2025/04/30 17:41:23 Increased receive buffer size to 14336 kiB 2025/04/30 17:41:23 Increased send buffer size to 14336 kiB 2025/04/30 17:41:23 Setting DF for IPv4 and IPv6. 2025/04/30 17:41:23 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 17:41:23 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 17:41:23 server Listening for udp connections on [::]:443 2025/04/30 17:41:23 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:41:23 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:41:23 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:41:24 server <- Received Initial packet. 2025/04/30 17:41:24 Created qlog file: /logs/qlog/31f22b980e63b29a.sqlog 2025/04/30 17:41:24 server Changing connection ID to 661a77d9. 2025/04/30 17:41:24 Adding connection IDs 31f22b980e63b29a and 661a77d9 for a new connection. 2025/04/30 17:41:24 server <- Reading packet 0 (1200 bytes) for connection 31f22b980e63b29a, Initial 2025/04/30 17:41:24 server Long Header{Type: Initial, DestConnectionID: 31f22b980e63b29a, SrcConnectionID: 6358b48ee389470e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6358b48ee389470e, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:24 Adding connection ID d8163375. 2025/04/30 17:41:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 31f22b980e63b29a 2025/04/30 17:41:24 server Long Header{Type: Initial, DestConnectionID: 6358b48ee389470e, SrcConnectionID: 661a77d9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 461, Version: v1} 2025/04/30 17:41:24 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:24 server Long Header{Type: Handshake, DestConnectionID: 6358b48ee389470e, SrcConnectionID: 661a77d9, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 17:41:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 17:41:24 server Short Header{DestConnectionID: 6358b48ee389470e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8163375, StatelessResetToken: 0xc22d9bd8931748daced871a1e45a03b3} 2025/04/30 17:41:25 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 17:41:25 server <- Reading packet 1 (1201 bytes) for connection 661a77d9, Initial 2025/04/30 17:41:25 server Long Header{Type: Initial, DestConnectionID: 661a77d9, SrcConnectionID: 6358b48ee389470e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:25 server newly acked packets (1): [0] 2025/04/30 17:41:25 server updated RTT: 77.001372ms (σ: 38.500686ms) 2025/04/30 17:41:25 server Queueing packet (49 bytes) for later decryption 2025/04/30 17:41:25 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:25 server -> Sending packet 1 (746 bytes) for connection 31f22b980e63b29a, Handshake 2025/04/30 17:41:25 server Long Header{Type: Handshake, DestConnectionID: 6358b48ee389470e, SrcConnectionID: 661a77d9, PacketNumber: 1, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 17:41:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 17:41:25 server -> Sending packet 2 (746 bytes) for connection 31f22b980e63b29a, Handshake 2025/04/30 17:41:25 server Long Header{Type: Handshake, DestConnectionID: 6358b48ee389470e, SrcConnectionID: 661a77d9, PacketNumber: 2, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 17:41:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 17:41:25 server <- Reading packet 2 (42 bytes) for connection 661a77d9, Handshake 2025/04/30 17:41:25 server Long Header{Type: Handshake, DestConnectionID: 661a77d9, SrcConnectionID: 6358b48ee389470e, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:25 server Dropping Initial keys. 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:25 server <- Reading packet 4 (76 bytes) for connection 661a77d9, Handshake 2025/04/30 17:41:25 server Long Header{Type: Handshake, DestConnectionID: 661a77d9, SrcConnectionID: 6358b48ee389470e, PacketNumber: 4, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:25 Retiring connection ID 31f22b980e63b29a in 5s. 2025/04/30 17:41:25 server Dropping Handshake keys. 2025/04/30 17:41:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:25 server -> Sending packet 2 (283 bytes) for connection 31f22b980e63b29a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:25 server Short Header{DestConnectionID: 6358b48ee389470e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8163375, StatelessResetToken: 0xc22d9bd8931748daced871a1e45a03b3} 2025/04/30 17:41:25 server -> &wire.NewTokenFrame{Token: 0xa449b3a5f0723d960fe02a5f02f7396d8294200e5ffcde3154fb309190d824172ac1c8e66cc8cb59f1aceea494d8f6b7ad89510cd4b0e95f206b3bc80a095d8bafe303d350f70388b4024970d010d486b3158da1671a} 2025/04/30 17:41:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:25 server -> Sending packet 3 (283 bytes) for connection 31f22b980e63b29a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:25 server Short Header{DestConnectionID: 6358b48ee389470e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.NewTokenFrame{Token: 0xa449b3a5f0723d960fe02a5f02f7396d8294200e5ffcde3154fb309190d824172ac1c8e66cc8cb59f1aceea494d8f6b7ad89510cd4b0e95f206b3bc80a095d8bafe303d350f70388b4024970d010d486b3158da1671a} 2025/04/30 17:41:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8163375, StatelessResetToken: 0xc22d9bd8931748daced871a1e45a03b3} 2025/04/30 17:41:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:25 server <- Reading packet 0 (49 bytes) for connection 661a77d9, 1-RTT 2025/04/30 17:41:25 server Short Header{DestConnectionID: 661a77d9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 10ms} 2025/04/30 17:41:25 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:25 server -> Sending packet 4 (33 bytes) for connection 31f22b980e63b29a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:25 server Short Header{DestConnectionID: 6358b48ee389470e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 124.576566ms} 2025/04/30 17:41:25 Received request: GET /wozkdmjbqi 2025/04/30 17:41:25 server -> Sending packet 5 (1053 bytes) for connection 31f22b980e63b29a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:25 server Short Header{DestConnectionID: 6358b48ee389470e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:25 server <- Reading packet 2 (30 bytes) for connection 661a77d9, 1-RTT 2025/04/30 17:41:25 server Short Header{DestConnectionID: 661a77d9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 2ms} 2025/04/30 17:41:25 server newly acked packets (1): [3] 2025/04/30 17:41:25 server updated RTT: 72.537ms (σ: 37.802ms) 2025/04/30 17:41:25 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:25 server -> Sending packet 7 (1053 bytes) for connection 31f22b980e63b29a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:25 server Short Header{DestConnectionID: 6358b48ee389470e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:25 server -> Sending packet 8 (1053 bytes) for connection 31f22b980e63b29a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:25 server Short Header{DestConnectionID: 6358b48ee389470e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:25 server <- Reading packet 4 (29 bytes) for connection 661a77d9, 1-RTT 2025/04/30 17:41:25 server Short Header{DestConnectionID: 661a77d9, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 2}}, DelayTime: 0s} 2025/04/30 17:41:25 server newly acked packets (1): [8] 2025/04/30 17:41:25 server updated RTT: 67.787ms (σ: 37.85ms) 2025/04/30 17:41:25 server Canceling loss detection timer. 2025/04/30 17:41:25 server -> Sending packet 9 (30 bytes) for connection 31f22b980e63b29a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:25 server Short Header{DestConnectionID: 6358b48ee389470e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:25 server <- Reading packet 5 (33 bytes) for connection 661a77d9, 1-RTT 2025/04/30 17:41:25 server Short Header{DestConnectionID: 661a77d9, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:25 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:25 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:25 Replacing connection for connection IDs [661a77d9 d8163375] with a closed connection. 2025/04/30 17:41:25 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:25 server Connection 31f22b980e63b29a closed. 2025/04/30 17:41:25 server <- Received Initial packet. 2025/04/30 17:41:25 Created qlog file: /logs/qlog/e8e9a8abf5e4350e.sqlog 2025/04/30 17:41:25 server Changing connection ID to ddf849eb. 2025/04/30 17:41:25 Adding connection IDs e8e9a8abf5e4350e and ddf849eb for a new connection. 2025/04/30 17:41:25 server <- Reading packet 0 (1200 bytes) for connection e8e9a8abf5e4350e, Initial 2025/04/30 17:41:25 server Long Header{Type: Initial, DestConnectionID: e8e9a8abf5e4350e, SrcConnectionID: a14cc4d7c3338375, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:25 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:25 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:25 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:25 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a14cc4d7c3338375, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:25 Adding connection ID bce013c8. 2025/04/30 17:41:25 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e8e9a8abf5e4350e 2025/04/30 17:41:25 server Long Header{Type: Initial, DestConnectionID: a14cc4d7c3338375, SrcConnectionID: ddf849eb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 461, Version: v1} 2025/04/30 17:41:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:25 server Long Header{Type: Handshake, DestConnectionID: a14cc4d7c3338375, SrcConnectionID: ddf849eb, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 17:41:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 17:41:25 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bce013c8, StatelessResetToken: 0x140f40b00c33797a85b75c58c805d352} 2025/04/30 17:41:25 server <- Reading packet 1 (1201 bytes) for connection ddf849eb, Initial 2025/04/30 17:41:25 server Long Header{Type: Initial, DestConnectionID: ddf849eb, SrcConnectionID: a14cc4d7c3338375, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:25 server newly acked packets (1): [0] 2025/04/30 17:41:25 server updated RTT: 40.120215ms (σ: 20.060107ms) 2025/04/30 17:41:25 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 49 bytes. 2025/04/30 17:41:25 server <- Reading packet 1 (42 bytes) for connection ddf849eb, Handshake 2025/04/30 17:41:25 server Long Header{Type: Handshake, DestConnectionID: ddf849eb, SrcConnectionID: a14cc4d7c3338375, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:25 server Dropping Initial keys. 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:25 server newly acked packets (1): [0] 2025/04/30 17:41:25 server updated RTT: 41.171ms (σ: 17.147ms) 2025/04/30 17:41:25 server Canceling loss detection timer. 