (1053 bytes) for connection c832116fc671b6ed, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:33 server Short Header{DestConnectionID: 79f01090e5166891, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:33 server <- Reading packet 6 (37 bytes) for connection de8d7457, 1-RTT 2025/04/30 10:33:33 server Short Header{DestConnectionID: de8d7457, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:33 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:33 Replacing connection for connection IDs [de8d7457 4c4c621f] with a closed connection. 2025/04/30 10:33:33 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:33 server Connection c832116fc671b6ed closed. 2025/04/30 10:33:33 Removing connection IDs [f38930c0 754aa1df] for a closed connection after it has been retired. 2025/04/30 10:33:34 server <- Received Initial packet. 2025/04/30 10:33:34 Created qlog file: /logs/qlog/a886f5ac1e04869c.sqlog 2025/04/30 10:33:34 server Changing connection ID to 14e1b51a. 2025/04/30 10:33:34 Adding connection IDs a886f5ac1e04869c and 14e1b51a for a new connection. 2025/04/30 10:33:34 server <- Reading packet 1 (1200 bytes) for connection a886f5ac1e04869c, Initial 2025/04/30 10:33:34 server Long Header{Type: Initial, DestConnectionID: a886f5ac1e04869c, SrcConnectionID: bb2cbc82726bf34e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:34 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: bb2cbc82726bf34e, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:34 Adding connection ID 74ae578a. 2025/04/30 10:33:34 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a886f5ac1e04869c 2025/04/30 10:33:34 server Long Header{Type: Initial, DestConnectionID: bb2cbc82726bf34e, SrcConnectionID: 14e1b51a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 453, Version: v1} 2025/04/30 10:33:34 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:34 server Long Header{Type: Handshake, DestConnectionID: bb2cbc82726bf34e, SrcConnectionID: 14e1b51a, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 10:33:34 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74ae578a, StatelessResetToken: 0xb273cc608dea653b72b894aceba315fe} 2025/04/30 10:33:34 server Queueing packet (43 bytes) for later decryption 2025/04/30 10:33:34 server <- Reading packet 2 (76 bytes) for connection 14e1b51a, Handshake 2025/04/30 10:33:34 server Long Header{Type: Handshake, DestConnectionID: 14e1b51a, SrcConnectionID: bb2cbc82726bf34e, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:34 server Dropping Initial keys. 2025/04/30 10:33:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:34 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 Retiring connection ID a886f5ac1e04869c in 5s. 2025/04/30 10:33:34 server Dropping Handshake keys. 2025/04/30 10:33:34 server -> Sending packet 1 (1366 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.PingFrame{} 2025/04/30 10:33:34 server <- Reading packet 0 (43 bytes) for connection 14e1b51a, 1-RTT 2025/04/30 10:33:34 server Short Header{DestConnectionID: 14e1b51a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:34 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:34 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:34 server -> Sending packet 2 (262 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.196842ms} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:34 server -> &wire.NewTokenFrame{Token: 0x193b4028855dd4d4e863a6f8e33c94b253b68870ebc86b1e1f3579569fd2dab11b1a139d5d0ee687a72c30d9676aa508714f5980e737943a8cc4a3eefbcb2ab3c04265542b3043aea3b9bf029fa7714f0fd31968a5b7} 2025/04/30 10:33:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:34 Received request: GET /inryjqstcl 2025/04/30 10:33:34 server -> Sending packet 3 (1053 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:34 server -> Sending packet 5 (51 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74ae578a, StatelessResetToken: 0xb273cc608dea653b72b894aceba315fe} 2025/04/30 10:33:34 server Skipping packet number 4 2025/04/30 10:33:34 server -> Sending packet 6 (256 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.NewTokenFrame{Token: 0x193b4028855dd4d4e863a6f8e33c94b253b68870ebc86b1e1f3579569fd2dab11b1a139d5d0ee687a72c30d9676aa508714f5980e737943a8cc4a3eefbcb2ab3c04265542b3043aea3b9bf029fa7714f0fd31968a5b7} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:34 Removing connection IDs [fef75666 6c17db86] for a closed connection after it has been retired. 2025/04/30 10:33:34 Removing connection ID ed41e3e27b01a25b after it has been retired. 2025/04/30 10:33:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:34 server -> Sending packet 8 (1053 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:34 server Skipping packet number 7 2025/04/30 10:33:34 server -> Sending packet 9 (51 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74ae578a, StatelessResetToken: 0xb273cc608dea653b72b894aceba315fe} 2025/04/30 10:33:34 server <- Received Initial packet. 2025/04/30 10:33:34 Created qlog file: /logs/qlog/76c8c6075a066a3d.sqlog 2025/04/30 10:33:34 server Changing connection ID to 6a1c781d. 2025/04/30 10:33:34 Adding connection IDs 76c8c6075a066a3d and 6a1c781d for a new connection. 2025/04/30 10:33:34 server <- Reading packet 0 (1200 bytes) for connection 76c8c6075a066a3d, Initial 2025/04/30 10:33:34 server Long Header{Type: Initial, DestConnectionID: 76c8c6075a066a3d, SrcConnectionID: 0f13e35668c8c81e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:34 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0f13e35668c8c81e, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:34 Adding connection ID c811dd5f. 2025/04/30 10:33:34 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 76c8c6075a066a3d 2025/04/30 10:33:34 server Long Header{Type: Initial, DestConnectionID: 0f13e35668c8c81e, SrcConnectionID: 6a1c781d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 460, Version: v1} 2025/04/30 10:33:34 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:34 server Long Header{Type: Handshake, DestConnectionID: 0f13e35668c8c81e, SrcConnectionID: 6a1c781d, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:33:34 server Short Header{DestConnectionID: 0f13e35668c8c81e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c811dd5f, StatelessResetToken: 0xfee6127fb452be8f79cc0a80af74a8a1} 2025/04/30 10:33:34 server <- Reading packet 1 (1201 bytes) for connection 6a1c781d, Initial 2025/04/30 10:33:34 server Long Header{Type: Initial, DestConnectionID: 6a1c781d, SrcConnectionID: 0f13e35668c8c81e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:34 server newly acked packets (1): [0] 2025/04/30 10:33:34 server updated RTT: 35.530937ms (σ: 17.765468ms) 2025/04/30 10:33:34 server <- Reading packet 0 (76 bytes) for connection 6a1c781d, Handshake 2025/04/30 10:33:34 server Long Header{Type: Handshake, DestConnectionID: 6a1c781d, SrcConnectionID: 0f13e35668c8c81e, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:34 server Dropping Initial keys. 2025/04/30 10:33:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:34 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 Retiring connection ID 76c8c6075a066a3d in 5s. 2025/04/30 10:33:34 server Dropping Handshake keys. 2025/04/30 10:33:34 server -> Sending packet 1 (259 bytes) for connection 76c8c6075a066a3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: 0f13e35668c8c81e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:34 server -> &wire.NewTokenFrame{Token: 0x96bef4e08a184ff949d6b4bfa4bbaa54c545a1e50cae04e134acdeb79cf9d5d826a1da12454e96fc8ef939b4845d86f5be908568608dcc33093e8c8c33f0277aa716f785dd915ce5bab3ea75a8a597bf6591621970a8} 2025/04/30 10:33:34 server <- Reading packet 0 (48 bytes) for connection 6a1c781d, 1-RTT 2025/04/30 10:33:34 server Short Header{DestConnectionID: 6a1c781d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:34 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:34 server newly acked packets (1): [0] 2025/04/30 10:33:34 server updated RTT: 35.771ms (σ: 13.807ms) 2025/04/30 10:33:34 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:34 server -> Sending packet 2 (32 bytes) for connection 76c8c6075a066a3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: 0f13e35668c8c81e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 95.798µs} 2025/04/30 10:33:34 Received request: GET /mcwhgrwefq 2025/04/30 10:33:34 server -> Sending packet 3 (1053 bytes) for connection 76c8c6075a066a3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: 0f13e35668c8c81e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:34 server <- Received Initial packet. 2025/04/30 10:33:34 Created qlog file: /logs/qlog/524de85430302f70.sqlog 2025/04/30 10:33:34 server Changing connection ID to a62ab6cc. 2025/04/30 10:33:34 Adding connection IDs 524de85430302f70 and a62ab6cc for a new connection. 2025/04/30 10:33:34 server <- Reading packet 0 (1200 bytes) for connection 524de85430302f70, Initial 2025/04/30 10:33:34 server Long Header{Type: Initial, DestConnectionID: 524de85430302f70, SrcConnectionID: 54d88d3ac0091993, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:34 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:34 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 54d88d3ac0091993, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:34 Adding connection ID 76d4fba5. 2025/04/30 10:33:34 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 524de85430302f70 2025/04/30 10:33:34 server Long Header{Type: Initial, DestConnectionID: 54d88d3ac0091993, SrcConnectionID: a62ab6cc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 458, Version: v1} 2025/04/30 10:33:34 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:34 server Long Header{Type: Handshake, DestConnectionID: 54d88d3ac0091993, SrcConnectionID: a62ab6cc, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:34 server Short Header{DestConnectionID: 54d88d3ac0091993, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76d4fba5, StatelessResetToken: 0x49a5f011521f74d4f41a71f48ecedff8} 2025/04/30 10:33:34 Removing connection IDs [3ba5269c b76a33a1] for a closed connection after it has been retired. 2025/04/30 10:33:34 server <- Reading packet 1 (1201 bytes) for connection a62ab6cc, Initial 2025/04/30 10:33:34 server Long Header{Type: Initial, DestConnectionID: a62ab6cc, SrcConnectionID: 54d88d3ac0091993, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:34 server newly acked packets (1): [0] 2025/04/30 10:33:34 server updated RTT: 35.106614ms (σ: 17.553307ms) 2025/04/30 10:33:34 server <- Reading packet 1 (42 bytes) for connection a62ab6cc, Handshake 2025/04/30 10:33:34 server Long Header{Type: Handshake, DestConnectionID: a62ab6cc, SrcConnectionID: 54d88d3ac0091993, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:34 server Dropping Initial keys. 2025/04/30 10:33:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:34 server newly acked packets (1): [0] 2025/04/30 10:33:34 server updated RTT: 35.344ms (σ: 13.641ms) 2025/04/30 10:33:34 server Canceling loss detection timer. 2025/04/30 10:33:34 server Queueing packet (48 bytes) for later decryption 2025/04/30 10:33:34 Removing connection ID ab3f035a99425fb8 after it has been retired. 2025/04/30 10:33:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:34 server -> Sending packet 5 (259 bytes) for connection 76c8c6075a066a3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: 0f13e35668c8c81e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.NewTokenFrame{Token: 0x96bef4e08a184ff949d6b4bfa4bbaa54c545a1e50cae04e134acdeb79cf9d5d826a1da12454e96fc8ef939b4845d86f5be908568608dcc33093e8c8c33f0277aa716f785dd915ce5bab3ea75a8a597bf6591621970a8} 2025/04/30 10:33:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:34 server Skipping packet number 4 2025/04/30 10:33:34 server -> Sending packet 6 (1053 bytes) for connection 76c8c6075a066a3d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:34 server Short Header{DestConnectionID: 0f13e35668c8c81e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:34 server <- Reading packet 3 (31 bytes) for connection 6a1c781d, 1-RTT 2025/04/30 10:33:34 server Short Header{DestConnectionID: 6a1c781d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:34 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:34 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:34 Replacing connection for connection IDs [6a1c781d c811dd5f] with a closed connection. 2025/04/30 10:33:34 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:34 server Connection 76c8c6075a066a3d closed. 2025/04/30 10:33:35 server <- Reading packet 2 (76 bytes) for connection a62ab6cc, Handshake 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: a62ab6cc, SrcConnectionID: 54d88d3ac0091993, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 Retiring connection ID 524de85430302f70 in 5s. 2025/04/30 10:33:35 server Dropping Handshake keys. 2025/04/30 10:33:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:35 server -> Sending packet 2 (283 bytes) for connection 524de85430302f70, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 54d88d3ac0091993, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76d4fba5, StatelessResetToken: 0x49a5f011521f74d4f41a71f48ecedff8} 2025/04/30 10:33:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:35 server -> &wire.NewTokenFrame{Token: 0xfc2ab6b8b6441ae96f24c055715a0c0610b5e69f7066b14a7f5a4b029cb5083c778e6fc8d45dc8563baee8f900998157c81ce9e634697c9934a0e2bc4086f3aabeb0d1607df7b560ff17357920b884c548ff735c7cba} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:35 server -> Sending packet 3 (283 bytes) for connection 524de85430302f70, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 54d88d3ac0091993, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.NewTokenFrame{Token: 0xfc2ab6b8b6441ae96f24c055715a0c0610b5e69f7066b14a7f5a4b029cb5083c778e6fc8d45dc8563baee8f900998157c81ce9e634697c9934a0e2bc4086f3aabeb0d1607df7b560ff17357920b884c548ff735c7cba} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76d4fba5, StatelessResetToken: 0x49a5f011521f74d4f41a71f48ecedff8} 2025/04/30 10:33:35 server <- Reading packet 0 (48 bytes) for connection a62ab6cc, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: a62ab6cc, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:35 server -> Sending packet 4 (33 bytes) for connection 524de85430302f70, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 54d88d3ac0091993, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96.726396ms} 2025/04/30 10:33:35 Received request: GET /pglpwcihgy 2025/04/30 10:33:35 server -> Sending packet 5 (1053 bytes) for connection 524de85430302f70, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 54d88d3ac0091993, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:35 server <- Reading packet 1 (43 bytes) for connection a62ab6cc, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: a62ab6cc, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:35 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:35 server <- Reading packet 3 (33 bytes) for connection a62ab6cc, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: a62ab6cc, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:35 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:35 Replacing connection for connection IDs [a62ab6cc 76d4fba5] with a closed connection. 2025/04/30 10:33:35 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:35 server Connection 524de85430302f70 closed. 2025/04/30 10:33:35 Tracking 23 connection IDs and 0 reset tokens. 2025/04/30 10:33:35 server <- Received Initial packet. 2025/04/30 10:33:35 Created qlog file: /logs/qlog/11c083286bb7e55d.sqlog 2025/04/30 10:33:35 server Changing connection ID to 292cb3c7. 2025/04/30 10:33:35 Adding connection IDs 11c083286bb7e55d and 292cb3c7 for a new connection. 2025/04/30 10:33:35 server <- Reading packet 1 (1200 bytes) for connection 11c083286bb7e55d, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: 11c083286bb7e55d, SrcConnectionID: 393824cb6ab17983, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 393824cb6ab17983, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:35 Adding connection ID f9630d70. 2025/04/30 10:33:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 11c083286bb7e55d 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: 393824cb6ab17983, SrcConnectionID: 292cb3c7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 466, Version: v1} 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: 393824cb6ab17983, SrcConnectionID: 292cb3c7, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9630d70, StatelessResetToken: 0xb2b9034dae655f27812368922fc3d1d7} 2025/04/30 10:33:35 server <- Reading packet 2 (1200 bytes) for connection 292cb3c7, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: 292cb3c7, SrcConnectionID: 393824cb6ab17983, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 10:33:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:35 server -> Sending packet 1 (45 bytes) for connection 11c083286bb7e55d, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: 393824cb6ab17983, SrcConnectionID: 292cb3c7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:35 server <- Reading packet 0 (76 bytes) for connection 292cb3c7, Handshake 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: 292cb3c7, SrcConnectionID: 393824cb6ab17983, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:35 server Dropping Initial keys. 2025/04/30 10:33:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 Retiring connection ID 11c083286bb7e55d in 5s. 2025/04/30 10:33:35 server Dropping Handshake keys. 2025/04/30 10:33:35 server -> Sending packet 1 (1366 bytes) for connection 11c083286bb7e55d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.PingFrame{} 2025/04/30 10:33:35 server -> Sending packet 2 (256 bytes) for connection 11c083286bb7e55d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:35 server -> &wire.NewTokenFrame{Token: 0x6afa0c6e5d7594f26f67ef818d0f6308a0d60a12741e8988b5175c5fdb303e4a575c33f9222d4b6a842bf8a44f9ff04b64bb31671f7576953e337f2cfafcde03daecfb4d5e1dd2b522c7e76fad5f65a87efaad2ef3cf} 2025/04/30 10:33:35 server <- Reading packet 1 (27 bytes) for connection 292cb3c7, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: 292cb3c7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:35 server newly acked packets (3): [0 1 2] 2025/04/30 10:33:35 server updated RTT: 32.635194ms (σ: 16.317597ms) 2025/04/30 10:33:35 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:35 server Canceling loss detection timer. 2025/04/30 10:33:35 server <- Reading packet 2 (43 bytes) for connection 292cb3c7, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: 292cb3c7, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:35 server -> Sending packet 3 (32 bytes) for connection 11c083286bb7e55d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 Received request: GET /lchdvfqpeb 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 129.281µs} 2025/04/30 10:33:35 server -> Sending packet 4 (1053 bytes) for connection 11c083286bb7e55d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:35 server -> Sending packet 6 (1053 bytes) for connection 11c083286bb7e55d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:35 server -> Sending packet 7 (1053 bytes) for connection 11c083286bb7e55d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:35 server -> Sending packet 8 (1409 bytes) for connection 11c083286bb7e55d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.PingFrame{} 2025/04/30 10:33:35 server <- Reading packet 4 (43 bytes) for connection 292cb3c7, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: 292cb3c7, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:35 server Queuing ACK because there's a new missing packet to report. 