2025/04/30 17:41:25 server Queueing packet (49 bytes) for later decryption 2025/04/30 17:41:25 server <- Reading packet 3 (76 bytes) for connection ddf849eb, Handshake 2025/04/30 17:41:25 server Long Header{Type: Handshake, DestConnectionID: ddf849eb, SrcConnectionID: a14cc4d7c3338375, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:25 Retiring connection ID e8e9a8abf5e4350e in 5s. 2025/04/30 17:41:25 server Dropping Handshake keys. 2025/04/30 17:41:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:25 server -> Sending packet 2 (283 bytes) for connection e8e9a8abf5e4350e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:25 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.NewTokenFrame{Token: 0xdb0463fa11129ee1bc2a0d2c038ae0415fc67016c3f792f8b125c9b83cd84a1fb611eb11bf7c6ca5b7ed01f1cc9f8aaa5d4a07c8509860c0698fa64d6681269c24a7786e00e5e8d9862f273fe9dbd283bd20f29a98eb} 2025/04/30 17:41:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bce013c8, StatelessResetToken: 0x140f40b00c33797a85b75c58c805d352} 2025/04/30 17:41:25 server -> Sending packet 3 (283 bytes) for connection e8e9a8abf5e4350e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:25 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bce013c8, StatelessResetToken: 0x140f40b00c33797a85b75c58c805d352} 2025/04/30 17:41:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:25 server -> &wire.NewTokenFrame{Token: 0xdb0463fa11129ee1bc2a0d2c038ae0415fc67016c3f792f8b125c9b83cd84a1fb611eb11bf7c6ca5b7ed01f1cc9f8aaa5d4a07c8509860c0698fa64d6681269c24a7786e00e5e8d9862f273fe9dbd283bd20f29a98eb} 2025/04/30 17:41:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:25 server <- Reading packet 0 (49 bytes) for connection ddf849eb, 1-RTT 2025/04/30 17:41:25 server Short Header{DestConnectionID: ddf849eb, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 17:41:25 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:25 server -> Sending packet 4 (35 bytes) for connection e8e9a8abf5e4350e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:25 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 293.112717ms} 2025/04/30 17:41:25 Received request: GET /dardkoqojf 2025/04/30 17:41:25 server -> Sending packet 5 (1053 bytes) for connection e8e9a8abf5e4350e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:25 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:25 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 17:41:25 server <- Reading packet 2 (30 bytes) for connection ddf849eb, 1-RTT 2025/04/30 17:41:25 server Short Header{DestConnectionID: ddf849eb, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:25 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 17:41:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 17:41:26 server -> Sending packet 7 (283 bytes) for connection e8e9a8abf5e4350e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:26 server -> &wire.NewTokenFrame{Token: 0xdb0463fa11129ee1bc2a0d2c038ae0415fc67016c3f792f8b125c9b83cd84a1fb611eb11bf7c6ca5b7ed01f1cc9f8aaa5d4a07c8509860c0698fa64d6681269c24a7786e00e5e8d9862f273fe9dbd283bd20f29a98eb} 2025/04/30 17:41:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bce013c8, StatelessResetToken: 0x140f40b00c33797a85b75c58c805d352} 2025/04/30 17:41:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:26 server Skipping packet number 6 2025/04/30 17:41:26 server -> Sending packet 8 (1053 bytes) for connection e8e9a8abf5e4350e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:26 server -> Sending packet 9 (1366 bytes) for connection e8e9a8abf5e4350e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.PingFrame{} 2025/04/30 17:41:26 server <- Reading packet 3 (43 bytes) for connection ddf849eb, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: ddf849eb, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:26 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:26 server <- Reading packet 5 (31 bytes) for connection ddf849eb, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: ddf849eb, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:26 server newly acked packets (2): [7 8] 2025/04/30 17:41:26 server updated RTT: 40.201ms (σ: 14.799ms) 2025/04/30 17:41:26 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:26 server Canceling loss detection timer. 2025/04/30 17:41:26 server -> Sending packet 10 (39 bytes) for connection e8e9a8abf5e4350e, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:26 server Short Header{DestConnectionID: a14cc4d7c3338375, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 175.105µs} 2025/04/30 17:41:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:26 server <- Reading packet 6 (35 bytes) for connection ddf849eb, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: ddf849eb, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:26 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:26 Replacing connection for connection IDs [ddf849eb bce013c8] with a closed connection. 2025/04/30 17:41:26 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:26 server Connection e8e9a8abf5e4350e closed. 2025/04/30 17:41:26 server <- Received Initial packet. 2025/04/30 17:41:26 Created qlog file: /logs/qlog/8a87f86679f0e1b8.sqlog 2025/04/30 17:41:26 server Changing connection ID to ab97cf4f. 2025/04/30 17:41:26 Adding connection IDs 8a87f86679f0e1b8 and ab97cf4f for a new connection. 2025/04/30 17:41:26 server <- Reading packet 0 (1200 bytes) for connection 8a87f86679f0e1b8, Initial 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: 8a87f86679f0e1b8, SrcConnectionID: ca42392a8ed38dc9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ca42392a8ed38dc9, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:26 Adding connection ID 4eed2c5f. 2025/04/30 17:41:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8a87f86679f0e1b8 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: ca42392a8ed38dc9, SrcConnectionID: ab97cf4f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 467, Version: v1} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: ca42392a8ed38dc9, SrcConnectionID: ab97cf4f, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 17:41:26 server Short Header{DestConnectionID: ca42392a8ed38dc9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4eed2c5f, StatelessResetToken: 0x273e45c6a5ba769054f49485052b4335} 2025/04/30 17:41:26 server <- Reading packet 1 (1201 bytes) for connection ab97cf4f, Initial 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: ab97cf4f, SrcConnectionID: ca42392a8ed38dc9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:26 server newly acked packets (1): [0] 2025/04/30 17:41:26 server updated RTT: 40.160298ms (σ: 20.080149ms) 2025/04/30 17:41:26 server <- Reading packet 0 (76 bytes) for connection ab97cf4f, Handshake 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: ab97cf4f, SrcConnectionID: ca42392a8ed38dc9, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:26 server Dropping Initial keys. 2025/04/30 17:41:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 Retiring connection ID 8a87f86679f0e1b8 in 5s. 2025/04/30 17:41:26 server Dropping Handshake keys. 2025/04/30 17:41:26 server -> Sending packet 1 (259 bytes) for connection 8a87f86679f0e1b8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: ca42392a8ed38dc9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:26 server -> &wire.NewTokenFrame{Token: 0xa090b55e166236974fe71a6e056c336383c70b53448db45b4539d01a8c6429180e3b95b661cf6c670e3a78047b25f5628bcef8cea7f4cb93bb10cc82f4986377ef4ca49a01e5fa5df8257747484f2a42cfef62f024ec} 2025/04/30 17:41:26 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 17:41:26 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:26 server <- Reading packet 0 (48 bytes) for connection ab97cf4f, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: ab97cf4f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:26 server newly acked packets (1): [0] 2025/04/30 17:41:26 server updated RTT: 40.784ms (σ: 16.308ms) 2025/04/30 17:41:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:26 server -> Sending packet 2 (32 bytes) for connection 8a87f86679f0e1b8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: ca42392a8ed38dc9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.772µs} 2025/04/30 17:41:26 Received request: GET /vdelkdvmfv 2025/04/30 17:41:26 server -> Sending packet 3 (1053 bytes) for connection 8a87f86679f0e1b8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: ca42392a8ed38dc9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:26 server -> Sending packet 5 (259 bytes) for connection 8a87f86679f0e1b8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: ca42392a8ed38dc9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:26 server -> &wire.NewTokenFrame{Token: 0xa090b55e166236974fe71a6e056c336383c70b53448db45b4539d01a8c6429180e3b95b661cf6c670e3a78047b25f5628bcef8cea7f4cb93bb10cc82f4986377ef4ca49a01e5fa5df8257747484f2a42cfef62f024ec} 2025/04/30 17:41:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:26 server Skipping packet number 4 2025/04/30 17:41:26 server -> Sending packet 6 (1053 bytes) for connection 8a87f86679f0e1b8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: ca42392a8ed38dc9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:26 server <- Reading packet 3 (33 bytes) for connection ab97cf4f, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: ab97cf4f, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:26 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:26 Replacing connection for connection IDs [ab97cf4f 4eed2c5f] with a closed connection. 2025/04/30 17:41:26 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:26 server Connection 8a87f86679f0e1b8 closed. 2025/04/30 17:41:26 server <- Received Initial packet. 2025/04/30 17:41:26 Created qlog file: /logs/qlog/3c258a3bae51d34f.sqlog 2025/04/30 17:41:26 server Changing connection ID to e43f8286. 2025/04/30 17:41:26 Adding connection IDs 3c258a3bae51d34f and e43f8286 for a new connection. 2025/04/30 17:41:26 server <- Reading packet 0 (1200 bytes) for connection 3c258a3bae51d34f, Initial 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: 3c258a3bae51d34f, SrcConnectionID: c31369c56baed1cc, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c31369c56baed1cc, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:26 Adding connection ID 2bc96c24. 2025/04/30 17:41:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3c258a3bae51d34f 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: c31369c56baed1cc, SrcConnectionID: e43f8286, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 455, Version: v1} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: c31369c56baed1cc, SrcConnectionID: e43f8286, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:26 server Short Header{DestConnectionID: c31369c56baed1cc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2bc96c24, StatelessResetToken: 0x34e704601924d83291e0bf794d273df3} 2025/04/30 17:41:26 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 17:41:26 server <- Reading packet 1 (42 bytes) for connection e43f8286, Handshake 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: e43f8286, SrcConnectionID: c31369c56baed1cc, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:26 server Dropping Initial keys. 2025/04/30 17:41:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:26 server newly acked packets (1): [0] 2025/04/30 17:41:26 server updated RTT: 42.573226ms (σ: 21.286613ms) 2025/04/30 17:41:26 server Canceling loss detection timer. 2025/04/30 17:41:26 server Queueing packet (48 bytes) for later decryption 2025/04/30 17:41:26 server <- Reading packet 2 (76 bytes) for connection e43f8286, Handshake 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: e43f8286, SrcConnectionID: c31369c56baed1cc, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 Retiring connection ID 3c258a3bae51d34f in 5s. 2025/04/30 17:41:26 server Dropping Handshake keys. 2025/04/30 17:41:26 server -> Sending packet 1 (259 bytes) for connection 3c258a3bae51d34f, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: c31369c56baed1cc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:26 server -> &wire.NewTokenFrame{Token: 0x84d8843dfb59b9e92eb84e584f39855798f0eb6ee49b6ca2f23b20ac435d77fc9c6d3093de10e30d31bfb302c3a4db05f9e51e89edb7cacf14b9315e9fc690f6bacaa232087c08afd00bbd4027275ae763780ce34b31} 2025/04/30 17:41:26 server <- Reading packet 0 (48 bytes) for connection e43f8286, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: e43f8286, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:26 server newly acked packets (1): [0] 2025/04/30 17:41:26 server updated RTT: 42.573ms (σ: 15.964ms) 2025/04/30 17:41:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:26 server -> Sending packet 2 (33 bytes) for connection 3c258a3bae51d34f, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: c31369c56baed1cc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.945168ms} 2025/04/30 17:41:26 Received request: GET /sxgekjwwfu 2025/04/30 17:41:26 server -> Sending packet 3 (1053 bytes) for connection 3c258a3bae51d34f, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: c31369c56baed1cc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:26 server <- Reading packet 1 (43 bytes) for connection e43f8286, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: e43f8286, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:26 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:26 server <- Reading packet 2 (28 bytes) for connection e43f8286, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: e43f8286, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 1ms} 2025/04/30 17:41:26 server newly acked packets (2): [1 3] 2025/04/30 17:41:26 server updated RTT: 41.505ms (σ: 14.108ms) 2025/04/30 17:41:26 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:26 server Canceling loss detection timer. 2025/04/30 17:41:26 server -> Sending packet 4 (35 bytes) for connection 3c258a3bae51d34f, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:26 server Short Header{DestConnectionID: c31369c56baed1cc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 87.493µs} 2025/04/30 17:41:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:26 server <- Reading packet 3 (31 bytes) for connection e43f8286, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: e43f8286, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:26 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:26 Replacing connection for connection IDs [e43f8286 2bc96c24] with a closed connection. 2025/04/30 17:41:26 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:26 server Connection 3c258a3bae51d34f closed. 2025/04/30 17:41:26 server <- Received Initial packet. 2025/04/30 17:41:26 Created qlog file: /logs/qlog/004ad08e8e909d66.sqlog 2025/04/30 17:41:26 server Changing connection ID to 8d9e3fc9. 2025/04/30 17:41:26 Adding connection IDs 004ad08e8e909d66 and 8d9e3fc9 for a new connection. 2025/04/30 17:41:26 server <- Reading packet 0 (1200 bytes) for connection 004ad08e8e909d66, Initial 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: 004ad08e8e909d66, SrcConnectionID: fd4c276178ae93b0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: fd4c276178ae93b0, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:26 Adding connection ID 60e4c52a. 2025/04/30 17:41:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 004ad08e8e909d66 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: fd4c276178ae93b0, SrcConnectionID: 8d9e3fc9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 457, Version: v1} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: fd4c276178ae93b0, SrcConnectionID: 8d9e3fc9, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:26 server Short Header{DestConnectionID: fd4c276178ae93b0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60e4c52a, StatelessResetToken: 0xba226135af9b4784e81fddb83b1010cc} 2025/04/30 17:41:26 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:26 server -> Sending packet 1 (1280 bytes) for connection 004ad08e8e909d66, Initial 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: fd4c276178ae93b0, SrcConnectionID: 8d9e3fc9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:26 server -> Sending packet 2 (1280 bytes) for connection 004ad08e8e909d66, Initial 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: fd4c276178ae93b0, SrcConnectionID: 8d9e3fc9, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:26 server Canceling loss detection timer. 2025/04/30 17:41:26 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 17:41:26 server <- Reading packet 2 (1201 bytes) for connection 8d9e3fc9, Initial 2025/04/30 17:41:26 server Long Header{Type: Initial, DestConnectionID: 8d9e3fc9, SrcConnectionID: fd4c276178ae93b0, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:26 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:26 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:26 server -> Sending packet 1 (750 bytes) for connection 004ad08e8e909d66, Handshake 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: fd4c276178ae93b0, SrcConnectionID: 8d9e3fc9, PacketNumber: 1, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:26 server -> Sending packet 2 (750 bytes) for connection 004ad08e8e909d66, Handshake 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: fd4c276178ae93b0, SrcConnectionID: 8d9e3fc9, PacketNumber: 2, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:26 server <- Reading packet 0 (40 bytes) for connection 8d9e3fc9, Handshake 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: 8d9e3fc9, SrcConnectionID: fd4c276178ae93b0, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:26 server Dropping Initial keys. 2025/04/30 17:41:26 server <- &wire.PingFrame{} 2025/04/30 17:41:26 server -> Sending packet 3 (44 bytes) for connection 004ad08e8e909d66, Handshake 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: fd4c276178ae93b0, SrcConnectionID: 8d9e3fc9, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:26 server <- Reading packet 1 (76 bytes) for connection 8d9e3fc9, Handshake 2025/04/30 17:41:26 server Long Header{Type: Handshake, DestConnectionID: 8d9e3fc9, SrcConnectionID: fd4c276178ae93b0, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:26 Retiring connection ID 004ad08e8e909d66 in 5s. 2025/04/30 17:41:26 server Dropping Handshake keys. 2025/04/30 17:41:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:26 server -> Sending packet 2 (280 bytes) for connection 004ad08e8e909d66, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: fd4c276178ae93b0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:26 server -> &wire.NewTokenFrame{Token: 0x93c974fbb8c8fb320141c5656004aa91c05e116dd5a1826a56c1943038c754ebb6c215aeed6f7164c8bfc4b45337b9f93ee8ca78da896f00c610283efff7d1c4a29df746cd860bc8db5e02c7dc5104b23849118f8d51} 2025/04/30 17:41:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60e4c52a, StatelessResetToken: 0xba226135af9b4784e81fddb83b1010cc} 2025/04/30 17:41:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:26 server -> Sending packet 3 (280 bytes) for connection 004ad08e8e909d66, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: fd4c276178ae93b0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60e4c52a, StatelessResetToken: 0xba226135af9b4784e81fddb83b1010cc} 2025/04/30 17:41:26 server -> &wire.NewTokenFrame{Token: 0x93c974fbb8c8fb320141c5656004aa91c05e116dd5a1826a56c1943038c754ebb6c215aeed6f7164c8bfc4b45337b9f93ee8ca78da896f00c610283efff7d1c4a29df746cd860bc8db5e02c7dc5104b23849118f8d51} 2025/04/30 17:41:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:26 server -> Sending packet 4 (1366 bytes) for connection 004ad08e8e909d66, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: fd4c276178ae93b0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.PingFrame{} 2025/04/30 17:41:26 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:26 server <- Reading packet 0 (43 bytes) for connection 8d9e3fc9, 1-RTT 2025/04/30 17:41:26 server Short Header{DestConnectionID: 8d9e3fc9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:26 server -> Sending packet 5 (32 bytes) for connection 004ad08e8e909d66, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: fd4c276178ae93b0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 70.372µs} 2025/04/30 17:41:26 Received request: GET /xvhbfpbjmn 2025/04/30 17:41:26 server -> Sending packet 6 (1053 bytes) for connection 004ad08e8e909d66, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:26 server Short Header{DestConnectionID: fd4c276178ae93b0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:27 Tracking 15 connection IDs and 0 reset tokens. 2025/04/30 17:41:27 server <- Reading packet 2 (33 bytes) for connection 8d9e3fc9, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: 8d9e3fc9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:27 Replacing connection for connection IDs [8d9e3fc9 60e4c52a] with a closed connection. 2025/04/30 17:41:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:27 server Connection 004ad08e8e909d66 closed. 2025/04/30 17:41:27 server <- Received Initial packet. 2025/04/30 17:41:27 Created qlog file: /logs/qlog/2d66d107ad4f58a1.sqlog 2025/04/30 17:41:27 server Changing connection ID to eccc60c9. 