2025/04/30 10:33:35 server -> Sending packet 9 (34 bytes) for connection 11c083286bb7e55d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:35 server Short Header{DestConnectionID: 393824cb6ab17983, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 72.785µs} 2025/04/30 10:33:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 10:33:35 server -> Sending packet 11 (256 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.NewTokenFrame{Token: 0x193b4028855dd4d4e863a6f8e33c94b253b68870ebc86b1e1f3579569fd2dab11b1a139d5d0ee687a72c30d9676aa508714f5980e737943a8cc4a3eefbcb2ab3c04265542b3043aea3b9bf029fa7714f0fd31968a5b7} 2025/04/30 10:33:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:35 server Skipping packet number 10 2025/04/30 10:33:35 server -> Sending packet 12 (1053 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:35 server <- Reading packet 6 (33 bytes) for connection 292cb3c7, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: 292cb3c7, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:35 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:35 Replacing connection for connection IDs [292cb3c7 f9630d70] with a closed connection. 2025/04/30 10:33:35 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:35 server Connection 11c083286bb7e55d closed. 2025/04/30 10:33:35 server <- Received Initial packet. 2025/04/30 10:33:35 Created qlog file: /logs/qlog/01df0d1816418d17.sqlog 2025/04/30 10:33:35 server Changing connection ID to d33d3023. 2025/04/30 10:33:35 Adding connection IDs 01df0d1816418d17 and d33d3023 for a new connection. 2025/04/30 10:33:35 server <- Reading packet 0 (1200 bytes) for connection 01df0d1816418d17, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: 01df0d1816418d17, SrcConnectionID: f678074bc0e20225, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f678074bc0e20225, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:35 Adding connection ID 9a17bde9. 2025/04/30 10:33:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 01df0d1816418d17 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: f678074bc0e20225, SrcConnectionID: d33d3023, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 455, Version: v1} 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: f678074bc0e20225, SrcConnectionID: d33d3023, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:33:35 server Short Header{DestConnectionID: f678074bc0e20225, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a17bde9, StatelessResetToken: 0xcbf0fc97224a56e9af11619e89ce52e8} 2025/04/30 10:33:35 server <- Reading packet 1 (1201 bytes) for connection d33d3023, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: d33d3023, SrcConnectionID: f678074bc0e20225, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:35 server newly acked packets (1): [0] 2025/04/30 10:33:35 server updated RTT: 35.139609ms (σ: 17.569804ms) 2025/04/30 10:33:35 Removing connection IDs [bd995a8e 4604bf4c] for a closed connection after it has been retired. 2025/04/30 10:33:35 server Queueing packet (48 bytes) for later decryption 2025/04/30 10:33:35 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:35 server -> Sending packet 1 (752 bytes) for connection 01df0d1816418d17, Handshake 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: f678074bc0e20225, SrcConnectionID: d33d3023, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:33:35 server -> Sending packet 2 (752 bytes) for connection 01df0d1816418d17, Handshake 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: f678074bc0e20225, SrcConnectionID: d33d3023, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 10:33:35 server <- Reading packet 2 (76 bytes) for connection d33d3023, Handshake 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: d33d3023, SrcConnectionID: f678074bc0e20225, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:35 server Dropping Initial keys. 2025/04/30 10:33:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 Retiring connection ID 01df0d1816418d17 in 5s. 2025/04/30 10:33:35 server Dropping Handshake keys. 2025/04/30 10:33:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:35 server -> Sending packet 2 (283 bytes) for connection 01df0d1816418d17, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: f678074bc0e20225, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:35 server -> &wire.NewTokenFrame{Token: 0xf1cb90323dbbebcc5924a70fb1dc8190d8f0cc59cdc5ecebc8c5d972fbf0c3d10fd3eea50c38833b45c671fa0b895a7aadd32d6760ef4cd2497c728da4f681c68becefd6f447a0659128d24f46f6945f9dcb0b0b4a68} 2025/04/30 10:33:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a17bde9, StatelessResetToken: 0xcbf0fc97224a56e9af11619e89ce52e8} 2025/04/30 10:33:35 server -> Sending packet 3 (283 bytes) for connection 01df0d1816418d17, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: f678074bc0e20225, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a17bde9, StatelessResetToken: 0xcbf0fc97224a56e9af11619e89ce52e8} 2025/04/30 10:33:35 server -> &wire.NewTokenFrame{Token: 0xf1cb90323dbbebcc5924a70fb1dc8190d8f0cc59cdc5ecebc8c5d972fbf0c3d10fd3eea50c38833b45c671fa0b895a7aadd32d6760ef4cd2497c728da4f681c68becefd6f447a0659128d24f46f6945f9dcb0b0b4a68} 2025/04/30 10:33:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:35 server <- Reading packet 0 (48 bytes) for connection d33d3023, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: d33d3023, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:35 server -> Sending packet 4 (33 bytes) for connection 01df0d1816418d17, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: f678074bc0e20225, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96.909601ms} 2025/04/30 10:33:35 Received request: GET /nobyvszmcp 2025/04/30 10:33:35 server -> Sending packet 5 (1053 bytes) for connection 01df0d1816418d17, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:35 server Short Header{DestConnectionID: f678074bc0e20225, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:35 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:35 server <- Reading packet 1 (43 bytes) for connection d33d3023, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: d33d3023, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:35 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:35 server <- Reading packet 3 (35 bytes) for connection d33d3023, 1-RTT 2025/04/30 10:33:35 server Short Header{DestConnectionID: d33d3023, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:35 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:35 Replacing connection for connection IDs [d33d3023 9a17bde9] with a closed connection. 2025/04/30 10:33:35 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:35 server Connection 01df0d1816418d17 closed. 2025/04/30 10:33:35 server <- Received Initial packet. 2025/04/30 10:33:35 Created qlog file: /logs/qlog/eee4fec62fa98935.sqlog 2025/04/30 10:33:35 server Changing connection ID to fb5b14e3. 2025/04/30 10:33:35 Adding connection IDs eee4fec62fa98935 and fb5b14e3 for a new connection. 2025/04/30 10:33:35 server <- Reading packet 0 (1200 bytes) for connection eee4fec62fa98935, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: eee4fec62fa98935, SrcConnectionID: f80896e822458214, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f80896e822458214, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:35 Adding connection ID 955eed95. 2025/04/30 10:33:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection eee4fec62fa98935 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: f80896e822458214, SrcConnectionID: fb5b14e3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: f80896e822458214, SrcConnectionID: fb5b14e3, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:35 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 955eed95, StatelessResetToken: 0xc3508c885df5e5b97d5f80049cf40736} 2025/04/30 10:33:35 Removing connection ID 4fe2a9e3e19736c9 after it has been retired. 2025/04/30 10:33:35 server <- Reading packet 1 (1200 bytes) for connection eee4fec62fa98935, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: eee4fec62fa98935, SrcConnectionID: f80896e822458214, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:35 server -> Sending packet 1 (45 bytes) for connection eee4fec62fa98935, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: f80896e822458214, SrcConnectionID: fb5b14e3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:35 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:35 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:35 server -> Sending packet 2 (1280 bytes) for connection eee4fec62fa98935, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: f80896e822458214, SrcConnectionID: fb5b14e3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:35 server -> Sending packet 3 (1280 bytes) for connection eee4fec62fa98935, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: f80896e822458214, SrcConnectionID: fb5b14e3, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:35 server <- Reading packet 2 (1201 bytes) for connection fb5b14e3, Initial 2025/04/30 10:33:35 server Long Header{Type: Initial, DestConnectionID: fb5b14e3, SrcConnectionID: f80896e822458214, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:35 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 10:33:35 server newly acked packets (1): [3] 2025/04/30 10:33:35 server updated RTT: 36.187456ms (σ: 18.093728ms) 2025/04/30 10:33:35 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:35 server -> Sending packet 1 (744 bytes) for connection eee4fec62fa98935, Handshake 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: f80896e822458214, SrcConnectionID: fb5b14e3, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:35 server -> Sending packet 2 (744 bytes) for connection eee4fec62fa98935, Handshake 2025/04/30 10:33:35 server Long Header{Type: Handshake, DestConnectionID: f80896e822458214, SrcConnectionID: fb5b14e3, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:36 server <- Reading packet 1 (42 bytes) for connection fb5b14e3, Handshake 2025/04/30 10:33:36 server Long Header{Type: Handshake, DestConnectionID: fb5b14e3, SrcConnectionID: f80896e822458214, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:36 server Dropping Initial keys. 2025/04/30 10:33:36 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:36 server newly acked packets (1): [2] 2025/04/30 10:33:36 server updated RTT: 35.987ms (σ: 13.968ms) 2025/04/30 10:33:36 server Canceling loss detection timer. 2025/04/30 10:33:36 server Queueing packet (43 bytes) for later decryption 2025/04/30 10:33:36 Removing connection IDs [09eb316a 90e472a9] for a closed connection after it has been retired. 2025/04/30 10:33:36 server <- Reading packet 2 (76 bytes) for connection fb5b14e3, Handshake 2025/04/30 10:33:36 server Long Header{Type: Handshake, DestConnectionID: fb5b14e3, SrcConnectionID: f80896e822458214, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:36 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 Retiring connection ID eee4fec62fa98935 in 5s. 2025/04/30 10:33:36 server Dropping Handshake keys. 2025/04/30 10:33:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:36 server -> Sending packet 2 (283 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 955eed95, StatelessResetToken: 0xc3508c885df5e5b97d5f80049cf40736} 2025/04/30 10:33:36 server -> &wire.NewTokenFrame{Token: 0x163e3be6f120826ffe9f6045bcb21b5c9f6a11c4d54ebbe7731cc3b1308a4c9c25c2d1e94261b5095eb3f9a24ac59c8ef919259a7d8cc2009d8eb8bd5e367a538476f36563594c780ba2a198b88b155c73d1e2a09674} 2025/04/30 10:33:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:36 server -> Sending packet 3 (283 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 955eed95, StatelessResetToken: 0xc3508c885df5e5b97d5f80049cf40736} 2025/04/30 10:33:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:36 server -> &wire.NewTokenFrame{Token: 0x163e3be6f120826ffe9f6045bcb21b5c9f6a11c4d54ebbe7731cc3b1308a4c9c25c2d1e94261b5095eb3f9a24ac59c8ef919259a7d8cc2009d8eb8bd5e367a538476f36563594c780ba2a198b88b155c73d1e2a09674} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:36 server <- Reading packet 0 (43 bytes) for connection fb5b14e3, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: fb5b14e3, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:36 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:36 server -> Sending packet 4 (33 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 91.048266ms} 2025/04/30 10:33:36 Received request: GET /pskdocvqmo 2025/04/30 10:33:36 server Skipping packet number 5 2025/04/30 10:33:36 server -> Sending packet 6 (1053 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:36 server Skipping packet number 5 2025/04/30 10:33:36 server <- Reading packet 1 (43 bytes) for connection fb5b14e3, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: fb5b14e3, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:36 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:36 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:36 server -> Sending packet 7 (33 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.253921ms} 2025/04/30 10:33:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:36 server -> Sending packet 9 (283 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 955eed95, StatelessResetToken: 0xc3508c885df5e5b97d5f80049cf40736} 2025/04/30 10:33:36 server -> &wire.NewTokenFrame{Token: 0x163e3be6f120826ffe9f6045bcb21b5c9f6a11c4d54ebbe7731cc3b1308a4c9c25c2d1e94261b5095eb3f9a24ac59c8ef919259a7d8cc2009d8eb8bd5e367a538476f36563594c780ba2a198b88b155c73d1e2a09674} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:36 server Skipping packet number 8 2025/04/30 10:33:36 server -> Sending packet 10 (1053 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:36 server -> Sending packet 11 (1366 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.PingFrame{} 2025/04/30 10:33:36 server <- Reading packet 3 (31 bytes) for connection fb5b14e3, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: fb5b14e3, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 0s} 2025/04/30 10:33:36 server newly acked packets (2): [9 10] 2025/04/30 10:33:36 server updated RTT: 35.529ms (σ: 11.391ms) 2025/04/30 10:33:36 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:36 server Canceling loss detection timer. 2025/04/30 10:33:36 server -> Sending packet 12 (30 bytes) for connection eee4fec62fa98935, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:36 server Short Header{DestConnectionID: f80896e822458214, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:33:36 server <- Reading packet 5 (35 bytes) for connection fb5b14e3, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: fb5b14e3, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:36 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:36 Replacing connection for connection IDs [fb5b14e3 955eed95] with a closed connection. 2025/04/30 10:33:36 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:36 server Connection eee4fec62fa98935 closed. 2025/04/30 10:33:36 server <- Received Initial packet. 2025/04/30 10:33:36 Created qlog file: /logs/qlog/d7d3e3c07c07052a.sqlog 2025/04/30 10:33:36 server Changing connection ID to 44f3ad82. 2025/04/30 10:33:36 Adding connection IDs d7d3e3c07c07052a and 44f3ad82 for a new connection. 2025/04/30 10:33:36 server <- Reading packet 0 (1200 bytes) for connection d7d3e3c07c07052a, Initial 2025/04/30 10:33:36 server Long Header{Type: Initial, DestConnectionID: d7d3e3c07c07052a, SrcConnectionID: 141a3a291eb5115a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 141a3a291eb5115a, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:36 Adding connection ID 9044b5a1. 2025/04/30 10:33:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d7d3e3c07c07052a 2025/04/30 10:33:36 server Long Header{Type: Initial, DestConnectionID: 141a3a291eb5115a, SrcConnectionID: 44f3ad82, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 457, Version: v1} 2025/04/30 10:33:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:36 server Long Header{Type: Handshake, DestConnectionID: 141a3a291eb5115a, SrcConnectionID: 44f3ad82, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:33:36 server Short Header{DestConnectionID: 141a3a291eb5115a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9044b5a1, StatelessResetToken: 0x06f809c08b29c987ccf834fa9c9c999a} 2025/04/30 10:33:36 server <- Reading packet 1 (1201 bytes) for connection 44f3ad82, Initial 2025/04/30 10:33:36 server Long Header{Type: Initial, DestConnectionID: 44f3ad82, SrcConnectionID: 141a3a291eb5115a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:36 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:36 server newly acked packets (1): [0] 2025/04/30 10:33:36 server updated RTT: 35.26177ms (σ: 17.630885ms) 2025/04/30 10:33:36 server <- Reading packet 0 (76 bytes) for connection 44f3ad82, Handshake 2025/04/30 10:33:36 server Long Header{Type: Handshake, DestConnectionID: 44f3ad82, SrcConnectionID: 141a3a291eb5115a, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:36 server Dropping Initial keys. 2025/04/30 10:33:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:36 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 Retiring connection ID d7d3e3c07c07052a in 5s. 2025/04/30 10:33:36 server Dropping Handshake keys. 2025/04/30 10:33:36 server -> Sending packet 1 (259 bytes) for connection d7d3e3c07c07052a, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 141a3a291eb5115a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.NewTokenFrame{Token: 0x4b69648996a38eef0a1b4db7e46a4985bf0526265e1ece934139a386bd3dc754a2664aac4b772801474cee49ded1c11165f8d294cd657c3afdd7fa01b7b483629c9b5d128ee6d43e28fba8ed1f626ac0c6750e02349d} 2025/04/30 10:33:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:36 server <- Reading packet 1 (28 bytes) for connection 44f3ad82, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: 44f3ad82, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:36 server newly acked packets (2): [0 1] 2025/04/30 10:33:36 server updated RTT: 37.199ms (σ: 17.099ms) 2025/04/30 10:33:36 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:36 server Canceling loss detection timer. 2025/04/30 10:33:36 server <- Reading packet 2 (43 bytes) for connection 44f3ad82, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: 44f3ad82, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:36 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:36 server -> Sending packet 2 (32 bytes) for connection d7d3e3c07c07052a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 141a3a291eb5115a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 142.485µs} 2025/04/30 10:33:36 Received request: GET /cvsugnuema 2025/04/30 10:33:36 server -> Sending packet 3 (1053 bytes) for connection d7d3e3c07c07052a, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 141a3a291eb5115a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:36 server <- Reading packet 4 (31 bytes) for connection 44f3ad82, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: 44f3ad82, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:36 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:36 Replacing connection for connection IDs [44f3ad82 9044b5a1] with a closed connection. 