2025/04/30 17:41:27 Adding connection IDs 2d66d107ad4f58a1 and eccc60c9 for a new connection. 2025/04/30 17:41:27 server <- Reading packet 0 (1200 bytes) for connection 2d66d107ad4f58a1, Initial 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: 2d66d107ad4f58a1, SrcConnectionID: 7a266dc5b6b88434, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7a266dc5b6b88434, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:27 Adding connection ID 291e84bf. 2025/04/30 17:41:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2d66d107ad4f58a1 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: 7a266dc5b6b88434, SrcConnectionID: eccc60c9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 460, Version: v1} 2025/04/30 17:41:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:27 server Long Header{Type: Handshake, DestConnectionID: 7a266dc5b6b88434, SrcConnectionID: eccc60c9, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:27 server Short Header{DestConnectionID: 7a266dc5b6b88434, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 291e84bf, StatelessResetToken: 0x9a5345cb94af0fb51c9c186b3b8c539f} 2025/04/30 17:41:27 server <- Reading packet 0 (76 bytes) for connection eccc60c9, Handshake 2025/04/30 17:41:27 server Long Header{Type: Handshake, DestConnectionID: eccc60c9, SrcConnectionID: 7a266dc5b6b88434, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:27 server Dropping Initial keys. 2025/04/30 17:41:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 Retiring connection ID 2d66d107ad4f58a1 in 5s. 2025/04/30 17:41:27 server Dropping Handshake keys. 2025/04/30 17:41:27 server -> Sending packet 1 (1366 bytes) for connection 2d66d107ad4f58a1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: 7a266dc5b6b88434, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.PingFrame{} 2025/04/30 17:41:27 server -> Sending packet 2 (256 bytes) for connection 2d66d107ad4f58a1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: 7a266dc5b6b88434, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:27 server -> &wire.NewTokenFrame{Token: 0xfd80ec35ce6b7ac6d9ff08737f661a621c6ad8c210679ad461b7bc4e94468bdebfd03f6d36df678e7f3ed6459a211fcc32c91ca75980b1f9e15106d266224d6958079d6428d27e16ca60f2c3493bf7e9c0cc6a2a5393} 2025/04/30 17:41:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:27 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:27 server <- Reading packet 0 (43 bytes) for connection eccc60c9, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: eccc60c9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:27 server -> Sending packet 3 (32 bytes) for connection 2d66d107ad4f58a1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: 7a266dc5b6b88434, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 65.722µs} 2025/04/30 17:41:27 Received request: GET /lzyrimonbp 2025/04/30 17:41:27 server -> Sending packet 4 (1053 bytes) for connection 2d66d107ad4f58a1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: 7a266dc5b6b88434, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:27 server <- Reading packet 1 (28 bytes) for connection eccc60c9, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: eccc60c9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 17:41:27 server newly acked packets (1): [0] 2025/04/30 17:41:27 server updated RTT: 61.74205ms (σ: 30.871025ms) 2025/04/30 17:41:27 server <- Reading packet 2 (28 bytes) for connection eccc60c9, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: eccc60c9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 17:41:27 server newly acked packets (2): [1 2] 2025/04/30 17:41:27 server updated RTT: 58.27ms (σ: 30.096ms) 2025/04/30 17:41:27 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:27 server <- Reading packet 3 (31 bytes) for connection eccc60c9, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: eccc60c9, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:27 Replacing connection for connection IDs [eccc60c9 291e84bf] with a closed connection. 2025/04/30 17:41:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:27 server Connection 2d66d107ad4f58a1 closed. 2025/04/30 17:41:27 server <- Received Initial packet. 2025/04/30 17:41:27 Created qlog file: /logs/qlog/32853a6d784ca384.sqlog 2025/04/30 17:41:27 server Changing connection ID to 8093f3aa. 2025/04/30 17:41:27 Adding connection IDs 32853a6d784ca384 and 8093f3aa for a new connection. 2025/04/30 17:41:27 server <- Reading packet 0 (1200 bytes) for connection 32853a6d784ca384, Initial 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: 32853a6d784ca384, SrcConnectionID: 1df18ee7b3ab756b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 1df18ee7b3ab756b, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:27 Adding connection ID 9c940a74. 2025/04/30 17:41:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 32853a6d784ca384 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: 1df18ee7b3ab756b, SrcConnectionID: 8093f3aa, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 468, Version: v1} 2025/04/30 17:41:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:27 server Long Header{Type: Handshake, DestConnectionID: 1df18ee7b3ab756b, SrcConnectionID: 8093f3aa, PacketNumber: 0, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 17:41:27 server Short Header{DestConnectionID: 1df18ee7b3ab756b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c940a74, StatelessResetToken: 0x3313e724e288681c3634617948b8eaae} 2025/04/30 17:41:27 server <- Reading packet 1 (1201 bytes) for connection 8093f3aa, Initial 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: 8093f3aa, SrcConnectionID: 1df18ee7b3ab756b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:27 server newly acked packets (1): [0] 2025/04/30 17:41:27 server updated RTT: 36.666045ms (σ: 18.333022ms) 2025/04/30 17:41:27 server <- Reading packet 0 (76 bytes) for connection 8093f3aa, Handshake 2025/04/30 17:41:27 server Long Header{Type: Handshake, DestConnectionID: 8093f3aa, SrcConnectionID: 1df18ee7b3ab756b, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:27 server Dropping Initial keys. 2025/04/30 17:41:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 Retiring connection ID 32853a6d784ca384 in 5s. 2025/04/30 17:41:27 server Dropping Handshake keys. 2025/04/30 17:41:27 server -> Sending packet 1 (259 bytes) for connection 32853a6d784ca384, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: 1df18ee7b3ab756b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:27 server -> &wire.NewTokenFrame{Token: 0x46ff5cebd3a4662a0a1648adb064487be33cf952d55fbfd083b0a01166e57993b40592e221a2d7766f500e67639fd9177a89d475fc26faf40b6d1de186210a028e1d9d3ca92c8677238efa744b8eb776b64ad1fff718} 2025/04/30 17:41:27 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 17:41:27 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:27 server <- Reading packet 0 (48 bytes) for connection 8093f3aa, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: 8093f3aa, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:27 server newly acked packets (1): [0] 2025/04/30 17:41:27 server updated RTT: 37.565ms (σ: 15.548ms) 2025/04/30 17:41:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:27 server -> Sending packet 2 (32 bytes) for connection 32853a6d784ca384, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: 1df18ee7b3ab756b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 124.182µs} 2025/04/30 17:41:27 Received request: GET /wwcqbjzief 2025/04/30 17:41:27 server -> Sending packet 3 (1053 bytes) for connection 32853a6d784ca384, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: 1df18ee7b3ab756b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:27 server <- Reading packet 1 (30 bytes) for connection 8093f3aa, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: 8093f3aa, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 1ms} 2025/04/30 17:41:27 server newly acked packets (2): [1 3] 2025/04/30 17:41:27 server updated RTT: 36.898ms (σ: 12.993ms) 2025/04/30 17:41:27 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:27 server Canceling loss detection timer. 2025/04/30 17:41:27 server -> Sending packet 4 (30 bytes) for connection 32853a6d784ca384, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:27 server Short Header{DestConnectionID: 1df18ee7b3ab756b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:27 server <- Reading packet 2 (33 bytes) for connection 8093f3aa, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: 8093f3aa, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:27 Replacing connection for connection IDs [8093f3aa 9c940a74] with a closed connection. 2025/04/30 17:41:27 server Connection 32853a6d784ca384 closed. 2025/04/30 17:41:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:27 server <- Received Initial packet. 2025/04/30 17:41:27 Created qlog file: /logs/qlog/d4199e1edb273363.sqlog 2025/04/30 17:41:27 server Changing connection ID to 30db3eb7. 2025/04/30 17:41:27 Adding connection IDs d4199e1edb273363 and 30db3eb7 for a new connection. 2025/04/30 17:41:27 server <- Reading packet 2 (1200 bytes) for connection d4199e1edb273363, Initial 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: d4199e1edb273363, SrcConnectionID: f21cba45b2e66293, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f21cba45b2e66293, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:27 Adding connection ID 71a67268. 