2025/04/30 10:33:36 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:36 server Connection d7d3e3c07c07052a closed. 2025/04/30 10:33:36 server <- Received Initial packet. 2025/04/30 10:33:36 Created qlog file: /logs/qlog/a070235d655b24f8.sqlog 2025/04/30 10:33:36 server Changing connection ID to ea265cbb. 2025/04/30 10:33:36 Adding connection IDs a070235d655b24f8 and ea265cbb for a new connection. 2025/04/30 10:33:36 server <- Reading packet 0 (1200 bytes) for connection a070235d655b24f8, Initial 2025/04/30 10:33:36 server Long Header{Type: Initial, DestConnectionID: a070235d655b24f8, SrcConnectionID: 63acf2750bdab571, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 63acf2750bdab571, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:36 Adding connection ID 74a7c129. 2025/04/30 10:33:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a070235d655b24f8 2025/04/30 10:33:36 server Long Header{Type: Initial, DestConnectionID: 63acf2750bdab571, SrcConnectionID: ea265cbb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:36 server Long Header{Type: Handshake, DestConnectionID: 63acf2750bdab571, SrcConnectionID: ea265cbb, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74a7c129, StatelessResetToken: 0x545c66204ca920de292f87b644289aad} 2025/04/30 10:33:36 server <- Reading packet 1 (1201 bytes) for connection ea265cbb, Initial 2025/04/30 10:33:36 server Long Header{Type: Initial, DestConnectionID: ea265cbb, SrcConnectionID: 63acf2750bdab571, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:36 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:36 server newly acked packets (1): [0] 2025/04/30 10:33:36 server updated RTT: 35.839592ms (σ: 17.919796ms) 2025/04/30 10:33:36 server <- Reading packet 1 (42 bytes) for connection ea265cbb, Handshake 2025/04/30 10:33:36 server Long Header{Type: Handshake, DestConnectionID: ea265cbb, SrcConnectionID: 63acf2750bdab571, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:36 server Dropping Initial keys. 2025/04/30 10:33:36 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:36 server newly acked packets (1): [0] 2025/04/30 10:33:36 server updated RTT: 36.061ms (σ: 13.883ms) 2025/04/30 10:33:36 server Canceling loss detection timer. 2025/04/30 10:33:36 server Queueing packet (48 bytes) for later decryption 2025/04/30 10:33:36 Removing connection ID 6aed6b2c6eb40c81 after it has been retired. 2025/04/30 10:33:36 server <- Reading packet 2 (76 bytes) for connection ea265cbb, Handshake 2025/04/30 10:33:36 server Long Header{Type: Handshake, DestConnectionID: ea265cbb, SrcConnectionID: 63acf2750bdab571, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:36 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 Retiring connection ID a070235d655b24f8 in 5s. 2025/04/30 10:33:36 server Dropping Handshake keys. 2025/04/30 10:33:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:36 server -> Sending packet 2 (283 bytes) for connection a070235d655b24f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.NewTokenFrame{Token: 0x0509312f677d98328c2f8d8f70e5236ee599b981cefdce529702d781a92159a8de539486992962e282f92828a08052887e8fe6dfb61137ff8e32719f1d76ef2ef4d2a532acb4403b7d3d7b974da4d6b85736e64c6505} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74a7c129, StatelessResetToken: 0x545c66204ca920de292f87b644289aad} 2025/04/30 10:33:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:36 server -> Sending packet 3 (283 bytes) for connection a070235d655b24f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:36 server -> &wire.NewTokenFrame{Token: 0x0509312f677d98328c2f8d8f70e5236ee599b981cefdce529702d781a92159a8de539486992962e282f92828a08052887e8fe6dfb61137ff8e32719f1d76ef2ef4d2a532acb4403b7d3d7b974da4d6b85736e64c6505} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74a7c129, StatelessResetToken: 0x545c66204ca920de292f87b644289aad} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:36 server <- Reading packet 0 (48 bytes) for connection ea265cbb, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: ea265cbb, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:36 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:36 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:36 server -> Sending packet 4 (33 bytes) for connection a070235d655b24f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.198924ms} 2025/04/30 10:33:36 Received request: GET /fxxttnsfjf 2025/04/30 10:33:36 server -> Sending packet 5 (1053 bytes) for connection a070235d655b24f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:36 server <- Reading packet 3 (43 bytes) for connection ea265cbb, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: ea265cbb, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:36 server Queuing ACK because there's a new missing packet to report. 2025/04/30 10:33:36 server -> Sending packet 6 (34 bytes) for connection a070235d655b24f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 112.91µs} 2025/04/30 10:33:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:36 server -> Sending packet 8 (283 bytes) for connection a070235d655b24f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:36 server -> &wire.NewTokenFrame{Token: 0x0509312f677d98328c2f8d8f70e5236ee599b981cefdce529702d781a92159a8de539486992962e282f92828a08052887e8fe6dfb61137ff8e32719f1d76ef2ef4d2a532acb4403b7d3d7b974da4d6b85736e64c6505} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74a7c129, StatelessResetToken: 0x545c66204ca920de292f87b644289aad} 2025/04/30 10:33:36 server Skipping packet number 7 2025/04/30 10:33:36 server -> Sending packet 9 (1053 bytes) for connection a070235d655b24f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:36 server -> Sending packet 10 (1366 bytes) for connection a070235d655b24f8, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:36 server Short Header{DestConnectionID: 63acf2750bdab571, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.PingFrame{} 2025/04/30 10:33:36 server <- Reading packet 5 (37 bytes) for connection ea265cbb, 1-RTT 2025/04/30 10:33:36 server Short Header{DestConnectionID: ea265cbb, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:36 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:36 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:36 Replacing connection for connection IDs [ea265cbb 74a7c129] with a closed connection. 2025/04/30 10:33:36 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:36 server Connection a070235d655b24f8 closed. 2025/04/30 10:33:36 server <- Received Initial packet. 2025/04/30 10:33:36 Created qlog file: /logs/qlog/6ba4af038d453f1e.sqlog 2025/04/30 10:33:36 server Changing connection ID to 461d592c. 2025/04/30 10:33:36 Adding connection IDs 6ba4af038d453f1e and 461d592c for a new connection. 2025/04/30 10:33:36 server <- Reading packet 0 (1200 bytes) for connection 6ba4af038d453f1e, Initial 2025/04/30 10:33:36 server Long Header{Type: Initial, DestConnectionID: 6ba4af038d453f1e, SrcConnectionID: 529dc0f8a79bc11e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 529dc0f8a79bc11e, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:36 Adding connection ID 257a315c. 2025/04/30 10:33:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6ba4af038d453f1e 2025/04/30 10:33:36 server Long Header{Type: Initial, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 460, Version: v1} 2025/04/30 10:33:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:36 server Long Header{Type: Handshake, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 10:33:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:33:36 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 257a315c, StatelessResetToken: 0x021c1166b17be3f97cc5f3895c99a98c} 2025/04/30 10:33:36 Removing connection IDs [c1dafc0e c1892595] for a closed connection after it has been retired. 2025/04/30 10:33:37 Removing connection ID 6d6c904487241dd9 after it has been retired. 2025/04/30 10:33:37 Tracking 32 connection IDs and 0 reset tokens. 2025/04/30 10:33:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 10:33:37 server -> Sending packet 14 (51 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:37 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74ae578a, StatelessResetToken: 0xb273cc608dea653b72b894aceba315fe} 2025/04/30 10:33:37 server Skipping packet number 13 2025/04/30 10:33:37 server -> Sending packet 15 (256 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:37 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:37 server -> &wire.NewTokenFrame{Token: 0x193b4028855dd4d4e863a6f8e33c94b253b68870ebc86b1e1f3579569fd2dab11b1a139d5d0ee687a72c30d9676aa508714f5980e737943a8cc4a3eefbcb2ab3c04265542b3043aea3b9bf029fa7714f0fd31968a5b7} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:37 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:37 server -> Sending packet 1 (1280 bytes) for connection 6ba4af038d453f1e, Initial 2025/04/30 10:33:37 server Long Header{Type: Initial, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:37 server -> Sending packet 2 (1280 bytes) for connection 6ba4af038d453f1e, Initial 2025/04/30 10:33:37 server Long Header{Type: Initial, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:37 server Canceling loss detection timer. 2025/04/30 10:33:37 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 10:33:37 server <- Reading packet 2 (1201 bytes) for connection 461d592c, Initial 2025/04/30 10:33:37 server Long Header{Type: Initial, DestConnectionID: 461d592c, SrcConnectionID: 529dc0f8a79bc11e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:37 server -> Sending packet 1 (747 bytes) for connection 6ba4af038d453f1e, Handshake 2025/04/30 10:33:37 server Long Header{Type: Handshake, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, PacketNumber: 1, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:33:37 server -> Sending packet 2 (747 bytes) for connection 6ba4af038d453f1e, Handshake 2025/04/30 10:33:37 server Long Header{Type: Handshake, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:33:37 server <- Reading packet 0 (40 bytes) for connection 461d592c, Handshake 2025/04/30 10:33:37 server Long Header{Type: Handshake, DestConnectionID: 461d592c, SrcConnectionID: 529dc0f8a79bc11e, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:37 server Dropping Initial keys. 2025/04/30 10:33:37 server <- &wire.PingFrame{} 2025/04/30 10:33:37 server -> Sending packet 3 (44 bytes) for connection 6ba4af038d453f1e, Handshake 2025/04/30 10:33:37 server Long Header{Type: Handshake, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:37 Removing connection IDs [0320f8d4 5d3ee6f1] for a closed connection after it has been retired. 2025/04/30 10:33:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:37 server -> Sending packet 4 (747 bytes) for connection 6ba4af038d453f1e, Handshake 2025/04/30 10:33:37 server Long Header{Type: Handshake, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, PacketNumber: 4, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:33:37 server -> Sending packet 5 (747 bytes) for connection 6ba4af038d453f1e, Handshake 2025/04/30 10:33:37 server Long Header{Type: Handshake, DestConnectionID: 529dc0f8a79bc11e, SrcConnectionID: 461d592c, PacketNumber: 5, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 10:33:37 server <- Reading packet 2 (42 bytes) for connection 461d592c, Handshake 2025/04/30 10:33:37 server Long Header{Type: Handshake, DestConnectionID: 461d592c, SrcConnectionID: 529dc0f8a79bc11e, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:37 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:33:37 server Queueing packet (43 bytes) for later decryption 2025/04/30 10:33:37 server <- Reading packet 3 (76 bytes) for connection 461d592c, Handshake 2025/04/30 10:33:37 server Long Header{Type: Handshake, DestConnectionID: 461d592c, SrcConnectionID: 529dc0f8a79bc11e, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:37 Retiring connection ID 6ba4af038d453f1e in 5s. 2025/04/30 10:33:37 server Dropping Handshake keys. 2025/04/30 10:33:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:37 server -> Sending packet 2 (280 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 257a315c, StatelessResetToken: 0x021c1166b17be3f97cc5f3895c99a98c} 2025/04/30 10:33:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:37 server -> &wire.NewTokenFrame{Token: 0xbd2785b2d38f2b8f96b579ea6bd9b65a3a7be10adbf41787d3b6d83709d2cda1b3cb68917c02be23fb8a209d6e80c27e064676cec396533a4633dc532068d317a17d2f8a34e14c806d32f403903fd88920703000853e} 2025/04/30 10:33:37 server -> Sending packet 3 (280 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 257a315c, StatelessResetToken: 0x021c1166b17be3f97cc5f3895c99a98c} 2025/04/30 10:33:37 server -> &wire.NewTokenFrame{Token: 0xbd2785b2d38f2b8f96b579ea6bd9b65a3a7be10adbf41787d3b6d83709d2cda1b3cb68917c02be23fb8a209d6e80c27e064676cec396533a4633dc532068d317a17d2f8a34e14c806d32f403903fd88920703000853e} 2025/04/30 10:33:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:37 server -> Sending packet 4 (1366 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.PingFrame{} 2025/04/30 10:33:37 server <- Reading packet 0 (43 bytes) for connection 461d592c, 1-RTT 2025/04/30 10:33:37 server Short Header{DestConnectionID: 461d592c, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:37 server -> Sending packet 5 (35 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 180.503269ms} 2025/04/30 10:33:37 Received request: GET /yhqdzjrbdo 2025/04/30 10:33:37 server -> Sending packet 6 (1053 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:37 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:37 server <- Reading packet 1 (43 bytes) for connection 461d592c, 1-RTT 2025/04/30 10:33:37 server Short Header{DestConnectionID: 461d592c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:37 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:37 server <- Reading packet 3 (28 bytes) for connection 461d592c, 1-RTT 2025/04/30 10:33:37 server Short Header{DestConnectionID: 461d592c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:37 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 19ms} 2025/04/30 10:33:37 server newly acked packets (2): [3 4] 2025/04/30 10:33:37 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:37 server -> Sending packet 7 (1409 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.PingFrame{} 2025/04/30 10:33:37 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:37 server -> Sending packet 8 (35 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 5.33781ms} 2025/04/30 10:33:37 Removing connection ID c832116fc671b6ed after it has been retired. 2025/04/30 10:33:37 server <- Reading packet 4 (28 bytes) for connection 461d592c, 1-RTT 2025/04/30 10:33:37 server Short Header{DestConnectionID: 461d592c, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:37 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 20ms} 2025/04/30 10:33:37 server newly acked packets (1): [7] 2025/04/30 10:33:37 server lost packet 6 (time threshold) 2025/04/30 10:33:37 server Canceling loss detection timer. 2025/04/30 10:33:37 server -> Sending packet 9 (1430 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.PingFrame{} 2025/04/30 10:33:37 server -> Sending packet 10 (1053 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:37 server <- Reading packet 5 (27 bytes) for connection 461d592c, 1-RTT 2025/04/30 10:33:37 server Short Header{DestConnectionID: 461d592c, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:37 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, DelayTime: 0s} 2025/04/30 10:33:37 server newly acked packets (2): [9 10] 2025/04/30 10:33:37 server updated RTT: 32.948276ms (σ: 16.474138ms) 2025/04/30 10:33:37 server Canceling loss detection timer. 2025/04/30 10:33:37 server -> Sending packet 11 (30 bytes) for connection 6ba4af038d453f1e, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:37 server Short Header{DestConnectionID: 529dc0f8a79bc11e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:33:37 server <- Reading packet 6 (31 bytes) for connection 461d592c, 1-RTT 2025/04/30 10:33:37 server Short Header{DestConnectionID: 461d592c, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:37 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:37 Replacing connection for connection IDs [257a315c 461d592c] with a closed connection. 2025/04/30 10:33:37 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:37 server Connection 6ba4af038d453f1e closed. 2025/04/30 10:33:38 server <- Received Initial packet. 2025/04/30 10:33:38 Created qlog file: /logs/qlog/31bd711528b44177.sqlog 2025/04/30 10:33:38 server Changing connection ID to 74540a15. 2025/04/30 10:33:38 Adding connection IDs 31bd711528b44177 and 74540a15 for a new connection. 2025/04/30 10:33:38 server <- Reading packet 2 (1200 bytes) for connection 31bd711528b44177, Initial 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: 31bd711528b44177, SrcConnectionID: 15207685b94e6a55, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 15207685b94e6a55, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:38 Adding connection ID 10595f7a. 2025/04/30 10:33:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 31bd711528b44177 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: 15207685b94e6a55, SrcConnectionID: 74540a15, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 466, Version: v1} 2025/04/30 10:33:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:38 server Long Header{Type: Handshake, DestConnectionID: 15207685b94e6a55, SrcConnectionID: 74540a15, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 10:33:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 10:33:38 server Short Header{DestConnectionID: 15207685b94e6a55, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 10595f7a, StatelessResetToken: 0x6fa010ee4316de0726832770ad4992c0} 2025/04/30 10:33:38 server <- Reading packet 3 (1200 bytes) for connection 31bd711528b44177, Initial 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: 31bd711528b44177, SrcConnectionID: 15207685b94e6a55, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:38 server -> Sending packet 1 (45 bytes) for connection 31bd711528b44177, Initial 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: 15207685b94e6a55, SrcConnectionID: 74540a15, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:38 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:38 server <- Reading packet 4 (1200 bytes) for connection 74540a15, Initial 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: 74540a15, SrcConnectionID: 15207685b94e6a55, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 10:33:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:38 server -> Sending packet 2 (45 bytes) for connection 31bd711528b44177, Initial 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: 15207685b94e6a55, SrcConnectionID: 74540a15, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:38 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:38 server <- Reading packet 5 (1201 bytes) for connection 74540a15, Initial 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: 74540a15, SrcConnectionID: 15207685b94e6a55, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:38 server newly acked packets (1): [0] 2025/04/30 10:33:38 server updated RTT: 35.723317ms (σ: 17.861658ms) 2025/04/30 10:33:38 server <- Reading packet 0 (76 bytes) for connection 74540a15, Handshake 2025/04/30 10:33:38 server Long Header{Type: Handshake, DestConnectionID: 74540a15, SrcConnectionID: 15207685b94e6a55, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:38 server Dropping Initial keys. 2025/04/30 10:33:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:38 Retiring connection ID 31bd711528b44177 in 5s. 2025/04/30 10:33:38 server Dropping Handshake keys. 2025/04/30 10:33:38 server -> Sending packet 1 (259 bytes) for connection 31bd711528b44177, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:38 server Short Header{DestConnectionID: 15207685b94e6a55, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:38 server -> &wire.NewTokenFrame{Token: 0x804bd5820801c97fef187875362363b3402407de07b03eaee68dde8dbe6db8e8f7c5a9aa7f7408fb8ec77b6eb434018fa87153d70adf3354405aeeeb95eb63f574fce5b49d86592c7a04a9e8428b1ad93c2eb0a68078} 2025/04/30 10:33:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:38 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:38 server <- Reading packet 1 (28 bytes) for connection 74540a15, 1-RTT 2025/04/30 10:33:38 server Short Header{DestConnectionID: 74540a15, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:38 server newly acked packets (2): [0 1] 2025/04/30 10:33:38 server updated RTT: 37.584ms (σ: 17.117ms) 2025/04/30 10:33:38 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:38 server Canceling loss detection timer. 2025/04/30 10:33:38 server <- Reading packet 2 (43 bytes) for connection 74540a15, 1-RTT 2025/04/30 10:33:38 server Short Header{DestConnectionID: 74540a15, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:38 server -> Sending packet 2 (32 bytes) for connection 31bd711528b44177, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:38 server Short Header{DestConnectionID: 15207685b94e6a55, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 102.952µs} 2025/04/30 10:33:38 Received request: GET /iqybebtrwc 2025/04/30 10:33:38 server -> Sending packet 3 (1053 bytes) for connection 31bd711528b44177, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:38 server Short Header{DestConnectionID: 15207685b94e6a55, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:38 Removing connection IDs [de8d7457 4c4c621f] for a closed connection after it has been retired. 2025/04/30 10:33:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:38 server -> Sending packet 5 (1053 bytes) for connection 31bd711528b44177, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:38 server Short Header{DestConnectionID: 15207685b94e6a55, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:38 server -> Sending packet 6 (1053 bytes) for connection 31bd711528b44177, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:38 server Short Header{DestConnectionID: 15207685b94e6a55, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:38 server -> Sending packet 7 (1366 bytes) for connection 31bd711528b44177, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:38 server Short Header{DestConnectionID: 15207685b94e6a55, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:38 server -> &wire.PingFrame{} 2025/04/30 10:33:38 server <- Reading packet 3 (37 bytes) for connection 74540a15, 1-RTT 2025/04/30 10:33:38 server Short Header{DestConnectionID: 74540a15, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:38 Replacing connection for connection IDs [10595f7a 74540a15] with a closed connection. 2025/04/30 10:33:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:38 server Connection 31bd711528b44177 closed. 2025/04/30 10:33:38 server <- Received Initial packet. 2025/04/30 10:33:38 Created qlog file: /logs/qlog/34d8c8716e03b761.sqlog 2025/04/30 10:33:38 server Changing connection ID to 86a4388b. 2025/04/30 10:33:38 Adding connection IDs 34d8c8716e03b761 and 86a4388b for a new connection. 2025/04/30 10:33:38 server <- Reading packet 0 (1200 bytes) for connection 34d8c8716e03b761, Initial 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: 34d8c8716e03b761, SrcConnectionID: a20903638dc0ab3d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a20903638dc0ab3d, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:38 Adding connection ID bbd737ec. 2025/04/30 10:33:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 34d8c8716e03b761 2025/04/30 10:33:38 server Long Header{Type: Initial, DestConnectionID: a20903638dc0ab3d, SrcConnectionID: 86a4388b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 458, Version: v1} 2025/04/30 10:33:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:38 server Long Header{Type: Handshake, DestConnectionID: a20903638dc0ab3d, SrcConnectionID: 86a4388b, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:38 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bbd737ec, StatelessResetToken: 0x013eae0e22f24bca66e922f893271d93} 2025/04/30 10:33:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:39 server -> Sending packet 1 (1280 bytes) for connection 34d8c8716e03b761, Initial 2025/04/30 10:33:39 server Long Header{Type: Initial, DestConnectionID: a20903638dc0ab3d, SrcConnectionID: 86a4388b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:39 server -> Sending packet 2 (1280 bytes) for connection 34d8c8716e03b761, Initial 2025/04/30 10:33:39 server Long Header{Type: Initial, DestConnectionID: a20903638dc0ab3d, SrcConnectionID: 86a4388b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:39 server Canceling loss detection timer. 2025/04/30 10:33:39 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 10:33:39 server <- Reading packet 2 (1201 bytes) for connection 86a4388b, Initial 2025/04/30 10:33:39 server Long Header{Type: Initial, DestConnectionID: 86a4388b, SrcConnectionID: a20903638dc0ab3d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:39 Tracking 33 connection IDs and 0 reset tokens. 2025/04/30 10:33:39 Removing connection ID a886f5ac1e04869c after it has been retired. 2025/04/30 10:33:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:39 server -> Sending packet 1 (749 bytes) for connection 34d8c8716e03b761, Handshake 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: a20903638dc0ab3d, SrcConnectionID: 86a4388b, PacketNumber: 1, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:39 server -> Sending packet 2 (749 bytes) for connection 34d8c8716e03b761, Handshake 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: a20903638dc0ab3d, SrcConnectionID: 86a4388b, PacketNumber: 2, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:39 server <- Reading packet 0 (40 bytes) for connection 86a4388b, Handshake 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: 86a4388b, SrcConnectionID: a20903638dc0ab3d, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:39 server Dropping Initial keys. 2025/04/30 10:33:39 server <- &wire.PingFrame{} 2025/04/30 10:33:39 server -> Sending packet 3 (44 bytes) for connection 34d8c8716e03b761, Handshake 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: a20903638dc0ab3d, SrcConnectionID: 86a4388b, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:39 server <- Reading packet 2 (42 bytes) for connection 86a4388b, Handshake 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: 86a4388b, SrcConnectionID: a20903638dc0ab3d, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:39 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 10:33:39 server <- Reading packet 3 (42 bytes) for connection 86a4388b, Handshake 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: 86a4388b, SrcConnectionID: a20903638dc0ab3d, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:39 server newly acked packets (1): [2] 2025/04/30 10:33:39 server updated RTT: 35.616786ms (σ: 17.808393ms) 2025/04/30 10:33:39 server Canceling loss detection timer. 2025/04/30 10:33:39 server Queueing packet (43 bytes) for later decryption 2025/04/30 10:33:39 server <- Reading packet 4 (76 bytes) for connection 86a4388b, Handshake 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: 86a4388b, SrcConnectionID: a20903638dc0ab3d, PacketNumber: 4, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:39 Retiring connection ID 34d8c8716e03b761 in 5s. 2025/04/30 10:33:39 server Dropping Handshake keys. 2025/04/30 10:33:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:39 server -> Sending packet 2 (283 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bbd737ec, StatelessResetToken: 0x013eae0e22f24bca66e922f893271d93} 2025/04/30 10:33:39 server -> &wire.NewTokenFrame{Token: 0x6f2cf0c30dd3845af3e24e9f4f47927fade876c29f2e2d3881d625dae52b432fe98afd40bba40440cec10ff39ce28350437badae2a6595666c0c7e5239ff2bc8ccb8697f87462ba71779abce9e2fb87cdc0a545fd9d8} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:39 server -> Sending packet 3 (283 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bbd737ec, StatelessResetToken: 0x013eae0e22f24bca66e922f893271d93} 2025/04/30 10:33:39 server -> &wire.NewTokenFrame{Token: 0x6f2cf0c30dd3845af3e24e9f4f47927fade876c29f2e2d3881d625dae52b432fe98afd40bba40440cec10ff39ce28350437badae2a6595666c0c7e5239ff2bc8ccb8697f87462ba71779abce9e2fb87cdc0a545fd9d8} 2025/04/30 10:33:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:39 server <- Reading packet 0 (43 bytes) for connection 86a4388b, 1-RTT 2025/04/30 10:33:39 server Short Header{DestConnectionID: 86a4388b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:39 server -> Sending packet 4 (35 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400.100487ms} 2025/04/30 10:33:39 Received request: GET /bbuwhfwvso 2025/04/30 10:33:39 server -> Sending packet 5 (1053 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:39 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:39 server <- Reading packet 1 (43 bytes) for connection 86a4388b, 1-RTT 2025/04/30 10:33:39 server Short Header{DestConnectionID: 86a4388b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:39 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:39 server -> Sending packet 6 (33 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.261896ms} 2025/04/30 10:33:39 Removing connection ID 76c8c6075a066a3d after it has been retired. 2025/04/30 10:33:39 server <- Received Initial packet. 2025/04/30 10:33:39 Created qlog file: /logs/qlog/87668bdf57fcb191.sqlog 2025/04/30 10:33:39 server Changing connection ID to 21cd293b. 2025/04/30 10:33:39 Adding connection IDs 87668bdf57fcb191 and 21cd293b for a new connection. 2025/04/30 10:33:39 server <- Reading packet 1 (1200 bytes) for connection 87668bdf57fcb191, Initial 2025/04/30 10:33:39 server Long Header{Type: Initial, DestConnectionID: 87668bdf57fcb191, SrcConnectionID: 10f6822068fb9b6b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 10f6822068fb9b6b, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:39 Adding connection ID 76f8c603. 2025/04/30 10:33:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 87668bdf57fcb191 2025/04/30 10:33:39 server Long Header{Type: Initial, DestConnectionID: 10f6822068fb9b6b, SrcConnectionID: 21cd293b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 468, Version: v1} 2025/04/30 10:33:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: 10f6822068fb9b6b, SrcConnectionID: 21cd293b, PacketNumber: 0, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 10:33:39 server Short Header{DestConnectionID: 10f6822068fb9b6b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76f8c603, StatelessResetToken: 0x0a1f6d9582bbdb403c479cb007d61e45} 2025/04/30 10:33:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:39 server -> Sending packet 8 (283 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bbd737ec, StatelessResetToken: 0x013eae0e22f24bca66e922f893271d93} 2025/04/30 10:33:39 server -> &wire.NewTokenFrame{Token: 0x6f2cf0c30dd3845af3e24e9f4f47927fade876c29f2e2d3881d625dae52b432fe98afd40bba40440cec10ff39ce28350437badae2a6595666c0c7e5239ff2bc8ccb8697f87462ba71779abce9e2fb87cdc0a545fd9d8} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:39 server Skipping packet number 7 2025/04/30 10:33:39 server -> Sending packet 9 (1053 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:39 server -> Sending packet 10 (1366 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.PingFrame{} 2025/04/30 10:33:39 server <- Reading packet 2 (1200 bytes) for connection 21cd293b, Initial 2025/04/30 10:33:39 server Long Header{Type: Initial, DestConnectionID: 21cd293b, SrcConnectionID: 10f6822068fb9b6b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 10:33:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:39 server -> Sending packet 1 (45 bytes) for connection 87668bdf57fcb191, Initial 2025/04/30 10:33:39 server Long Header{Type: Initial, DestConnectionID: 10f6822068fb9b6b, SrcConnectionID: 21cd293b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:39 server <- Reading packet 3 (1201 bytes) for connection 21cd293b, Initial 2025/04/30 10:33:39 server Long Header{Type: Initial, DestConnectionID: 21cd293b, SrcConnectionID: 10f6822068fb9b6b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:39 server newly acked packets (1): [0] 2025/04/30 10:33:39 server updated RTT: 35.379251ms (σ: 17.689625ms) 2025/04/30 10:33:39 server <- Reading packet 0 (76 bytes) for connection 21cd293b, Handshake 2025/04/30 10:33:39 server Long Header{Type: Handshake, DestConnectionID: 21cd293b, SrcConnectionID: 10f6822068fb9b6b, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:39 server Dropping Initial keys. 2025/04/30 10:33:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:39 Retiring connection ID 87668bdf57fcb191 in 5s. 2025/04/30 10:33:39 server Dropping Handshake keys. 2025/04/30 10:33:39 server -> Sending packet 1 (259 bytes) for connection 87668bdf57fcb191, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: 10f6822068fb9b6b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.NewTokenFrame{Token: 0xb5d3bb6c33b36f9c20a44819b3ef9910252adeea8e6c3da786da8f6d326af73f3d6e77fec839d1ef8976e54a0378b7289c7860f63ceeb5bf55abfa47e8faa6e58c8ef0a596df540b5a84fb1d1933ed7405d2b5301f5e} 2025/04/30 10:33:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:39 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 10:33:39 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:39 server <- Reading packet 0 (48 bytes) for connection 21cd293b, 1-RTT 2025/04/30 10:33:39 server Short Header{DestConnectionID: 21cd293b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:39 server newly acked packets (1): [0] 2025/04/30 10:33:39 server updated RTT: 35.616ms (σ: 13.74ms) 2025/04/30 10:33:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:39 server -> Sending packet 2 (32 bytes) for connection 87668bdf57fcb191, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: 10f6822068fb9b6b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 105.396µs} 2025/04/30 10:33:39 Received request: GET /vzliqhanwh 2025/04/30 10:33:39 server -> Sending packet 3 (1053 bytes) for connection 87668bdf57fcb191, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:39 server Short Header{DestConnectionID: 10f6822068fb9b6b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:39 Removing connection IDs [6a1c781d c811dd5f] for a closed connection after it has been retired. 2025/04/30 10:33:40 Removing connection ID 524de85430302f70 after it has been retired. 2025/04/30 10:33:40 Removing connection IDs [a62ab6cc 76d4fba5] for a closed connection after it has been retired. 2025/04/30 10:33:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:40 server -> Sending packet 5 (259 bytes) for connection 87668bdf57fcb191, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: 10f6822068fb9b6b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:40 server -> &wire.NewTokenFrame{Token: 0xb5d3bb6c33b36f9c20a44819b3ef9910252adeea8e6c3da786da8f6d326af73f3d6e77fec839d1ef8976e54a0378b7289c7860f63ceeb5bf55abfa47e8faa6e58c8ef0a596df540b5a84fb1d1933ed7405d2b5301f5e} 2025/04/30 10:33:40 server Skipping packet number 4 2025/04/30 10:33:40 server -> Sending packet 6 (1053 bytes) for connection 87668bdf57fcb191, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: 10f6822068fb9b6b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:40 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:40 server <- Reading packet 2 (33 bytes) for connection 21cd293b, 1-RTT 2025/04/30 10:33:40 server Short Header{DestConnectionID: 21cd293b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:40 Replacing connection for connection IDs [21cd293b 76f8c603] with a closed connection. 2025/04/30 10:33:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:40 server Connection 87668bdf57fcb191 closed. 2025/04/30 10:33:40 server <- Received Initial packet. 2025/04/30 10:33:40 Created qlog file: /logs/qlog/cf299a5a740f97f7.sqlog 2025/04/30 10:33:40 server Changing connection ID to f9e77b23. 2025/04/30 10:33:40 Adding connection IDs cf299a5a740f97f7 and f9e77b23 for a new connection. 2025/04/30 10:33:40 server <- Reading packet 0 (1200 bytes) for connection cf299a5a740f97f7, Initial 2025/04/30 10:33:40 server Long Header{Type: Initial, DestConnectionID: cf299a5a740f97f7, SrcConnectionID: a6239493c669b2dd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a6239493c669b2dd, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:40 Adding connection ID 6a8cceef. 2025/04/30 10:33:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cf299a5a740f97f7 2025/04/30 10:33:40 server Long Header{Type: Initial, DestConnectionID: a6239493c669b2dd, SrcConnectionID: f9e77b23, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 453, Version: v1} 2025/04/30 10:33:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:40 server Long Header{Type: Handshake, DestConnectionID: a6239493c669b2dd, SrcConnectionID: f9e77b23, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6a8cceef, StatelessResetToken: 0x7d9a45a611cca09b7e45977076260536} 2025/04/30 10:33:40 server <- Reading packet 1 (1201 bytes) for connection f9e77b23, Initial 2025/04/30 10:33:40 server Long Header{Type: Initial, DestConnectionID: f9e77b23, SrcConnectionID: a6239493c669b2dd, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:40 server newly acked packets (1): [0] 2025/04/30 10:33:40 server updated RTT: 35.297031ms (σ: 17.648515ms) 2025/04/30 10:33:40 server <- Reading packet 0 (76 bytes) for connection f9e77b23, Handshake 2025/04/30 10:33:40 server Long Header{Type: Handshake, DestConnectionID: f9e77b23, SrcConnectionID: a6239493c669b2dd, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:40 server Dropping Initial keys. 2025/04/30 10:33:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:40 Retiring connection ID cf299a5a740f97f7 in 5s. 2025/04/30 10:33:40 server Dropping Handshake keys. 2025/04/30 10:33:40 server -> Sending packet 1 (259 bytes) for connection cf299a5a740f97f7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.NewTokenFrame{Token: 0x916e94099539d013c9b21a136bff623a42fe49dd0a84f2e0af3d48deb1a06ab8ca66585b1b09e1b31761ddb3d6e759b58e845e9986da0e107bac04649f3f80c6be5fa913e7c39c02915be88def5872aa18c4825444a0} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:40 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:40 server <- Reading packet 0 (48 bytes) for connection f9e77b23, 1-RTT 2025/04/30 10:33:40 server Short Header{DestConnectionID: f9e77b23, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:40 server newly acked packets (1): [0] 2025/04/30 10:33:40 server updated RTT: 35.502ms (σ: 13.646ms) 2025/04/30 10:33:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:40 server -> Sending packet 2 (32 bytes) for connection cf299a5a740f97f7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 92.221µs} 2025/04/30 10:33:40 Received request: GET /gtukkmkdgk 2025/04/30 10:33:40 server -> Sending packet 3 (1053 bytes) for connection cf299a5a740f97f7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:40 server -> Sending packet 5 (259 bytes) for connection cf299a5a740f97f7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:40 server -> &wire.NewTokenFrame{Token: 0x916e94099539d013c9b21a136bff623a42fe49dd0a84f2e0af3d48deb1a06ab8ca66585b1b09e1b31761ddb3d6e759b58e845e9986da0e107bac04649f3f80c6be5fa913e7c39c02915be88def5872aa18c4825444a0} 2025/04/30 10:33:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:40 server Skipping packet number 4 2025/04/30 10:33:40 server -> Sending packet 6 (1053 bytes) for connection cf299a5a740f97f7, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:40 Removing connection ID 11c083286bb7e55d after it has been retired. 