2025/04/30 17:41:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d4199e1edb273363 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: f21cba45b2e66293, SrcConnectionID: 30db3eb7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 456, Version: v1} 2025/04/30 17:41:27 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:27 server Long Header{Type: Handshake, DestConnectionID: f21cba45b2e66293, SrcConnectionID: 30db3eb7, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 17:41:27 server Short Header{DestConnectionID: f21cba45b2e66293, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 71a67268, StatelessResetToken: 0x132c2269b1549880b8a4ae73c9cdb9a2} 2025/04/30 17:41:27 server <- Reading packet 3 (1200 bytes) for connection d4199e1edb273363, Initial 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: d4199e1edb273363, SrcConnectionID: f21cba45b2e66293, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:27 server -> Sending packet 1 (45 bytes) for connection d4199e1edb273363, Initial 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: f21cba45b2e66293, SrcConnectionID: 30db3eb7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:27 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:27 server <- Reading packet 5 (1201 bytes) for connection 30db3eb7, Initial 2025/04/30 17:41:27 server Long Header{Type: Initial, DestConnectionID: 30db3eb7, SrcConnectionID: f21cba45b2e66293, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:27 server newly acked packets (1): [0] 2025/04/30 17:41:27 server updated RTT: 40.171828ms (σ: 20.085914ms) 2025/04/30 17:41:27 server <- Reading packet 0 (76 bytes) for connection 30db3eb7, Handshake 2025/04/30 17:41:27 server Long Header{Type: Handshake, DestConnectionID: 30db3eb7, SrcConnectionID: f21cba45b2e66293, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:27 server Dropping Initial keys. 2025/04/30 17:41:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:27 Retiring connection ID d4199e1edb273363 in 5s. 2025/04/30 17:41:27 server Dropping Handshake keys. 2025/04/30 17:41:27 server -> Sending packet 1 (259 bytes) for connection d4199e1edb273363, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: f21cba45b2e66293, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:27 server -> &wire.NewTokenFrame{Token: 0xe52012d1c21e865a12233f087c4903f7714974e85c66ba3cbaa842e9f34b9ea0b3f9d156f0bd2e3e9dcbd0929bf4b75eeedc1fcb4daeab017ee49b5231bb27b9d13d933a34aabeeb9aac72bc09110e34a7f65c8d9f4f} 2025/04/30 17:41:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:27 server <- Reading packet 0 (43 bytes) for connection 30db3eb7, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: 30db3eb7, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:27 server -> Sending packet 2 (32 bytes) for connection d4199e1edb273363, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: f21cba45b2e66293, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 71.564µs} 2025/04/30 17:41:27 Received request: GET /pnnywdhczl 2025/04/30 17:41:27 server -> Sending packet 3 (1053 bytes) for connection d4199e1edb273363, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:27 server Short Header{DestConnectionID: f21cba45b2e66293, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:27 server <- Reading packet 1 (28 bytes) for connection 30db3eb7, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: 30db3eb7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 17:41:27 server newly acked packets (1): [0] 2025/04/30 17:41:27 server updated RTT: 40.811ms (σ: 16.344ms) 2025/04/30 17:41:27 server <- Reading packet 2 (30 bytes) for connection 30db3eb7, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: 30db3eb7, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 1ms} 2025/04/30 17:41:27 server newly acked packets (2): [1 3] 2025/04/30 17:41:27 server updated RTT: 39.716ms (σ: 14.446ms) 2025/04/30 17:41:27 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:27 server Canceling loss detection timer. 2025/04/30 17:41:27 server -> Sending packet 4 (30 bytes) for connection d4199e1edb273363, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:27 server Short Header{DestConnectionID: f21cba45b2e66293, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:27 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:27 server <- Reading packet 3 (33 bytes) for connection 30db3eb7, 1-RTT 2025/04/30 17:41:27 server Short Header{DestConnectionID: 30db3eb7, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:27 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:27 Replacing connection for connection IDs [30db3eb7 71a67268] with a closed connection. 2025/04/30 17:41:27 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:27 server Connection d4199e1edb273363 closed. 2025/04/30 17:41:28 server <- Received Initial packet. 2025/04/30 17:41:28 Created qlog file: /logs/qlog/95638fae473b94fd.sqlog 2025/04/30 17:41:28 server Changing connection ID to 3fa5ccc9. 2025/04/30 17:41:28 Adding connection IDs 95638fae473b94fd and 3fa5ccc9 for a new connection. 2025/04/30 17:41:28 server <- Reading packet 1 (1200 bytes) for connection 95638fae473b94fd, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 95638fae473b94fd, SrcConnectionID: 9a90c758ca0bf063, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 9a90c758ca0bf063, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:28 Adding connection ID 1ebd374f. 2025/04/30 17:41:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 95638fae473b94fd 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 9a90c758ca0bf063, SrcConnectionID: 3fa5ccc9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 465, Version: v1} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: 9a90c758ca0bf063, SrcConnectionID: 3fa5ccc9, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9a90c758ca0bf063, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1ebd374f, StatelessResetToken: 0x0110471f0f61c93f3a71d58fb31ac358} 2025/04/30 17:41:28 server <- Reading packet 2 (1200 bytes) for connection 3fa5ccc9, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 3fa5ccc9, SrcConnectionID: 9a90c758ca0bf063, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:28 server -> Sending packet 1 (45 bytes) for connection 95638fae473b94fd, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 9a90c758ca0bf063, SrcConnectionID: 3fa5ccc9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:28 server <- Reading packet 3 (1201 bytes) for connection 3fa5ccc9, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 3fa5ccc9, SrcConnectionID: 9a90c758ca0bf063, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server newly acked packets (1): [0] 2025/04/30 17:41:28 server updated RTT: 37.510671ms (σ: 18.755335ms) 2025/04/30 17:41:28 server <- Reading packet 0 (76 bytes) for connection 3fa5ccc9, Handshake 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: 3fa5ccc9, SrcConnectionID: 9a90c758ca0bf063, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:28 server Dropping Initial keys. 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 Retiring connection ID 95638fae473b94fd in 5s. 2025/04/30 17:41:28 server Dropping Handshake keys. 2025/04/30 17:41:28 server -> Sending packet 1 (259 bytes) for connection 95638fae473b94fd, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9a90c758ca0bf063, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:28 server -> &wire.NewTokenFrame{Token: 0xdeb21dab354146a5d43be93d83cc8288c60dda2b44524601f60014c2a46810fd572f4f8a3c735d87a272bb885998975267ddfb16f8f6eae4e8f409bd89507a1a58a5e06f87d0098123766479db1c451b8d82ed904e22} 2025/04/30 17:41:28 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 17:41:28 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:28 server <- Reading packet 0 (48 bytes) for connection 3fa5ccc9, 1-RTT 2025/04/30 17:41:28 server Short Header{DestConnectionID: 3fa5ccc9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server newly acked packets (1): [0] 2025/04/30 17:41:28 server updated RTT: 38.013ms (σ: 15.073ms) 2025/04/30 17:41:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:28 server -> Sending packet 2 (32 bytes) for connection 95638fae473b94fd, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9a90c758ca0bf063, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 110.076µs} 2025/04/30 17:41:28 Received request: GET /jtpzjjirlq 2025/04/30 17:41:28 server -> Sending packet 3 (1053 bytes) for connection 95638fae473b94fd, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9a90c758ca0bf063, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:28 server <- Reading packet 1 (30 bytes) for connection 3fa5ccc9, 1-RTT 2025/04/30 17:41:28 server Short Header{DestConnectionID: 3fa5ccc9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 1ms} 2025/04/30 17:41:28 server newly acked packets (2): [1 3] 2025/04/30 17:41:28 server updated RTT: 37.337ms (σ: 12.656ms) 2025/04/30 17:41:28 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:28 server Canceling loss detection timer. 2025/04/30 17:41:28 server -> Sending packet 4 (30 bytes) for connection 95638fae473b94fd, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9a90c758ca0bf063, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:28 server <- Received Initial packet. 2025/04/30 17:41:28 Created qlog file: /logs/qlog/dd8ae5a787e88e6c.sqlog 2025/04/30 17:41:28 server Changing connection ID to 16346738. 2025/04/30 17:41:28 Adding connection IDs dd8ae5a787e88e6c and 16346738 for a new connection. 2025/04/30 17:41:28 server <- Reading packet 0 (1200 bytes) for connection dd8ae5a787e88e6c, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: dd8ae5a787e88e6c, SrcConnectionID: c6e43dee76b5b6cd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c6e43dee76b5b6cd, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:28 Adding connection ID a7a987dc. 2025/04/30 17:41:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection dd8ae5a787e88e6c 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: c6e43dee76b5b6cd, SrcConnectionID: 16346738, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 458, Version: v1} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: c6e43dee76b5b6cd, SrcConnectionID: 16346738, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 17:41:28 server Short Header{DestConnectionID: c6e43dee76b5b6cd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a7a987dc, StatelessResetToken: 0xf5b8e622dca2dd407439057a7d28de60} 2025/04/30 17:41:28 server <- Reading packet 3 (33 bytes) for connection 3fa5ccc9, 1-RTT 2025/04/30 17:41:28 server Short Header{DestConnectionID: 3fa5ccc9, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:28 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:28 Replacing connection for connection IDs [3fa5ccc9 1ebd374f] with a closed connection. 2025/04/30 17:41:28 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:28 server Connection 95638fae473b94fd closed. 2025/04/30 17:41:28 server <- Reading packet 0 (76 bytes) for connection 16346738, Handshake 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: 16346738, SrcConnectionID: c6e43dee76b5b6cd, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:28 server Dropping Initial keys. 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 Retiring connection ID dd8ae5a787e88e6c in 5s. 2025/04/30 17:41:28 server Dropping Handshake keys. 2025/04/30 17:41:28 server -> Sending packet 1 (1366 bytes) for connection dd8ae5a787e88e6c, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: c6e43dee76b5b6cd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.PingFrame{} 2025/04/30 17:41:28 server -> Sending packet 2 (256 bytes) for connection dd8ae5a787e88e6c, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: c6e43dee76b5b6cd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:28 server -> &wire.NewTokenFrame{Token: 0x85c1d22d3fb8da61050afae122314d9fbe8c45f2ab87659906260955e6577f717fc6edb75b4780b27660f8671c7ab74d65d934807054b77695b7442d222b87629adec193d2dfcb7f2917926465433dc2a08515556ae4} 2025/04/30 17:41:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:28 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 17:41:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:28 server -> Sending packet 4 (51 bytes) for connection dd8ae5a787e88e6c, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: c6e43dee76b5b6cd, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a7a987dc, StatelessResetToken: 0xf5b8e622dca2dd407439057a7d28de60} 2025/04/30 17:41:28 server Skipping packet number 3 2025/04/30 17:41:28 server -> Sending packet 5 (256 bytes) for connection dd8ae5a787e88e6c, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: c6e43dee76b5b6cd, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:28 server -> &wire.NewTokenFrame{Token: 0x85c1d22d3fb8da61050afae122314d9fbe8c45f2ab87659906260955e6577f717fc6edb75b4780b27660f8671c7ab74d65d934807054b77695b7442d222b87629adec193d2dfcb7f2917926465433dc2a08515556ae4} 2025/04/30 17:41:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:28 server <- Reading packet 1 (51 bytes) for connection 16346738, 1-RTT 2025/04/30 17:41:28 server Short Header{DestConnectionID: 16346738, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:28 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 1ms} 2025/04/30 17:41:28 server newly acked packets (2): [4 5] 2025/04/30 17:41:28 server updated RTT: 33.255957ms (σ: 16.627978ms) 2025/04/30 17:41:28 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:28 server lost packet 1 (time threshold) 2025/04/30 17:41:28 server Canceling loss detection timer. 2025/04/30 17:41:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:28 server -> Sending packet 6 (1323 bytes) for connection dd8ae5a787e88e6c, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:28 server Short Header{DestConnectionID: c6e43dee76b5b6cd, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.PingFrame{} 2025/04/30 17:41:28 server -> Sending packet 7 (32 bytes) for connection dd8ae5a787e88e6c, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:28 server Short Header{DestConnectionID: c6e43dee76b5b6cd, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 268.501µs} 2025/04/30 17:41:28 Received request: GET /xenplvusel 2025/04/30 17:41:28 server -> Sending packet 8 (1053 bytes) for connection dd8ae5a787e88e6c, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:28 server Short Header{DestConnectionID: c6e43dee76b5b6cd, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:28 server <- Reading packet 3 (31 bytes) for connection 16346738, 1-RTT 2025/04/30 17:41:28 server Short Header{DestConnectionID: 16346738, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:28 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:28 Replacing connection for connection IDs [16346738 a7a987dc] with a closed connection. 2025/04/30 17:41:28 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:28 server Connection dd8ae5a787e88e6c closed. 2025/04/30 17:41:28 server <- Received Initial packet. 2025/04/30 17:41:28 Created qlog file: /logs/qlog/797e13d43990816a.sqlog 2025/04/30 17:41:28 server Changing connection ID to b186d252. 2025/04/30 17:41:28 Adding connection IDs 797e13d43990816a and b186d252 for a new connection. 2025/04/30 17:41:28 server <- Reading packet 0 (1200 bytes) for connection 797e13d43990816a, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 797e13d43990816a, SrcConnectionID: 9db3f5959060d259, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 9db3f5959060d259, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:28 Adding connection ID 8e8302d5. 2025/04/30 17:41:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 797e13d43990816a 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 9db3f5959060d259, SrcConnectionID: b186d252, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 461, Version: v1} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: 9db3f5959060d259, SrcConnectionID: b186d252, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9db3f5959060d259, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e8302d5, StatelessResetToken: 0x582ba3539452ec8d74febf3f1933b2d3} 2025/04/30 17:41:28 server <- Reading packet 1 (1200 bytes) for connection 797e13d43990816a, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 797e13d43990816a, SrcConnectionID: 9db3f5959060d259, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:28 server -> Sending packet 1 (45 bytes) for connection 797e13d43990816a, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 9db3f5959060d259, SrcConnectionID: b186d252, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:28 server -> Sending packet 2 (1280 bytes) for connection 797e13d43990816a, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 9db3f5959060d259, SrcConnectionID: b186d252, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:28 server -> Sending packet 3 (1280 bytes) for connection 797e13d43990816a, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 9db3f5959060d259, SrcConnectionID: b186d252, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:28 server <- Reading packet 0 (40 bytes) for connection b186d252, Handshake 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: b186d252, SrcConnectionID: 9db3f5959060d259, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:28 server Dropping Initial keys. 2025/04/30 17:41:28 server <- &wire.PingFrame{} 2025/04/30 17:41:28 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:28 server -> Sending packet 1 (751 bytes) for connection 797e13d43990816a, Handshake 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: 9db3f5959060d259, SrcConnectionID: b186d252, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 17:41:28 server -> Sending packet 2 (746 bytes) for connection 797e13d43990816a, Handshake 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: 9db3f5959060d259, SrcConnectionID: b186d252, PacketNumber: 2, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 17:41:28 server <- Reading packet 1 (76 bytes) for connection b186d252, Handshake 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: b186d252, SrcConnectionID: 9db3f5959060d259, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 Retiring connection ID 797e13d43990816a in 5s. 2025/04/30 17:41:28 server Dropping Handshake keys. 2025/04/30 17:41:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:28 server -> Sending packet 2 (280 bytes) for connection 797e13d43990816a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9db3f5959060d259, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:28 server -> &wire.NewTokenFrame{Token: 0x84749c25336fc77cbad84609dab2627a6a07c23de84025dbc6a1c03f41b06d37b6948f9e7b460d0281cda12f265b9aa2e83e4335a261f10f290e52a46eca18f331044c5b7b26ddc529e018634776f60f325bab30c7c6} 2025/04/30 17:41:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e8302d5, StatelessResetToken: 0x582ba3539452ec8d74febf3f1933b2d3} 2025/04/30 17:41:28 server -> Sending packet 3 (280 bytes) for connection 797e13d43990816a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9db3f5959060d259, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e8302d5, StatelessResetToken: 0x582ba3539452ec8d74febf3f1933b2d3} 2025/04/30 17:41:28 server -> &wire.NewTokenFrame{Token: 0x84749c25336fc77cbad84609dab2627a6a07c23de84025dbc6a1c03f41b06d37b6948f9e7b460d0281cda12f265b9aa2e83e4335a261f10f290e52a46eca18f331044c5b7b26ddc529e018634776f60f325bab30c7c6} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:28 server -> Sending packet 4 (1366 bytes) for connection 797e13d43990816a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9db3f5959060d259, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.PingFrame{} 2025/04/30 17:41:28 server <- Reading packet 0 (43 bytes) for connection b186d252, 1-RTT 2025/04/30 17:41:28 server Short Header{DestConnectionID: b186d252, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:28 server -> Sending packet 5 (32 bytes) for connection 797e13d43990816a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9db3f5959060d259, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 82.794µs} 2025/04/30 17:41:28 Received request: GET /tfwszbtbgp 2025/04/30 17:41:28 server -> Sending packet 6 (1053 bytes) for connection 797e13d43990816a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:28 server Short Header{DestConnectionID: 9db3f5959060d259, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:28 server <- Reading packet 1 (31 bytes) for connection b186d252, 1-RTT 2025/04/30 17:41:28 server Short Header{DestConnectionID: b186d252, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:28 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:28 Replacing connection for connection IDs [b186d252 8e8302d5] with a closed connection. 2025/04/30 17:41:28 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:28 server Connection 797e13d43990816a closed. 2025/04/30 17:41:28 server <- Received Initial packet. 2025/04/30 17:41:28 Created qlog file: /logs/qlog/a61f4d0ba23cb7a1.sqlog 2025/04/30 17:41:28 server Changing connection ID to 649bcb69. 2025/04/30 17:41:28 Adding connection IDs a61f4d0ba23cb7a1 and 649bcb69 for a new connection. 2025/04/30 17:41:28 server <- Reading packet 0 (1200 bytes) for connection a61f4d0ba23cb7a1, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: a61f4d0ba23cb7a1, SrcConnectionID: 6e7048168d816360, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6e7048168d816360, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:28 Adding connection ID 59c68bce. 2025/04/30 17:41:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a61f4d0ba23cb7a1 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 6e7048168d816360, SrcConnectionID: 649bcb69, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 458, Version: v1} 2025/04/30 17:41:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: 6e7048168d816360, SrcConnectionID: 649bcb69, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 17:41:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 17:41:28 server Short Header{DestConnectionID: 6e7048168d816360, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 59c68bce, StatelessResetToken: 0x567248007c2fca5cc705cfc764e0830f} 2025/04/30 17:41:28 server <- Reading packet 1 (1201 bytes) for connection 649bcb69, Initial 2025/04/30 17:41:28 server Long Header{Type: Initial, DestConnectionID: 649bcb69, SrcConnectionID: 6e7048168d816360, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server newly acked packets (1): [0] 2025/04/30 17:41:28 server updated RTT: 36.945166ms (σ: 18.472583ms) 2025/04/30 17:41:28 server <- Reading packet 1 (42 bytes) for connection 649bcb69, Handshake 2025/04/30 17:41:28 server Long Header{Type: Handshake, DestConnectionID: 649bcb69, SrcConnectionID: 6e7048168d816360, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:28 server Dropping Initial keys. 2025/04/30 17:41:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:28 server newly acked packets (1): [0] 2025/04/30 17:41:28 server updated RTT: 37.225ms (σ: 14.415ms) 2025/04/30 17:41:28 server Canceling loss detection timer. 