2025/04/30 10:33:40 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:40 server <- Reading packet 1 (30 bytes) for connection f9e77b23, 1-RTT 2025/04/30 10:33:40 server Short Header{DestConnectionID: f9e77b23, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:40 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 19ms} 2025/04/30 10:33:40 server newly acked packets (1): [5] 2025/04/30 10:33:40 server updated RTT: 37.386ms (σ: 14.003ms) 2025/04/30 10:33:40 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 10:33:40 server -> Sending packet 17 (1053 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:40 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:40 server Skipping packet number 16 2025/04/30 10:33:40 server -> Sending packet 18 (51 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:40 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74ae578a, StatelessResetToken: 0xb273cc608dea653b72b894aceba315fe} 2025/04/30 10:33:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:40 server -> Sending packet 8 (1053 bytes) for connection cf299a5a740f97f7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:40 server -> Sending packet 9 (1053 bytes) for connection cf299a5a740f97f7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:40 server -> Sending packet 10 (1366 bytes) for connection cf299a5a740f97f7, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a6239493c669b2dd, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.PingFrame{} 2025/04/30 10:33:40 server <- Reading packet 2 (35 bytes) for connection f9e77b23, 1-RTT 2025/04/30 10:33:40 server Short Header{DestConnectionID: f9e77b23, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:40 Replacing connection for connection IDs [f9e77b23 6a8cceef] with a closed connection. 2025/04/30 10:33:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:40 server Connection cf299a5a740f97f7 closed. 2025/04/30 10:33:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 10:33:40 server -> Sending packet 12 (283 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bbd737ec, StatelessResetToken: 0x013eae0e22f24bca66e922f893271d93} 2025/04/30 10:33:40 server -> &wire.NewTokenFrame{Token: 0x6f2cf0c30dd3845af3e24e9f4f47927fade876c29f2e2d3881d625dae52b432fe98afd40bba40440cec10ff39ce28350437badae2a6595666c0c7e5239ff2bc8ccb8697f87462ba71779abce9e2fb87cdc0a545fd9d8} 2025/04/30 10:33:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:40 server Skipping packet number 11 2025/04/30 10:33:40 server -> Sending packet 13 (1053 bytes) for connection 34d8c8716e03b761, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:40 server Short Header{DestConnectionID: a20903638dc0ab3d, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:40 server <- Reading packet 6 (33 bytes) for connection 86a4388b, 1-RTT 2025/04/30 10:33:40 server Short Header{DestConnectionID: 86a4388b, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:40 Replacing connection for connection IDs [86a4388b bbd737ec] with a closed connection. 2025/04/30 10:33:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:40 server Connection 34d8c8716e03b761 closed. 2025/04/30 10:33:40 Removing connection IDs [292cb3c7 f9630d70] for a closed connection after it has been retired. 2025/04/30 10:33:40 server <- Received Initial packet. 2025/04/30 10:33:40 Created qlog file: /logs/qlog/5c86ae7df0ad6f2e.sqlog 2025/04/30 10:33:40 server Changing connection ID to baf9fddf. 2025/04/30 10:33:40 Adding connection IDs 5c86ae7df0ad6f2e and baf9fddf for a new connection. 2025/04/30 10:33:40 server <- Reading packet 1 (1200 bytes) for connection 5c86ae7df0ad6f2e, Initial 2025/04/30 10:33:40 server Long Header{Type: Initial, DestConnectionID: 5c86ae7df0ad6f2e, SrcConnectionID: 7108b55f2da53ee9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7108b55f2da53ee9, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:40 Adding connection ID cc4a2021. 2025/04/30 10:33:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5c86ae7df0ad6f2e 2025/04/30 10:33:40 server Long Header{Type: Initial, DestConnectionID: 7108b55f2da53ee9, SrcConnectionID: baf9fddf, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 465, Version: v1} 2025/04/30 10:33:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:40 server Long Header{Type: Handshake, DestConnectionID: 7108b55f2da53ee9, SrcConnectionID: baf9fddf, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:33:40 server Short Header{DestConnectionID: 7108b55f2da53ee9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc4a2021, StatelessResetToken: 0x5dcf33fc59cbc6065ae6f3bc0e79f639} 2025/04/30 10:33:40 Removing connection ID 01df0d1816418d17 after it has been retired. 2025/04/30 10:33:40 Removing connection IDs [d33d3023 9a17bde9] for a closed connection after it has been retired. 2025/04/30 10:33:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:40 server -> Sending packet 1 (1280 bytes) for connection 5c86ae7df0ad6f2e, Initial 2025/04/30 10:33:40 server Long Header{Type: Initial, DestConnectionID: 7108b55f2da53ee9, SrcConnectionID: baf9fddf, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:40 server -> Sending packet 2 (1280 bytes) for connection 5c86ae7df0ad6f2e, Initial 2025/04/30 10:33:40 server Long Header{Type: Initial, DestConnectionID: 7108b55f2da53ee9, SrcConnectionID: baf9fddf, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:40 server Canceling loss detection timer. 2025/04/30 10:33:40 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 10:33:40 server <- Reading packet 2 (1201 bytes) for connection baf9fddf, Initial 2025/04/30 10:33:40 server Long Header{Type: Initial, DestConnectionID: baf9fddf, SrcConnectionID: 7108b55f2da53ee9, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:41 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:41 server -> Sending packet 1 (742 bytes) for connection 5c86ae7df0ad6f2e, Handshake 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: 7108b55f2da53ee9, SrcConnectionID: baf9fddf, PacketNumber: 1, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:33:41 server -> Sending packet 2 (742 bytes) for connection 5c86ae7df0ad6f2e, Handshake 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: 7108b55f2da53ee9, SrcConnectionID: baf9fddf, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:33:41 server <- Reading packet 0 (40 bytes) for connection baf9fddf, Handshake 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: baf9fddf, SrcConnectionID: 7108b55f2da53ee9, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:41 server Dropping Initial keys. 2025/04/30 10:33:41 server <- &wire.PingFrame{} 2025/04/30 10:33:41 server -> Sending packet 3 (44 bytes) for connection 5c86ae7df0ad6f2e, Handshake 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: 7108b55f2da53ee9, SrcConnectionID: baf9fddf, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:41 server <- Reading packet 1 (76 bytes) for connection baf9fddf, Handshake 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: baf9fddf, SrcConnectionID: 7108b55f2da53ee9, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 Retiring connection ID 5c86ae7df0ad6f2e in 5s. 2025/04/30 10:33:41 server Dropping Handshake keys. 2025/04/30 10:33:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:41 server -> Sending packet 2 (280 bytes) for connection 5c86ae7df0ad6f2e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 7108b55f2da53ee9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:41 server -> &wire.NewTokenFrame{Token: 0xf647065b6eace1c9584adb900979240ac95acf71f73e495808c56d4313bbf14e24ed93f51e4a0ba089cd1e89c2dd58c0cb741aa33b880e0cd70b6103826f97e4c89439067834d8e31f6139cea4f11d39adb3df71dbd0} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc4a2021, StatelessResetToken: 0x5dcf33fc59cbc6065ae6f3bc0e79f639} 2025/04/30 10:33:41 server -> Sending packet 3 (280 bytes) for connection 5c86ae7df0ad6f2e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 7108b55f2da53ee9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:41 server -> &wire.NewTokenFrame{Token: 0xf647065b6eace1c9584adb900979240ac95acf71f73e495808c56d4313bbf14e24ed93f51e4a0ba089cd1e89c2dd58c0cb741aa33b880e0cd70b6103826f97e4c89439067834d8e31f6139cea4f11d39adb3df71dbd0} 2025/04/30 10:33:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc4a2021, StatelessResetToken: 0x5dcf33fc59cbc6065ae6f3bc0e79f639} 2025/04/30 10:33:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:41 server -> Sending packet 4 (1366 bytes) for connection 5c86ae7df0ad6f2e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 7108b55f2da53ee9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.PingFrame{} 2025/04/30 10:33:41 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 10:33:41 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:41 server <- Reading packet 0 (43 bytes) for connection baf9fddf, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: baf9fddf, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:41 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:41 server -> Sending packet 5 (32 bytes) for connection 5c86ae7df0ad6f2e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 7108b55f2da53ee9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.15µs} 2025/04/30 10:33:41 Received request: GET /caowcvkixa 2025/04/30 10:33:41 server -> Sending packet 6 (1053 bytes) for connection 5c86ae7df0ad6f2e, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 7108b55f2da53ee9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:41 Removing connection ID eee4fec62fa98935 after it has been retired. 2025/04/30 10:33:41 server <- Reading packet 1 (27 bytes) for connection baf9fddf, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: baf9fddf, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:33:41 server newly acked packets (2): [3 4] 2025/04/30 10:33:41 server updated RTT: 32.667412ms (σ: 16.333706ms) 2025/04/30 10:33:41 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:41 server <- Reading packet 2 (33 bytes) for connection baf9fddf, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: baf9fddf, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:41 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:41 Replacing connection for connection IDs [baf9fddf cc4a2021] with a closed connection. 2025/04/30 10:33:41 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:41 server Connection 5c86ae7df0ad6f2e closed. 2025/04/30 10:33:41 server <- Received Initial packet. 2025/04/30 10:33:41 Created qlog file: /logs/qlog/8b7e6deaca7d08f3.sqlog 2025/04/30 10:33:41 server Changing connection ID to 6e9689c4. 2025/04/30 10:33:41 Adding connection IDs 8b7e6deaca7d08f3 and 6e9689c4 for a new connection. 2025/04/30 10:33:41 server <- Reading packet 0 (1200 bytes) for connection 8b7e6deaca7d08f3, Initial 2025/04/30 10:33:41 server Long Header{Type: Initial, DestConnectionID: 8b7e6deaca7d08f3, SrcConnectionID: 8b94387f0bacc44e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8b94387f0bacc44e, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:41 Adding connection ID 8c74307f. 2025/04/30 10:33:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8b7e6deaca7d08f3 2025/04/30 10:33:41 server Long Header{Type: Initial, DestConnectionID: 8b94387f0bacc44e, SrcConnectionID: 6e9689c4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 457, Version: v1} 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: 8b94387f0bacc44e, SrcConnectionID: 6e9689c4, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c74307f, StatelessResetToken: 0xfd2a865bf69e8596eb5b1d1f8ff03371} 2025/04/30 10:33:41 Tracking 31 connection IDs and 0 reset tokens. 2025/04/30 10:33:41 server <- Reading packet 0 (76 bytes) for connection 6e9689c4, Handshake 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: 6e9689c4, SrcConnectionID: 8b94387f0bacc44e, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:41 server Dropping Initial keys. 2025/04/30 10:33:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 Retiring connection ID 8b7e6deaca7d08f3 in 5s. 2025/04/30 10:33:41 server Dropping Handshake keys. 2025/04/30 10:33:41 server -> Sending packet 1 (1366 bytes) for connection 8b7e6deaca7d08f3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.PingFrame{} 2025/04/30 10:33:41 server -> Sending packet 2 (256 bytes) for connection 8b7e6deaca7d08f3, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:41 server -> &wire.NewTokenFrame{Token: 0x94a92c5c49b0415a4d83852b9ac5eb8c6ded60c3c8ce547d773bda1b6c52e2533ca7c694abb61d637f44a0a73e4bba5e4801d274c2999d0d88d01316acdde6671f44f12edd2dc142ebed07d08ab97e6eab66dea9af63} 2025/04/30 10:33:41 server <- Reading packet 1 (28 bytes) for connection 6e9689c4, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: 6e9689c4, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:41 server newly acked packets (2): [0 1] 2025/04/30 10:33:41 server updated RTT: 51.504288ms (σ: 25.752144ms) 2025/04/30 10:33:41 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:41 server -> Sending packet 4 (256 bytes) for connection 8b7e6deaca7d08f3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:41 server -> &wire.NewTokenFrame{Token: 0x94a92c5c49b0415a4d83852b9ac5eb8c6ded60c3c8ce547d773bda1b6c52e2533ca7c694abb61d637f44a0a73e4bba5e4801d274c2999d0d88d01316acdde6671f44f12edd2dc142ebed07d08ab97e6eab66dea9af63} 2025/04/30 10:33:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:41 server -> Sending packet 5 (256 bytes) for connection 8b7e6deaca7d08f3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:41 server -> &wire.NewTokenFrame{Token: 0x94a92c5c49b0415a4d83852b9ac5eb8c6ded60c3c8ce547d773bda1b6c52e2533ca7c694abb61d637f44a0a73e4bba5e4801d274c2999d0d88d01316acdde6671f44f12edd2dc142ebed07d08ab97e6eab66dea9af63} 2025/04/30 10:33:41 server <- Reading packet 2 (43 bytes) for connection 6e9689c4, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: 6e9689c4, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:41 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:41 server -> Sending packet 6 (32 bytes) for connection 8b7e6deaca7d08f3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 Received request: GET /wyscpalrao 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 117.218µs} 2025/04/30 10:33:41 server <- Reading packet 3 (29 bytes) for connection 6e9689c4, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: 6e9689c4, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:33:41 server newly acked packets (1): [5] 2025/04/30 10:33:41 server updated RTT: 49.12ms (σ: 24.08ms) 2025/04/30 10:33:41 server Canceling loss detection timer. 2025/04/30 10:33:41 server -> Sending packet 7 (1053 bytes) for connection 8b7e6deaca7d08f3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:41 Removing connection IDs [fb5b14e3 955eed95] for a closed connection after it has been retired. 2025/04/30 10:33:41 server <- Reading packet 4 (48 bytes) for connection 6e9689c4, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: 6e9689c4, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:41 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/04/30 10:33:41 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:41 server <- Received Initial packet. 2025/04/30 10:33:41 Created qlog file: /logs/qlog/58b8c8d8643d6948.sqlog 2025/04/30 10:33:41 server Changing connection ID to bebcefe0. 2025/04/30 10:33:41 Adding connection IDs 58b8c8d8643d6948 and bebcefe0 for a new connection. 2025/04/30 10:33:41 server <- Reading packet 0 (1200 bytes) for connection 58b8c8d8643d6948, Initial 2025/04/30 10:33:41 server Long Header{Type: Initial, DestConnectionID: 58b8c8d8643d6948, SrcConnectionID: 85ace7e9c7de6be8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 85ace7e9c7de6be8, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:41 Adding connection ID b624db60. 2025/04/30 10:33:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 58b8c8d8643d6948 2025/04/30 10:33:41 server Long Header{Type: Initial, DestConnectionID: 85ace7e9c7de6be8, SrcConnectionID: bebcefe0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 453, Version: v1} 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: 85ace7e9c7de6be8, SrcConnectionID: bebcefe0, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b624db60, StatelessResetToken: 0x25e674b84128cb6f1a54788ab4878e0e} 2025/04/30 10:33:41 Removing connection ID d7d3e3c07c07052a after it has been retired. 2025/04/30 10:33:41 server -> Sending packet 8 (1409 bytes) for connection 8b7e6deaca7d08f3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.PingFrame{} 2025/04/30 10:33:41 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:41 server -> Sending packet 9 (33 bytes) for connection 8b7e6deaca7d08f3, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 8b94387f0bacc44e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 25.255184ms} 2025/04/30 10:33:41 server <- Reading packet 1 (1201 bytes) for connection bebcefe0, Initial 2025/04/30 10:33:41 server Long Header{Type: Initial, DestConnectionID: bebcefe0, SrcConnectionID: 85ace7e9c7de6be8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:41 server newly acked packets (1): [0] 2025/04/30 10:33:41 server updated RTT: 35.785456ms (σ: 17.892728ms) 2025/04/30 10:33:41 server <- Reading packet 0 (76 bytes) for connection bebcefe0, Handshake 2025/04/30 10:33:41 server Long Header{Type: Handshake, DestConnectionID: bebcefe0, SrcConnectionID: 85ace7e9c7de6be8, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:41 server Dropping Initial keys. 2025/04/30 10:33:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:41 Retiring connection ID 58b8c8d8643d6948 in 5s. 2025/04/30 10:33:41 server Dropping Handshake keys. 2025/04/30 10:33:41 server -> Sending packet 1 (259 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:41 server -> &wire.NewTokenFrame{Token: 0x1a6d681c0137f135ce41f2e27e9dedc976b9dd7ee5f812a5e7025aac675d1ff6eb125e8560b4551d75e5bcd5ba713bbc331d90246db79533f1240798070cdfeaff8f108dc91dc054901f0a99358fa4ed7eab5cdb1a8c} 2025/04/30 10:33:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:41 server <- Reading packet 7 (31 bytes) for connection 6e9689c4, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: 6e9689c4, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:41 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:41 Replacing connection for connection IDs [6e9689c4 8c74307f] with a closed connection. 