2025/04/30 17:41:28 server Queueing packet (48 bytes) for later decryption 2025/04/30 17:41:29 Tracking 36 connection IDs and 0 reset tokens. 2025/04/30 17:41:29 server <- Reading packet 2 (76 bytes) for connection 649bcb69, Handshake 2025/04/30 17:41:29 server Long Header{Type: Handshake, DestConnectionID: 649bcb69, SrcConnectionID: 6e7048168d816360, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:29 Retiring connection ID a61f4d0ba23cb7a1 in 5s. 2025/04/30 17:41:29 server Dropping Handshake keys. 2025/04/30 17:41:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:29 server -> Sending packet 2 (283 bytes) for connection a61f4d0ba23cb7a1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:29 server Short Header{DestConnectionID: 6e7048168d816360, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:29 server -> &wire.NewTokenFrame{Token: 0xf151f861a13793d7311ea6455602e0e162032a2d98a5863a28ba4a98cf65a745fb701b3630557263a3ba648e3d64509ac10b8821dc55955fae20d5f4d5aced3c272f3f96d61c481e5c1ac352f0f158be738fdc711f4c} 2025/04/30 17:41:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 59c68bce, StatelessResetToken: 0x567248007c2fca5cc705cfc764e0830f} 2025/04/30 17:41:29 server -> Sending packet 3 (283 bytes) for connection a61f4d0ba23cb7a1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:29 server Short Header{DestConnectionID: 6e7048168d816360, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 59c68bce, StatelessResetToken: 0x567248007c2fca5cc705cfc764e0830f} 2025/04/30 17:41:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:29 server -> &wire.NewTokenFrame{Token: 0xf151f861a13793d7311ea6455602e0e162032a2d98a5863a28ba4a98cf65a745fb701b3630557263a3ba648e3d64509ac10b8821dc55955fae20d5f4d5aced3c272f3f96d61c481e5c1ac352f0f158be738fdc711f4c} 2025/04/30 17:41:29 server <- Reading packet 0 (48 bytes) for connection 649bcb69, 1-RTT 2025/04/30 17:41:29 server Short Header{DestConnectionID: 649bcb69, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:29 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:29 server -> Sending packet 4 (33 bytes) for connection a61f4d0ba23cb7a1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:29 server Short Header{DestConnectionID: 6e7048168d816360, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.440095ms} 2025/04/30 17:41:29 Received request: GET /vkemchvsya 2025/04/30 17:41:29 server -> Sending packet 5 (1053 bytes) for connection a61f4d0ba23cb7a1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:29 server Short Header{DestConnectionID: 6e7048168d816360, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:29 server <- Reading packet 2 (29 bytes) for connection 649bcb69, 1-RTT 2025/04/30 17:41:29 server Short Header{DestConnectionID: 649bcb69, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:29 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:29 server newly acked packets (1): [3] 2025/04/30 17:41:29 server updated RTT: 36.728ms (σ: 11.805ms) 2025/04/30 17:41:29 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:29 server <- Reading packet 3 (31 bytes) for connection 649bcb69, 1-RTT 2025/04/30 17:41:29 server Short Header{DestConnectionID: 649bcb69, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:29 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:29 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:29 Replacing connection for connection IDs [649bcb69 59c68bce] with a closed connection. 2025/04/30 17:41:29 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:29 server Connection a61f4d0ba23cb7a1 closed. 2025/04/30 17:41:29 server <- Received Initial packet. 2025/04/30 17:41:29 Created qlog file: /logs/qlog/7ef6ab932594c3ba.sqlog 2025/04/30 17:41:29 server Changing connection ID to 93b92f72. 2025/04/30 17:41:29 Adding connection IDs 7ef6ab932594c3ba and 93b92f72 for a new connection. 2025/04/30 17:41:29 server <- Reading packet 0 (1200 bytes) for connection 7ef6ab932594c3ba, Initial 2025/04/30 17:41:29 server Long Header{Type: Initial, DestConnectionID: 7ef6ab932594c3ba, SrcConnectionID: fbd4ab838578da50, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: fbd4ab838578da50, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:29 Adding connection ID 9d2ecc5b. 2025/04/30 17:41:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7ef6ab932594c3ba 2025/04/30 17:41:29 server Long Header{Type: Initial, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 457, Version: v1} 2025/04/30 17:41:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:29 server Long Header{Type: Handshake, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:29 server Short Header{DestConnectionID: fbd4ab838578da50, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d2ecc5b, StatelessResetToken: 0xf4688044ec8f5cfca8ffef23e59014ff} 2025/04/30 17:41:29 server <- Reading packet 1 (1200 bytes) for connection 7ef6ab932594c3ba, Initial 2025/04/30 17:41:29 server Long Header{Type: Initial, DestConnectionID: 7ef6ab932594c3ba, SrcConnectionID: fbd4ab838578da50, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:29 server -> Sending packet 1 (45 bytes) for connection 7ef6ab932594c3ba, Initial 2025/04/30 17:41:29 server Long Header{Type: Initial, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:29 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:29 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:29 server -> Sending packet 2 (1280 bytes) for connection 7ef6ab932594c3ba, Initial 2025/04/30 17:41:29 server Long Header{Type: Initial, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:29 server -> Sending packet 3 (1280 bytes) for connection 7ef6ab932594c3ba, Initial 2025/04/30 17:41:29 server Long Header{Type: Initial, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:29 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:29 server -> Sending packet 1 (750 bytes) for connection 7ef6ab932594c3ba, Handshake 2025/04/30 17:41:29 server Long Header{Type: Handshake, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, PacketNumber: 1, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:29 server -> Sending packet 2 (750 bytes) for connection 7ef6ab932594c3ba, Handshake 2025/04/30 17:41:29 server Long Header{Type: Handshake, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, PacketNumber: 2, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:30 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 17:41:30 server -> Sending packet 4 (1280 bytes) for connection 7ef6ab932594c3ba, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:30 server -> Sending packet 5 (1280 bytes) for connection 7ef6ab932594c3ba, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:30 server Canceling loss detection timer. 2025/04/30 17:41:30 server Amplification window limited. Received 2400 bytes, already sent out 7945 bytes 2025/04/30 17:41:30 server <- Reading packet 4 (1201 bytes) for connection 93b92f72, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: 93b92f72, SrcConnectionID: fbd4ab838578da50, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:30 server <- &wire.PingFrame{} 2025/04/30 17:41:30 server -> Sending packet 6 (47 bytes) for connection 7ef6ab932594c3ba, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:30 server <- Reading packet 5 (1201 bytes) for connection 93b92f72, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: 93b92f72, SrcConnectionID: fbd4ab838578da50, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:30 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 17:41:30 server <- Reading packet 0 (40 bytes) for connection 93b92f72, Handshake 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: 93b92f72, SrcConnectionID: fbd4ab838578da50, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:30 server Dropping Initial keys. 2025/04/30 17:41:30 server <- &wire.PingFrame{} 2025/04/30 17:41:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:30 server -> Sending packet 3 (755 bytes) for connection 7ef6ab932594c3ba, Handshake 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, PacketNumber: 3, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:30 server -> Sending packet 4 (750 bytes) for connection 7ef6ab932594c3ba, Handshake 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: fbd4ab838578da50, SrcConnectionID: 93b92f72, PacketNumber: 4, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:30 Removing connection ID 31f22b980e63b29a after it has been retired. 2025/04/30 17:41:30 server <- Reading packet 2 (42 bytes) for connection 93b92f72, Handshake 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: 93b92f72, SrcConnectionID: fbd4ab838578da50, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:30 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 17:41:30 server newly acked packets (1): [4] 2025/04/30 17:41:30 server updated RTT: 36.54052ms (σ: 18.27026ms) 2025/04/30 17:41:30 server Canceling loss detection timer. 