2025/04/30 10:33:41 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:41 server Connection 8b7e6deaca7d08f3 closed. 2025/04/30 10:33:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:41 server -> Sending packet 3 (51 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b624db60, StatelessResetToken: 0x25e674b84128cb6f1a54788ab4878e0e} 2025/04/30 10:33:41 server Skipping packet number 2 2025/04/30 10:33:41 server -> Sending packet 4 (259 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:41 server -> &wire.NewTokenFrame{Token: 0x1a6d681c0137f135ce41f2e27e9dedc976b9dd7ee5f812a5e7025aac675d1ff6eb125e8560b4551d75e5bcd5ba713bbc331d90246db79533f1240798070cdfeaff8f108dc91dc054901f0a99358fa4ed7eab5cdb1a8c} 2025/04/30 10:33:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:41 Removing connection IDs [44f3ad82 9044b5a1] for a closed connection after it has been retired. 2025/04/30 10:33:41 server <- Reading packet 3 (29 bytes) for connection bebcefe0, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: bebcefe0, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:33:41 server newly acked packets (2): [3 4] 2025/04/30 10:33:41 server updated RTT: 35.254ms (σ: 14.48ms) 2025/04/30 10:33:41 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:41 server Canceling loss detection timer. 2025/04/30 10:33:41 Removing connection ID a070235d655b24f8 after it has been retired. 2025/04/30 10:33:41 server <- Reading packet 4 (43 bytes) for connection bebcefe0, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: bebcefe0, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:41 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:41 server -> Sending packet 5 (1366 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.PingFrame{} 2025/04/30 10:33:41 server -> Sending packet 6 (32 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 Received request: GET /nlblfjstfy 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 184.143µs} 2025/04/30 10:33:41 server -> Sending packet 7 (1053 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:41 server <- Reading packet 5 (43 bytes) for connection bebcefe0, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: bebcefe0, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:41 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:41 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:41 server -> Sending packet 8 (33 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 25.24ms} 2025/04/30 10:33:41 server <- Reading packet 6 (48 bytes) for connection bebcefe0, 1-RTT 2025/04/30 10:33:41 server Short Header{DestConnectionID: bebcefe0, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:41 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/04/30 10:33:41 server newly acked packets (1): [5] 2025/04/30 10:33:41 server updated RTT: 34.958ms (σ: 11.451ms) 2025/04/30 10:33:41 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:41 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:41 server -> Sending packet 9 (33 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 25.32601ms} 2025/04/30 10:33:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:41 server -> Sending packet 11 (1053 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:41 server -> Sending packet 12 (1053 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:41 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:41 Removing connection IDs [ea265cbb 74a7c129] for a closed connection after it has been retired. 2025/04/30 10:33:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:42 server -> Sending packet 14 (1053 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:42 server -> Sending packet 15 (1053 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:42 server -> Sending packet 16 (1409 bytes) for connection 58b8c8d8643d6948, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 85ace7e9c7de6be8, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.PingFrame{} 2025/04/30 10:33:42 server <- Received Initial packet. 2025/04/30 10:33:42 Created qlog file: /logs/qlog/f40e459a88eceba5.sqlog 2025/04/30 10:33:42 server Changing connection ID to bd5fda6e. 2025/04/30 10:33:42 Adding connection IDs f40e459a88eceba5 and bd5fda6e for a new connection. 2025/04/30 10:33:42 server <- Reading packet 1 (1200 bytes) for connection f40e459a88eceba5, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: f40e459a88eceba5, SrcConnectionID: 20a9a969b3b2bf09, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 20a9a969b3b2bf09, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:42 Adding connection ID 4aa6d457. 2025/04/30 10:33:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f40e459a88eceba5 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: 20a9a969b3b2bf09, SrcConnectionID: bd5fda6e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 464, Version: v1} 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: 20a9a969b3b2bf09, SrcConnectionID: bd5fda6e, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 10:33:42 server Short Header{DestConnectionID: 20a9a969b3b2bf09, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4aa6d457, StatelessResetToken: 0xe5c11a6fb20cb45b9bc1250db6da3c23} 2025/04/30 10:33:42 server <- Reading packet 8 (35 bytes) for connection bebcefe0, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: bebcefe0, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:42 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:42 Replacing connection for connection IDs [bebcefe0 b624db60] with a closed connection. 2025/04/30 10:33:42 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:42 server Connection 58b8c8d8643d6948 closed. 2025/04/30 10:33:42 server <- Reading packet 2 (1200 bytes) for connection bd5fda6e, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: bd5fda6e, SrcConnectionID: 20a9a969b3b2bf09, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:42 server -> Sending packet 1 (45 bytes) for connection f40e459a88eceba5, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: 20a9a969b3b2bf09, SrcConnectionID: bd5fda6e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:42 server <- Reading packet 3 (1201 bytes) for connection bd5fda6e, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: bd5fda6e, SrcConnectionID: 20a9a969b3b2bf09, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (1): [0] 2025/04/30 10:33:42 server updated RTT: 35.39078ms (σ: 17.69539ms) 2025/04/30 10:33:42 server <- Reading packet 1 (42 bytes) for connection bd5fda6e, Handshake 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: bd5fda6e, SrcConnectionID: 20a9a969b3b2bf09, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:42 server Dropping Initial keys. 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (1): [0] 2025/04/30 10:33:42 server updated RTT: 35.596ms (σ: 13.683ms) 2025/04/30 10:33:42 server Canceling loss detection timer. 2025/04/30 10:33:42 server Queueing packet (48 bytes) for later decryption 2025/04/30 10:33:42 server <- Reading packet 2 (76 bytes) for connection bd5fda6e, Handshake 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: bd5fda6e, SrcConnectionID: 20a9a969b3b2bf09, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 Retiring connection ID f40e459a88eceba5 in 5s. 2025/04/30 10:33:42 server Dropping Handshake keys. 2025/04/30 10:33:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:42 server -> Sending packet 2 (283 bytes) for connection f40e459a88eceba5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 20a9a969b3b2bf09, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4aa6d457, StatelessResetToken: 0xe5c11a6fb20cb45b9bc1250db6da3c23} 2025/04/30 10:33:42 server -> &wire.NewTokenFrame{Token: 0xe04259f28952bcd6cc96da974fa4d841413c8791b90f352c0dd352053804a215194d12db0b28d38f10b7746a0d433153956a5ec3c945d51869081d79fe8edc44f635696ac96a4491b9237b6462db03251c25b1d29f9f} 2025/04/30 10:33:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:42 server -> Sending packet 3 (283 bytes) for connection f40e459a88eceba5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 20a9a969b3b2bf09, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4aa6d457, StatelessResetToken: 0xe5c11a6fb20cb45b9bc1250db6da3c23} 2025/04/30 10:33:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:42 server -> &wire.NewTokenFrame{Token: 0xe04259f28952bcd6cc96da974fa4d841413c8791b90f352c0dd352053804a215194d12db0b28d38f10b7746a0d433153956a5ec3c945d51869081d79fe8edc44f635696ac96a4491b9237b6462db03251c25b1d29f9f} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:42 server <- Reading packet 0 (48 bytes) for connection bd5fda6e, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: bd5fda6e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:42 server -> Sending packet 4 (33 bytes) for connection f40e459a88eceba5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 20a9a969b3b2bf09, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.301608ms} 2025/04/30 10:33:42 Received request: GET /jpyqnwnhww 2025/04/30 10:33:42 server -> Sending packet 5 (1053 bytes) for connection f40e459a88eceba5, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 20a9a969b3b2bf09, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:42 server <- Reading packet 2 (27 bytes) for connection bd5fda6e, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: bd5fda6e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (2): [3 5] 2025/04/30 10:33:42 server updated RTT: 35.202ms (σ: 11.05ms) 2025/04/30 10:33:42 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:42 server Canceling loss detection timer. 2025/04/30 10:33:42 server -> Sending packet 6 (30 bytes) for connection f40e459a88eceba5, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 20a9a969b3b2bf09, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:33:42 server <- Reading packet 3 (31 bytes) for connection bd5fda6e, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: bd5fda6e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:42 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:42 Replacing connection for connection IDs [bd5fda6e 4aa6d457] with a closed connection. 2025/04/30 10:33:42 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:42 server Connection f40e459a88eceba5 closed. 2025/04/30 10:33:42 server <- Received Initial packet. 2025/04/30 10:33:42 Created qlog file: /logs/qlog/2332fdca433c5df2.sqlog 2025/04/30 10:33:42 server Changing connection ID to e379cf26. 2025/04/30 10:33:42 Adding connection IDs 2332fdca433c5df2 and e379cf26 for a new connection. 2025/04/30 10:33:42 server <- Reading packet 0 (1200 bytes) for connection 2332fdca433c5df2, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: 2332fdca433c5df2, SrcConnectionID: 2d820de0da3b58a1, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2d820de0da3b58a1, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:42 Adding connection ID adf04401. 2025/04/30 10:33:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2332fdca433c5df2 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: 2d820de0da3b58a1, SrcConnectionID: e379cf26, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: 2d820de0da3b58a1, SrcConnectionID: e379cf26, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:42 server Short Header{DestConnectionID: 2d820de0da3b58a1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: adf04401, StatelessResetToken: 0xdb8c0a51c9b4fbb3a7172ae256f53ad8} 2025/04/30 10:33:42 server <- Reading packet 1 (1201 bytes) for connection e379cf26, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: e379cf26, SrcConnectionID: 2d820de0da3b58a1, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (1): [0] 2025/04/30 10:33:42 server updated RTT: 36.490897ms (σ: 18.245448ms) 2025/04/30 10:33:42 server <- Reading packet 0 (76 bytes) for connection e379cf26, Handshake 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: e379cf26, SrcConnectionID: 2d820de0da3b58a1, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:42 server Dropping Initial keys. 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 Retiring connection ID 2332fdca433c5df2 in 5s. 2025/04/30 10:33:42 server Dropping Handshake keys. 2025/04/30 10:33:42 server -> Sending packet 1 (259 bytes) for connection 2332fdca433c5df2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 2d820de0da3b58a1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.NewTokenFrame{Token: 0xc5683b6e19abf722dfa90fa8111fa5b5c02035b1bacf0dca596828b8fa83a775ad44751af57f2f4ec479767c90a40e64ee2ee6eb5ea16c7a8a70744ee8e7abdb042a19d7d738f7260704fcc37344220bdf0d18f027fa} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:42 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:42 server <- Reading packet 0 (48 bytes) for connection e379cf26, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: e379cf26, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (1): [0] 2025/04/30 10:33:42 server updated RTT: 36.73ms (σ: 14.165ms) 2025/04/30 10:33:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:42 server -> Sending packet 2 (32 bytes) for connection 2332fdca433c5df2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 2d820de0da3b58a1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 Received request: GET /mpzctogkwk 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 89.767µs} 2025/04/30 10:33:42 server -> Sending packet 3 (1053 bytes) for connection 2332fdca433c5df2, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 2d820de0da3b58a1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:42 server <- Reading packet 1 (27 bytes) for connection e379cf26, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: e379cf26, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (2): [1 3] 2025/04/30 10:33:42 server updated RTT: 36.126ms (σ: 11.829ms) 2025/04/30 10:33:42 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:42 server Canceling loss detection timer. 2025/04/30 10:33:42 server -> Sending packet 4 (30 bytes) for connection 2332fdca433c5df2, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 2d820de0da3b58a1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:33:42 server <- Reading packet 2 (31 bytes) for connection e379cf26, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: e379cf26, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:42 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:42 Replacing connection for connection IDs [e379cf26 adf04401] with a closed connection. 2025/04/30 10:33:42 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:42 server Connection 2332fdca433c5df2 closed. 2025/04/30 10:33:42 server <- Received Initial packet. 2025/04/30 10:33:42 Created qlog file: /logs/qlog/6212e78a67e22b97.sqlog 2025/04/30 10:33:42 server Changing connection ID to b0d4e185. 2025/04/30 10:33:42 Adding connection IDs 6212e78a67e22b97 and b0d4e185 for a new connection. 2025/04/30 10:33:42 server <- Reading packet 0 (1200 bytes) for connection 6212e78a67e22b97, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: 6212e78a67e22b97, SrcConnectionID: 69eb77a16e9f5cc6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 69eb77a16e9f5cc6, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:42 Adding connection ID 1cd8a508. 2025/04/30 10:33:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6212e78a67e22b97 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: 69eb77a16e9f5cc6, SrcConnectionID: b0d4e185, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 458, Version: v1} 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: 69eb77a16e9f5cc6, SrcConnectionID: b0d4e185, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1cd8a508, StatelessResetToken: 0xc07a14dbd5d9e903fa4988cec1717038} 2025/04/30 10:33:42 server <- Reading packet 1 (1201 bytes) for connection b0d4e185, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: b0d4e185, SrcConnectionID: 69eb77a16e9f5cc6, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (1): [0] 2025/04/30 10:33:42 server updated RTT: 35.211332ms (σ: 17.605666ms) 2025/04/30 10:33:42 server <- Reading packet 0 (76 bytes) for connection b0d4e185, Handshake 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: b0d4e185, SrcConnectionID: 69eb77a16e9f5cc6, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:42 server Dropping Initial keys. 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 Retiring connection ID 6212e78a67e22b97 in 5s. 2025/04/30 10:33:42 server Dropping Handshake keys. 2025/04/30 10:33:42 server -> Sending packet 1 (259 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:42 server -> &wire.NewTokenFrame{Token: 0xe0ec46f6cec2fb51b181464d2912416590edc79ece1ad76c981390e956a8244b02072e732a84bc6737d8ad6191bae6fe771aa2bcb8f482ed0632cf21dab7e92b142b5d6e370761c52b154634bf31ab890549c70e0664} 2025/04/30 10:33:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:42 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:42 server -> Sending packet 3 (51 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1cd8a508, StatelessResetToken: 0xc07a14dbd5d9e903fa4988cec1717038} 2025/04/30 10:33:42 server Skipping packet number 2 2025/04/30 10:33:42 server -> Sending packet 4 (259 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.NewTokenFrame{Token: 0xe0ec46f6cec2fb51b181464d2912416590edc79ece1ad76c981390e956a8244b02072e732a84bc6737d8ad6191bae6fe771aa2bcb8f482ed0632cf21dab7e92b142b5d6e370761c52b154634bf31ab890549c70e0664} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:42 server <- Reading packet 3 (29 bytes) for connection b0d4e185, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: b0d4e185, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (2): [3 4] 2025/04/30 10:33:42 server updated RTT: 34.792ms (σ: 14.04ms) 2025/04/30 10:33:42 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:42 server Canceling loss detection timer. 2025/04/30 10:33:42 Removing connection ID 6ba4af038d453f1e after it has been retired. 2025/04/30 10:33:42 server <- Reading packet 4 (43 bytes) for connection b0d4e185, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: b0d4e185, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:42 server -> Sending packet 5 (1366 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.PingFrame{} 2025/04/30 10:33:42 server -> Sending packet 6 (32 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 158.996µs} 2025/04/30 10:33:42 Received request: GET /vfhvfdtfqu 2025/04/30 10:33:42 server -> Sending packet 7 (1053 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:42 server <- Reading packet 5 (43 bytes) for connection b0d4e185, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: b0d4e185, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:42 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:42 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:42 server -> Sending packet 8 (33 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 25.252768ms} 2025/04/30 10:33:42 server <- Received Initial packet. 2025/04/30 10:33:42 Created qlog file: /logs/qlog/fd3455a1839df65d.sqlog 2025/04/30 10:33:42 server Changing connection ID to 7356a04c. 2025/04/30 10:33:42 Adding connection IDs fd3455a1839df65d and 7356a04c for a new connection. 2025/04/30 10:33:42 server <- Reading packet 0 (1200 bytes) for connection fd3455a1839df65d, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: fd3455a1839df65d, SrcConnectionID: a3ecc0469da30a24, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a3ecc0469da30a24, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:42 Adding connection ID 70b60c35. 2025/04/30 10:33:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fd3455a1839df65d 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: a3ecc0469da30a24, SrcConnectionID: 7356a04c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 453, Version: v1} 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: a3ecc0469da30a24, SrcConnectionID: 7356a04c, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 10:33:42 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 70b60c35, StatelessResetToken: 0xde40d40d13bec8dd223aadcdf17d6551} 2025/04/30 10:33:42 server <- Reading packet 1 (1201 bytes) for connection 7356a04c, Initial 2025/04/30 10:33:42 server Long Header{Type: Initial, DestConnectionID: 7356a04c, SrcConnectionID: a3ecc0469da30a24, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (1): [0] 2025/04/30 10:33:42 server updated RTT: 35.102619ms (σ: 17.551309ms) 2025/04/30 10:33:42 server <- Reading packet 0 (76 bytes) for connection 7356a04c, Handshake 2025/04/30 10:33:42 server Long Header{Type: Handshake, DestConnectionID: 7356a04c, SrcConnectionID: a3ecc0469da30a24, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:42 server Dropping Initial keys. 2025/04/30 10:33:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:42 Retiring connection ID fd3455a1839df65d in 5s. 2025/04/30 10:33:42 server Dropping Handshake keys. 2025/04/30 10:33:42 server -> Sending packet 1 (259 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:42 server -> &wire.NewTokenFrame{Token: 0x6b9fb41d62c3672cec3c5bdb022ecdecb1b169e44748bbf6f20e29fd0a8b0c57dee6035e48bbb4781b2af127ed537ff5adc2354a282dd390b6eda77f5aa50bed69c018a62080e95ef293b43ac0761892ad6c9e5ec467} 2025/04/30 10:33:42 server <- Reading packet 0 (48 bytes) for connection 7356a04c, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: 7356a04c, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:42 server newly acked packets (1): [0] 2025/04/30 10:33:42 server updated RTT: 35.348ms (σ: 13.656ms) 2025/04/30 10:33:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:42 server -> Sending packet 2 (32 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 Received request: GET /hlkwufbodt 2025/04/30 10:33:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 94.095µs} 2025/04/30 10:33:42 server -> Sending packet 3 (1053 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:42 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:42 server -> Sending packet 10 (1053 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:42 server -> Sending packet 11 (1053 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:42 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:42 server <- Reading packet 1 (28 bytes) for connection 7356a04c, 1-RTT 2025/04/30 10:33:42 server Short Header{DestConnectionID: 7356a04c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:42 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:42 server newly acked packets (1): [1] 2025/04/30 10:33:42 server updated RTT: 37.259ms (σ: 14.065ms) 2025/04/30 10:33:42 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:42 Removing connection IDs [257a315c 461d592c] for a closed connection after it has been retired. 2025/04/30 10:33:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:43 server -> Sending packet 5 (1053 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:43 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:43 server -> Sending packet 6 (1053 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:43 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:43 server <- Reading packet 2 (43 bytes) for connection 7356a04c, 1-RTT 2025/04/30 10:33:43 server Short Header{DestConnectionID: 7356a04c, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:43 server Sending ACK because the ACK timer expired. 2025/04/30 10:33:43 server -> Sending packet 7 (33 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:43 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.253452ms} 2025/04/30 10:33:43 Tracking 35 connection IDs and 0 reset tokens. 2025/04/30 10:33:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:43 server -> Sending packet 13 (1053 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:43 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:43 server -> Sending packet 14 (1053 bytes) for connection 6212e78a67e22b97, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:43 server Short Header{DestConnectionID: 69eb77a16e9f5cc6, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:43 server <- Reading packet 9 (35 bytes) for connection b0d4e185, 1-RTT 2025/04/30 10:33:43 server Short Header{DestConnectionID: b0d4e185, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:43 Replacing connection for connection IDs [b0d4e185 1cd8a508] with a closed connection. 2025/04/30 10:33:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:43 server Connection 6212e78a67e22b97 closed. 2025/04/30 10:33:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 10:33:43 server -> Sending packet 9 (1053 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:43 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:43 server -> Sending packet 10 (1053 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:43 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:43 server -> Sending packet 11 (1366 bytes) for connection fd3455a1839df65d, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:43 server Short Header{DestConnectionID: a3ecc0469da30a24, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.PingFrame{} 2025/04/30 10:33:43 server <- Reading packet 3 (33 bytes) for connection 7356a04c, 1-RTT 2025/04/30 10:33:43 server Short Header{DestConnectionID: 7356a04c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:43 Replacing connection for connection IDs [7356a04c 70b60c35] with a closed connection. 2025/04/30 10:33:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:43 server Connection fd3455a1839df65d closed. 2025/04/30 10:33:43 server <- Received Initial packet. 2025/04/30 10:33:43 Created qlog file: /logs/qlog/14ac0d6ee8fbf4b1.sqlog 2025/04/30 10:33:43 server Changing connection ID to 7d16a3ae. 2025/04/30 10:33:43 Adding connection IDs 14ac0d6ee8fbf4b1 and 7d16a3ae for a new connection. 2025/04/30 10:33:43 server <- Reading packet 0 (1200 bytes) for connection 14ac0d6ee8fbf4b1, Initial 2025/04/30 10:33:43 server Long Header{Type: Initial, DestConnectionID: 14ac0d6ee8fbf4b1, SrcConnectionID: 01fbe7b29f92e966, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 01fbe7b29f92e966, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:43 Adding connection ID c8b57015. 2025/04/30 10:33:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 14ac0d6ee8fbf4b1 2025/04/30 10:33:43 server Long Header{Type: Initial, DestConnectionID: 01fbe7b29f92e966, SrcConnectionID: 7d16a3ae, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:43 server Long Header{Type: Handshake, DestConnectionID: 01fbe7b29f92e966, SrcConnectionID: 7d16a3ae, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:43 server Short Header{DestConnectionID: 01fbe7b29f92e966, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8b57015, StatelessResetToken: 0x6ff1a563d8b230322ff7ec83ab3c64e0} 2025/04/30 10:33:43 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:43 server -> Sending packet 1 (1280 bytes) for connection 14ac0d6ee8fbf4b1, Initial 2025/04/30 10:33:43 server Long Header{Type: Initial, DestConnectionID: 01fbe7b29f92e966, SrcConnectionID: 7d16a3ae, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:43 server -> Sending packet 2 (1280 bytes) for connection 14ac0d6ee8fbf4b1, Initial 2025/04/30 10:33:43 server Long Header{Type: Initial, DestConnectionID: 01fbe7b29f92e966, SrcConnectionID: 7d16a3ae, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:43 server Canceling loss detection timer. 2025/04/30 10:33:43 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 10:33:43 server <- Reading packet 2 (1201 bytes) for connection 7d16a3ae, Initial 2025/04/30 10:33:43 server Long Header{Type: Initial, DestConnectionID: 7d16a3ae, SrcConnectionID: 01fbe7b29f92e966, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:43 Removing connection ID 31bd711528b44177 after it has been retired. 2025/04/30 10:33:43 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:43 server -> Sending packet 1 (744 bytes) for connection 14ac0d6ee8fbf4b1, Handshake 2025/04/30 10:33:43 server Long Header{Type: Handshake, DestConnectionID: 01fbe7b29f92e966, SrcConnectionID: 7d16a3ae, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:43 server -> Sending packet 2 (744 bytes) for connection 14ac0d6ee8fbf4b1, Handshake 2025/04/30 10:33:43 server Long Header{Type: Handshake, DestConnectionID: 01fbe7b29f92e966, SrcConnectionID: 7d16a3ae, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:43 server <- Reading packet 0 (40 bytes) for connection 7d16a3ae, Handshake 2025/04/30 10:33:43 server Long Header{Type: Handshake, DestConnectionID: 7d16a3ae, SrcConnectionID: 01fbe7b29f92e966, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:43 server Dropping Initial keys. 2025/04/30 10:33:43 server <- &wire.PingFrame{} 2025/04/30 10:33:43 server -> Sending packet 3 (44 bytes) for connection 14ac0d6ee8fbf4b1, Handshake 2025/04/30 10:33:43 server Long Header{Type: Handshake, DestConnectionID: 01fbe7b29f92e966, SrcConnectionID: 7d16a3ae, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:43 server <- Reading packet 2 (42 bytes) for connection 7d16a3ae, Handshake 2025/04/30 10:33:43 server Long Header{Type: Handshake, DestConnectionID: 7d16a3ae, SrcConnectionID: 01fbe7b29f92e966, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:43 server <- Reading packet 3 (42 bytes) for connection 7d16a3ae, Handshake 2025/04/30 10:33:43 server Long Header{Type: Handshake, DestConnectionID: 7d16a3ae, SrcConnectionID: 01fbe7b29f92e966, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:43 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:43 server newly acked packets (1): [2] 2025/04/30 10:33:43 server updated RTT: 34.768682ms (σ: 17.384341ms) 2025/04/30 10:33:43 server Canceling loss detection timer. 2025/04/30 10:33:43 server Queueing packet (43 bytes) for later decryption 2025/04/30 10:33:43 Removing connection IDs [10595f7a 74540a15] for a closed connection after it has been retired. 2025/04/30 10:33:44 server <- Reading packet 4 (76 bytes) for connection 7d16a3ae, Handshake 2025/04/30 10:33:44 server Long Header{Type: Handshake, DestConnectionID: 7d16a3ae, SrcConnectionID: 01fbe7b29f92e966, PacketNumber: 4, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:44 Retiring connection ID 14ac0d6ee8fbf4b1 in 5s. 2025/04/30 10:33:44 server Dropping Handshake keys. 2025/04/30 10:33:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:44 server -> Sending packet 2 (283 bytes) for connection 14ac0d6ee8fbf4b1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:44 server Short Header{DestConnectionID: 01fbe7b29f92e966, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:44 server -> &wire.NewTokenFrame{Token: 0xcd814a22b65408104df9a3d450355c713e2752328ee34e2a0394a4b085ef4fd9d74f928c3457bff0ab78446fb64b4114574fe4a7f2e7ba43eb96ea6d71a8567e0f4a14b987358c4ca3bf3efc7907db9f51d9f511d50e} 2025/04/30 10:33:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8b57015, StatelessResetToken: 0x6ff1a563d8b230322ff7ec83ab3c64e0} 2025/04/30 10:33:44 server -> Sending packet 3 (283 bytes) for connection 14ac0d6ee8fbf4b1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:44 server Short Header{DestConnectionID: 01fbe7b29f92e966, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:44 server -> &wire.NewTokenFrame{Token: 0xcd814a22b65408104df9a3d450355c713e2752328ee34e2a0394a4b085ef4fd9d74f928c3457bff0ab78446fb64b4114574fe4a7f2e7ba43eb96ea6d71a8567e0f4a14b987358c4ca3bf3efc7907db9f51d9f511d50e} 2025/04/30 10:33:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8b57015, StatelessResetToken: 0x6ff1a563d8b230322ff7ec83ab3c64e0} 2025/04/30 10:33:44 server <- Reading packet 0 (43 bytes) for connection 7d16a3ae, 1-RTT 2025/04/30 10:33:44 server Short Header{DestConnectionID: 7d16a3ae, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:44 server -> Sending packet 4 (35 bytes) for connection 14ac0d6ee8fbf4b1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:44 server Short Header{DestConnectionID: 01fbe7b29f92e966, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400.144766ms} 2025/04/30 10:33:44 Received request: GET /hxubyivoxi 2025/04/30 10:33:44 server -> Sending packet 5 (1053 bytes) for connection 14ac0d6ee8fbf4b1, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:44 server Short Header{DestConnectionID: 01fbe7b29f92e966, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:44 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 10:33:44 server <- Reading packet 2 (27 bytes) for connection 7d16a3ae, 1-RTT 2025/04/30 10:33:44 server Short Header{DestConnectionID: 7d16a3ae, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:44 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:44 server newly acked packets (1): [3] 2025/04/30 10:33:44 server updated RTT: 34.479ms (σ: 13.614ms) 2025/04/30 10:33:44 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:44 server <- Reading packet 3 (31 bytes) for connection 7d16a3ae, 1-RTT 2025/04/30 10:33:44 server Short Header{DestConnectionID: 7d16a3ae, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:44 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:44 Replacing connection for connection IDs [7d16a3ae c8b57015] with a closed connection. 2025/04/30 10:33:44 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:44 server Connection 14ac0d6ee8fbf4b1 closed. 2025/04/30 10:33:44 server <- Received Initial packet. 2025/04/30 10:33:44 Created qlog file: /logs/qlog/cef60b8d9713ff5c.sqlog 2025/04/30 10:33:44 server Changing connection ID to ea5ada27. 2025/04/30 10:33:44 Adding connection IDs cef60b8d9713ff5c and ea5ada27 for a new connection. 2025/04/30 10:33:44 server <- Reading packet 0 (1200 bytes) for connection cef60b8d9713ff5c, Initial 2025/04/30 10:33:44 server Long Header{Type: Initial, DestConnectionID: cef60b8d9713ff5c, SrcConnectionID: e2394c4c1ee963fa, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e2394c4c1ee963fa, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:44 Adding connection ID 6bd1ea70. 2025/04/30 10:33:44 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cef60b8d9713ff5c 2025/04/30 10:33:44 server Long Header{Type: Initial, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 10:33:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:44 server Long Header{Type: Handshake, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:44 server Short Header{DestConnectionID: e2394c4c1ee963fa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bd1ea70, StatelessResetToken: 0x3f2657dc3c6c865778693ae045a36790} 2025/04/30 10:33:44 server <- Reading packet 1 (1200 bytes) for connection cef60b8d9713ff5c, Initial 2025/04/30 10:33:44 server Long Header{Type: Initial, DestConnectionID: cef60b8d9713ff5c, SrcConnectionID: e2394c4c1ee963fa, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:44 server -> Sending packet 1 (45 bytes) for connection cef60b8d9713ff5c, Initial 2025/04/30 10:33:44 server Long Header{Type: Initial, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:44 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:44 server -> Sending packet 2 (1280 bytes) for connection cef60b8d9713ff5c, Initial 2025/04/30 10:33:44 server Long Header{Type: Initial, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:44 server -> Sending packet 3 (1280 bytes) for connection cef60b8d9713ff5c, Initial 2025/04/30 10:33:44 server Long Header{Type: Initial, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:44 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 10:33:44 server -> Sending packet 1 (744 bytes) for connection cef60b8d9713ff5c, Handshake 2025/04/30 10:33:44 server Long Header{Type: Handshake, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:44 server -> Sending packet 2 (744 bytes) for connection cef60b8d9713ff5c, Handshake 2025/04/30 10:33:44 server Long Header{Type: Handshake, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:44 Removing connection ID 34d8c8716e03b761 after it has been retired. 2025/04/30 10:33:44 Removing connection ID 87668bdf57fcb191 after it has been retired. 2025/04/30 10:33:44 server <- Reading packet 2 (40 bytes) for connection ea5ada27, Handshake 2025/04/30 10:33:44 server Long Header{Type: Handshake, DestConnectionID: ea5ada27, SrcConnectionID: e2394c4c1ee963fa, PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:44 server Dropping Initial keys. 2025/04/30 10:33:44 server <- &wire.PingFrame{} 2025/04/30 10:33:44 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:44 server -> Sending packet 3 (749 bytes) for connection cef60b8d9713ff5c, Handshake 2025/04/30 10:33:44 server Long Header{Type: Handshake, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, PacketNumber: 3, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 10:33:44 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:44 server -> Sending packet 4 (744 bytes) for connection cef60b8d9713ff5c, Handshake 2025/04/30 10:33:44 server Long Header{Type: Handshake, DestConnectionID: e2394c4c1ee963fa, SrcConnectionID: ea5ada27, PacketNumber: 4, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 10:33:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 10:33:45 server <- Reading packet 3 (76 bytes) for connection ea5ada27, Handshake 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: ea5ada27, SrcConnectionID: e2394c4c1ee963fa, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 Retiring connection ID cef60b8d9713ff5c in 5s. 2025/04/30 10:33:45 server Dropping Handshake keys. 2025/04/30 10:33:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:45 server -> Sending packet 2 (280 bytes) for connection cef60b8d9713ff5c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: e2394c4c1ee963fa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:45 server -> &wire.NewTokenFrame{Token: 0xa9ac61937bf0129c6af2e4c7d768c5d660edc86a2b6e60e0bb20424efc877690ef58caa564269f356391e3c6f9e488bfdc2a8a406ae57c4cb32ee9149f3a32492cbea7a9bcc0daf3dc5f73809d27a9a4060f4663fe02} 2025/04/30 10:33:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bd1ea70, StatelessResetToken: 0x3f2657dc3c6c865778693ae045a36790} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:45 server -> Sending packet 3 (280 bytes) for connection cef60b8d9713ff5c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: e2394c4c1ee963fa, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.NewTokenFrame{Token: 0xa9ac61937bf0129c6af2e4c7d768c5d660edc86a2b6e60e0bb20424efc877690ef58caa564269f356391e3c6f9e488bfdc2a8a406ae57c4cb32ee9149f3a32492cbea7a9bcc0daf3dc5f73809d27a9a4060f4663fe02} 2025/04/30 10:33:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bd1ea70, StatelessResetToken: 0x3f2657dc3c6c865778693ae045a36790} 2025/04/30 10:33:45 server -> Sending packet 4 (1366 bytes) for connection cef60b8d9713ff5c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: e2394c4c1ee963fa, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.PingFrame{} 2025/04/30 10:33:45 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 10:33:45 server <- Reading packet 0 (43 bytes) for connection ea5ada27, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: ea5ada27, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:45 server -> Sending packet 5 (32 bytes) for connection cef60b8d9713ff5c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: e2394c4c1ee963fa, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 106.839µs} 2025/04/30 10:33:45 Received request: GET /jqxtrpoefs 2025/04/30 10:33:45 server -> Sending packet 6 (1053 bytes) for connection cef60b8d9713ff5c, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: e2394c4c1ee963fa, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:45 server <- Reading packet 1 (30 bytes) for connection ea5ada27, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: ea5ada27, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 1ms} 2025/04/30 10:33:45 server newly acked packets (1): [6] 2025/04/30 10:33:45 server updated RTT: 32.901345ms (σ: 16.450672ms) 2025/04/30 10:33:45 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:45 server lost packet 3 (reordering threshold) 2025/04/30 10:33:45 server setting loss timer for packet 4 (1-RTT) to 37.014013ms (in 2025-04-30 10:33:45.054571389 +0000 UTC m=+25.926190313) 2025/04/30 10:33:45 server Canceling loss detection timer. 2025/04/30 10:33:45 server -> Sending packet 7 (283 bytes) for connection cef60b8d9713ff5c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:45 server Short Header{DestConnectionID: e2394c4c1ee963fa, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.NewTokenFrame{Token: 0xa9ac61937bf0129c6af2e4c7d768c5d660edc86a2b6e60e0bb20424efc877690ef58caa564269f356391e3c6f9e488bfdc2a8a406ae57c4cb32ee9149f3a32492cbea7a9bcc0daf3dc5f73809d27a9a4060f4663fe02} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bd1ea70, StatelessResetToken: 0x3f2657dc3c6c865778693ae045a36790} 2025/04/30 10:33:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:33:45 server <- Reading packet 2 (33 bytes) for connection ea5ada27, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: ea5ada27, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:45 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:45 Replacing connection for connection IDs [ea5ada27 6bd1ea70] with a closed connection. 2025/04/30 10:33:45 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:45 server Connection cef60b8d9713ff5c closed. 2025/04/30 10:33:45 server <- Received Initial packet. 2025/04/30 10:33:45 Created qlog file: /logs/qlog/2454d8fe67d11329.sqlog 2025/04/30 10:33:45 server Changing connection ID to ea81120a. 2025/04/30 10:33:45 Adding connection IDs 2454d8fe67d11329 and ea81120a for a new connection. 2025/04/30 10:33:45 server <- Reading packet 0 (1200 bytes) for connection 2454d8fe67d11329, Initial 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 2454d8fe67d11329, SrcConnectionID: 120a4ff3554f92ac, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 120a4ff3554f92ac, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:45 Adding connection ID 151997f0. 2025/04/30 10:33:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2454d8fe67d11329 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 120a4ff3554f92ac, SrcConnectionID: ea81120a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 465, Version: v1} 2025/04/30 10:33:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: 120a4ff3554f92ac, SrcConnectionID: ea81120a, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:33:45 server Short Header{DestConnectionID: 120a4ff3554f92ac, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 151997f0, StatelessResetToken: 0xaef9b45334e9f565d194efc426ca218f} 2025/04/30 10:33:45 Tracking 39 connection IDs and 0 reset tokens. 2025/04/30 10:33:45 Removing connection IDs [21cd293b 76f8c603] for a closed connection after it has been retired. 2025/04/30 10:33:45 Removing connection ID cf299a5a740f97f7 after it has been retired. 2025/04/30 10:33:45 server <- Reading packet 1 (1200 bytes) for connection 2454d8fe67d11329, Initial 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 2454d8fe67d11329, SrcConnectionID: 120a4ff3554f92ac, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:45 server -> Sending packet 1 (45 bytes) for connection 2454d8fe67d11329, Initial 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 120a4ff3554f92ac, SrcConnectionID: ea81120a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 10:33:45 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:45 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 10:33:45 server -> Sending packet 2 (1280 bytes) for connection 2454d8fe67d11329, Initial 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 120a4ff3554f92ac, SrcConnectionID: ea81120a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:45 server -> Sending packet 3 (1280 bytes) for connection 2454d8fe67d11329, Initial 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 120a4ff3554f92ac, SrcConnectionID: ea81120a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:45 server <- Reading packet 2 (1201 bytes) for connection ea81120a, Initial 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: ea81120a, SrcConnectionID: 120a4ff3554f92ac, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:45 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:45 server <- Reading packet 0 (40 bytes) for connection ea81120a, Handshake 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: ea81120a, SrcConnectionID: 120a4ff3554f92ac, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 10:33:45 server Dropping Initial keys. 2025/04/30 10:33:45 server <- &wire.PingFrame{} 2025/04/30 10:33:45 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 10:33:45 server -> Sending packet 1 (747 bytes) for connection 2454d8fe67d11329, Handshake 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: 120a4ff3554f92ac, SrcConnectionID: ea81120a, PacketNumber: 1, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 10:33:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:33:45 server -> Sending packet 2 (742 bytes) for connection 2454d8fe67d11329, Handshake 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: 120a4ff3554f92ac, SrcConnectionID: ea81120a, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 10:33:45 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 10:33:45 server <- Reading packet 3 (42 bytes) for connection ea81120a, Handshake 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: ea81120a, SrcConnectionID: 120a4ff3554f92ac, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 10:33:45 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 10:33:45 server newly acked packets (1): [2] 2025/04/30 10:33:45 server updated RTT: 35.012832ms (σ: 17.506416ms) 2025/04/30 10:33:45 server Canceling loss detection timer. 2025/04/30 10:33:45 server Queueing packet (43 bytes) for later decryption 2025/04/30 10:33:45 Removing connection IDs [f9e77b23 6a8cceef] for a closed connection after it has been retired. 2025/04/30 10:33:45 Removing connection IDs [86a4388b bbd737ec] for a closed connection after it has been retired. 2025/04/30 10:33:45 server <- Reading packet 4 (76 bytes) for connection ea81120a, Handshake 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: ea81120a, SrcConnectionID: 120a4ff3554f92ac, PacketNumber: 4, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 Retiring connection ID 2454d8fe67d11329 in 5s. 2025/04/30 10:33:45 server Dropping Handshake keys. 2025/04/30 10:33:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 10:33:45 server -> Sending packet 2 (283 bytes) for connection 2454d8fe67d11329, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: 120a4ff3554f92ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 151997f0, StatelessResetToken: 0xaef9b45334e9f565d194efc426ca218f} 2025/04/30 10:33:45 server -> &wire.NewTokenFrame{Token: 0x1af7c2082187cb04174ec5e608908098e80233f5099c966126c6b49991c141aab0b612b66bceedbaaed6d37c1b6eb7ee093ad8c98b1202841e22e17f285eea8df578bab357babeec6aaa262e997f04d73d8ee356405d} 2025/04/30 10:33:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:45 server -> Sending packet 3 (283 bytes) for connection 2454d8fe67d11329, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: 120a4ff3554f92ac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:45 server -> &wire.NewTokenFrame{Token: 0x1af7c2082187cb04174ec5e608908098e80233f5099c966126c6b49991c141aab0b612b66bceedbaaed6d37c1b6eb7ee093ad8c98b1202841e22e17f285eea8df578bab357babeec6aaa262e997f04d73d8ee356405d} 2025/04/30 10:33:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 151997f0, StatelessResetToken: 0xaef9b45334e9f565d194efc426ca218f} 2025/04/30 10:33:45 server <- Reading packet 0 (43 bytes) for connection ea81120a, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: ea81120a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:45 server -> Sending packet 4 (35 bytes) for connection 2454d8fe67d11329, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: 120a4ff3554f92ac, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 160.155021ms} 2025/04/30 10:33:45 Received request: GET /osflyvteie 2025/04/30 10:33:45 server -> Sending packet 5 (1053 bytes) for connection 2454d8fe67d11329, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: 120a4ff3554f92ac, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:45 server <- Reading packet 2 (29 bytes) for connection ea81120a, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: ea81120a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 10:33:45 server newly acked packets (1): [5] 2025/04/30 10:33:45 server updated RTT: 34.669ms (σ: 13.815ms) 2025/04/30 10:33:45 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:45 server setting loss timer for packet 3 (1-RTT) to 39.002625ms (in 2025-04-30 10:33:45.619590065 +0000 UTC m=+26.491208998) 2025/04/30 10:33:45 server -> Sending packet 6 (30 bytes) for connection 2454d8fe67d11329, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:45 server Short Header{DestConnectionID: 120a4ff3554f92ac, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 10:33:45 server <- Reading packet 3 (33 bytes) for connection ea81120a, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: ea81120a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:45 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:45 Replacing connection for connection IDs [ea81120a 151997f0] with a closed connection. 2025/04/30 10:33:45 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:45 server Connection 2454d8fe67d11329 closed. 2025/04/30 10:33:45 server <- Received Initial packet. 2025/04/30 10:33:45 Created qlog file: /logs/qlog/01eec6bc84cd442f.sqlog 2025/04/30 10:33:45 server Changing connection ID to 399ac9dd. 2025/04/30 10:33:45 Adding connection IDs 01eec6bc84cd442f and 399ac9dd for a new connection. 2025/04/30 10:33:45 server <- Reading packet 0 (1200 bytes) for connection 01eec6bc84cd442f, Initial 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 01eec6bc84cd442f, SrcConnectionID: 0485023a5adf740f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 10:33:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 10:33:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0485023a5adf740f, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 10:33:45 Adding connection ID 4823cb28. 2025/04/30 10:33:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 01eec6bc84cd442f 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 0485023a5adf740f, SrcConnectionID: 399ac9dd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 453, Version: v1} 2025/04/30 10:33:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: 0485023a5adf740f, SrcConnectionID: 399ac9dd, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 10:33:45 server Short Header{DestConnectionID: 0485023a5adf740f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4823cb28, StatelessResetToken: 0x7c6c8294dcbcead6a446ef4cb3e550d2} 2025/04/30 10:33:45 server <- Reading packet 1 (1201 bytes) for connection 399ac9dd, Initial 2025/04/30 10:33:45 server Long Header{Type: Initial, DestConnectionID: 399ac9dd, SrcConnectionID: 0485023a5adf740f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 10:33:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 10:33:45 server newly acked packets (1): [0] 2025/04/30 10:33:45 server updated RTT: 34.955262ms (σ: 17.477631ms) 2025/04/30 10:33:45 server <- Reading packet 0 (76 bytes) for connection 399ac9dd, Handshake 2025/04/30 10:33:45 server Long Header{Type: Handshake, DestConnectionID: 399ac9dd, SrcConnectionID: 0485023a5adf740f, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 10:33:45 server Dropping Initial keys. 2025/04/30 10:33:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 10:33:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 10:33:45 Retiring connection ID 01eec6bc84cd442f in 5s. 2025/04/30 10:33:45 server Dropping Handshake keys. 2025/04/30 10:33:45 server -> Sending packet 1 (259 bytes) for connection 01eec6bc84cd442f, 1-RTT (ECN: ECT(0)) 2025/04/30 10:33:45 server Short Header{DestConnectionID: 0485023a5adf740f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 10:33:45 server -> &wire.NewTokenFrame{Token: 0xc03c6984679b7c7c02c8800656bc7dc961973a3653b70752f7a6b5e8bc1eb17d2d77fdf2eb30a74735539650501417fd34f05d6684801101a652e5688ebd63141b6f881b11423aa5e3c07854c9db47ab157a377a01b1} 2025/04/30 10:33:45 server <- Reading packet 1 (28 bytes) for connection 399ac9dd, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: 399ac9dd, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 10:33:45 server newly acked packets (2): [0 1] 2025/04/30 10:33:45 server updated RTT: 36.926ms (σ: 17.05ms) 2025/04/30 10:33:45 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 10:33:45 server Canceling loss detection timer. 2025/04/30 10:33:45 server <- Reading packet 2 (43 bytes) for connection 399ac9dd, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: 399ac9dd, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 10:33:45 server -> Sending packet 2 (32 bytes) for connection 01eec6bc84cd442f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:45 server Short Header{DestConnectionID: 0485023a5adf740f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 111.096µs} 2025/04/30 10:33:45 Received request: GET /dfkfxkzoqp 2025/04/30 10:33:45 server -> Sending packet 3 (1053 bytes) for connection 01eec6bc84cd442f, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:45 server Short Header{DestConnectionID: 0485023a5adf740f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:45 server <- Reading packet 3 (43 bytes) for connection 399ac9dd, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: 399ac9dd, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 10:33:45 server Setting ACK timer to max ack delay: 25ms 2025/04/30 10:33:45 server <- Reading packet 4 (31 bytes) for connection 399ac9dd, 1-RTT 2025/04/30 10:33:45 server Short Header{DestConnectionID: 399ac9dd, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 10:33:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 10:33:45 server Closing connection with error: NO_ERROR (remote) 2025/04/30 10:33:45 Replacing connection for connection IDs [399ac9dd 4823cb28] with a closed connection. 2025/04/30 10:33:45 Error accepting stream: NO_ERROR (remote) 2025/04/30 10:33:45 server Connection 01eec6bc84cd442f closed. 2025/04/30 10:33:46 Removing connection ID 5c86ae7df0ad6f2e after it has been retired. 2025/04/30 10:33:46 Removing connection IDs [baf9fddf cc4a2021] for a closed connection after it has been retired. 2025/04/30 10:33:46 Removing connection ID 8b7e6deaca7d08f3 after it has been retired. 2025/04/30 10:33:46 Removing connection ID 58b8c8d8643d6948 after it has been retired. 2025/04/30 10:33:46 Removing connection IDs [6e9689c4 8c74307f] for a closed connection after it has been retired. 2025/04/30 10:33:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 10:33:46 server -> Sending packet 20 (256 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:46 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 10:33:46 server -> &wire.NewTokenFrame{Token: 0x193b4028855dd4d4e863a6f8e33c94b253b68870ebc86b1e1f3579569fd2dab11b1a139d5d0ee687a72c30d9676aa508714f5980e737943a8cc4a3eefbcb2ab3c04265542b3043aea3b9bf029fa7714f0fd31968a5b7} 2025/04/30 10:33:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 10:33:46 server Skipping packet number 19 2025/04/30 10:33:46 server -> Sending packet 21 (1053 bytes) for connection a886f5ac1e04869c, 1-RTT (ECN: Not-ECT) 2025/04/30 10:33:46 server Short Header{DestConnectionID: bb2cbc82726bf34e, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 10:33:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 10:33:47 Tracking 28 connection IDs and 0 reset tokens. 2025/04/30 10:33:47 Removing connection IDs [bebcefe0 b624db60] for a closed connection after it has been retired. 2025/04/30 10:33:47 Removing connection ID f40e459a88eceba5 after it has been retired. 2025/04/30 10:33:47 Removing connection IDs [bd5fda6e 4aa6d457] for a closed connection after it has been retired. 2025/04/30 10:33:47 Removing connection ID 2332fdca433c5df2 after it has been retired. 2025/04/30 10:33:47 Removing connection IDs [e379cf26 adf04401] for a closed connection after it has been retired. 2025/04/30 10:33:47 Removing connection ID 6212e78a67e22b97 after it has been retired. 2025/04/30 10:33:47 Removing connection ID fd3455a1839df65d after it has been retired. 2025/04/30 10:33:48 Removing connection IDs [b0d4e185 1cd8a508] for a closed connection after it has been retired. 2025/04/30 10:33:48 Removing connection IDs [7356a04c 70b60c35] for a closed connection after it has been retired. 2025/04/30 10:33:49 Removing connection ID 14ac0d6ee8fbf4b1 after it has been retired. 2025/04/30 10:33:49 Tracking 13 connection IDs and 0 reset tokens. 2025/04/30 10:33:49 Removing connection IDs [7d16a3ae c8b57015] for a closed connection after it has been retired. 2025/04/30 10:33:50 Removing connection ID cef60b8d9713ff5c after it has been retired. 2025/04/30 10:33:50 Removing connection IDs [ea5ada27 6bd1ea70] for a closed connection after it has been retired. 2025/04/30 10:33:50 Removing connection ID 2454d8fe67d11329 after it has been retired. 2025/04/30 10:33:50 Removing connection IDs [ea81120a 151997f0] for a closed connection after it has been retired. 2025/04/30 10:33:50 Removing connection ID 01eec6bc84cd442f after it has been retired. 2025/04/30 10:33:50 Removing connection IDs [399ac9dd 4823cb28] for a closed connection after it has been retired. 2025/04/30 10:33:51 Tracking 2 connection IDs and 0 reset tokens. 2025/04/30 10:33:53 Tracking 2 connection IDs and 0 reset tokens. 2025/04/30 10:33:55 Tracking 2 connection IDs and 0 reset tokens.