2025/04/30 17:41:30 server Queueing packet (43 bytes) for later decryption 2025/04/30 17:41:30 server <- Reading packet 3 (76 bytes) for connection 93b92f72, Handshake 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: 93b92f72, SrcConnectionID: fbd4ab838578da50, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 Retiring connection ID 7ef6ab932594c3ba in 5s. 2025/04/30 17:41:30 server Dropping Handshake keys. 2025/04/30 17:41:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:30 server -> Sending packet 2 (283 bytes) for connection 7ef6ab932594c3ba, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: fbd4ab838578da50, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d2ecc5b, StatelessResetToken: 0xf4688044ec8f5cfca8ffef23e59014ff} 2025/04/30 17:41:30 server -> &wire.NewTokenFrame{Token: 0x541c8089cb08a4ec5512d411e33e6fbeddc54669399da42d557e4de6a8e4a1d9903fddf902750242c32b0c98fc8fde9afa8e946b0dd031530a4dc52f7b2dd211e7d67eccff076ab535200e0b54f2ca4e577ea6d7fa78} 2025/04/30 17:41:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:30 server -> Sending packet 3 (283 bytes) for connection 7ef6ab932594c3ba, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: fbd4ab838578da50, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d2ecc5b, StatelessResetToken: 0xf4688044ec8f5cfca8ffef23e59014ff} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:30 server -> &wire.NewTokenFrame{Token: 0x541c8089cb08a4ec5512d411e33e6fbeddc54669399da42d557e4de6a8e4a1d9903fddf902750242c32b0c98fc8fde9afa8e946b0dd031530a4dc52f7b2dd211e7d67eccff076ab535200e0b54f2ca4e577ea6d7fa78} 2025/04/30 17:41:30 server <- Reading packet 0 (43 bytes) for connection 93b92f72, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: 93b92f72, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:30 server -> Sending packet 4 (35 bytes) for connection 7ef6ab932594c3ba, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: fbd4ab838578da50, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192.634354ms} 2025/04/30 17:41:30 Received request: GET /klkmsjtdqe 2025/04/30 17:41:30 server -> Sending packet 5 (1053 bytes) for connection 7ef6ab932594c3ba, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: fbd4ab838578da50, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:30 server <- Reading packet 1 (43 bytes) for connection 93b92f72, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: 93b92f72, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:30 server <- Reading packet 2 (27 bytes) for connection 93b92f72, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: 93b92f72, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:30 server newly acked packets (1): [3] 2025/04/30 17:41:30 server updated RTT: 36.11ms (σ: 14.562ms) 2025/04/30 17:41:30 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:30 server <- Reading packet 3 (31 bytes) for connection 93b92f72, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: 93b92f72, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:30 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:30 Replacing connection for connection IDs [93b92f72 9d2ecc5b] with a closed connection. 2025/04/30 17:41:30 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:30 server Connection 7ef6ab932594c3ba closed. 2025/04/30 17:41:30 server <- Received Initial packet. 2025/04/30 17:41:30 Created qlog file: /logs/qlog/b2c8964473c4c5f5.sqlog 2025/04/30 17:41:30 server Changing connection ID to d38ad7bc. 2025/04/30 17:41:30 Adding connection IDs b2c8964473c4c5f5 and d38ad7bc for a new connection. 2025/04/30 17:41:30 server <- Reading packet 0 (1200 bytes) for connection b2c8964473c4c5f5, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: b2c8964473c4c5f5, SrcConnectionID: 37b895aec4dff21e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 37b895aec4dff21e, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:30 Adding connection ID e88d6070. 2025/04/30 17:41:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b2c8964473c4c5f5 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: 37b895aec4dff21e, SrcConnectionID: d38ad7bc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 466, Version: v1} 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: 37b895aec4dff21e, SrcConnectionID: d38ad7bc, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 17:41:30 server Short Header{DestConnectionID: 37b895aec4dff21e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e88d6070, StatelessResetToken: 0x12430211ab44972e16a600cd9f1bff27} 2025/04/30 17:41:30 server <- Reading packet 1 (1201 bytes) for connection d38ad7bc, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: d38ad7bc, SrcConnectionID: 37b895aec4dff21e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:30 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:30 server newly acked packets (1): [0] 2025/04/30 17:41:30 server updated RTT: 36.313325ms (σ: 18.156662ms) 2025/04/30 17:41:30 server <- Reading packet 0 (76 bytes) for connection d38ad7bc, Handshake 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: d38ad7bc, SrcConnectionID: 37b895aec4dff21e, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:30 server Dropping Initial keys. 2025/04/30 17:41:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 Retiring connection ID b2c8964473c4c5f5 in 5s. 2025/04/30 17:41:30 server Dropping Handshake keys. 2025/04/30 17:41:30 server -> Sending packet 1 (259 bytes) for connection b2c8964473c4c5f5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 37b895aec4dff21e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:30 server -> &wire.NewTokenFrame{Token: 0xc1fcb1818091616643bbe08d0b3678e2b7422654cacd8b5638d5b8f290dd11ea01ceaf80319649cef33c3e3073e34e4fd1fe7ae84f7b832f34a8d6c4da1e458225adf163246264438a06d8c533324f148f050ac8f8ca} 2025/04/30 17:41:30 server <- Reading packet 0 (43 bytes) for connection d38ad7bc, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: d38ad7bc, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:30 server -> Sending packet 2 (32 bytes) for connection b2c8964473c4c5f5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 37b895aec4dff21e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 167.602µs} 2025/04/30 17:41:30 Received request: GET /navvtfuauo 2025/04/30 17:41:30 server -> Sending packet 3 (1053 bytes) for connection b2c8964473c4c5f5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 37b895aec4dff21e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:30 Removing connection IDs [661a77d9 d8163375] for a closed connection after it has been retired. 2025/04/30 17:41:30 server <- Reading packet 1 (28 bytes) for connection d38ad7bc, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: d38ad7bc, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 17:41:30 server newly acked packets (1): [0] 2025/04/30 17:41:30 server updated RTT: 36.767ms (σ: 14.525ms) 2025/04/30 17:41:30 server <- Reading packet 2 (33 bytes) for connection d38ad7bc, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: d38ad7bc, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:30 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:30 Replacing connection for connection IDs [e88d6070 d38ad7bc] with a closed connection. 2025/04/30 17:41:30 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:30 server Connection b2c8964473c4c5f5 closed. 2025/04/30 17:41:30 server <- Received Initial packet. 2025/04/30 17:41:30 Created qlog file: /logs/qlog/c309d787b2e6f306.sqlog 2025/04/30 17:41:30 server Changing connection ID to 141ff2ac. 2025/04/30 17:41:30 Adding connection IDs c309d787b2e6f306 and 141ff2ac for a new connection. 2025/04/30 17:41:30 server <- Reading packet 0 (1200 bytes) for connection c309d787b2e6f306, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: c309d787b2e6f306, SrcConnectionID: 3cd0810de8fb8a90, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3cd0810de8fb8a90, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:30 Adding connection ID aee649cc. 2025/04/30 17:41:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c309d787b2e6f306 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: 3cd0810de8fb8a90, SrcConnectionID: 141ff2ac, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 456, Version: v1} 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: 3cd0810de8fb8a90, SrcConnectionID: 141ff2ac, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 17:41:30 server Short Header{DestConnectionID: 3cd0810de8fb8a90, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: aee649cc, StatelessResetToken: 0x6f63d06547da76f6288b47a1444a13ad} 2025/04/30 17:41:30 server <- Reading packet 0 (76 bytes) for connection 141ff2ac, Handshake 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: 141ff2ac, SrcConnectionID: 3cd0810de8fb8a90, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:30 server Dropping Initial keys. 2025/04/30 17:41:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 Retiring connection ID c309d787b2e6f306 in 5s. 2025/04/30 17:41:30 server Dropping Handshake keys. 2025/04/30 17:41:30 server -> Sending packet 1 (1366 bytes) for connection c309d787b2e6f306, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 3cd0810de8fb8a90, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.PingFrame{} 2025/04/30 17:41:30 server -> Sending packet 2 (256 bytes) for connection c309d787b2e6f306, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 3cd0810de8fb8a90, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:30 server -> &wire.NewTokenFrame{Token: 0x5b08302037a8b7b85c18aca19e98cde1a2290d7364854236d6be92107e985705c280fd42983e23301f6f720a4281b9fb6ac22a319c1e6c9cdd02676aa044bd07b6aba19d4b0c07d55de800a5c8cca2c1530b9fb9a0fc} 2025/04/30 17:41:30 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:30 server <- Reading packet 1 (30 bytes) for connection 141ff2ac, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: 141ff2ac, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 17:41:30 server newly acked packets (2): [0 2] 2025/04/30 17:41:30 server updated RTT: 52.407023ms (σ: 26.203511ms) 2025/04/30 17:41:30 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:30 server setting loss timer for packet 1 (1-RTT) to 58.9579ms (in 2025-04-30 17:41:30.628666656 +0000 UTC m=+7.629140712) 2025/04/30 17:41:30 server Canceling loss detection timer. 2025/04/30 17:41:30 Removing connection ID e8e9a8abf5e4350e after it has been retired. 2025/04/30 17:41:30 server <- Reading packet 3 (43 bytes) for connection 141ff2ac, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: 141ff2ac, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:30 server -> Sending packet 3 (34 bytes) for connection c309d787b2e6f306, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 3cd0810de8fb8a90, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 Received request: GET /kuwkgfpfth 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 129.021µs} 2025/04/30 17:41:30 server -> Sending packet 4 (1053 bytes) for connection c309d787b2e6f306, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 3cd0810de8fb8a90, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:30 server -> Sending packet 5 (31 bytes) for connection c309d787b2e6f306, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 3cd0810de8fb8a90, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 17:41:30 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 17:41:30.628666656 +0000 UTC m=+7.629140712 2025/04/30 17:41:30 server lost packet 1 (time threshold) 2025/04/30 17:41:30 server -> Sending packet 6 (1323 bytes) for connection c309d787b2e6f306, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 3cd0810de8fb8a90, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.PingFrame{} 2025/04/30 17:41:30 server <- Reading packet 4 (43 bytes) for connection 141ff2ac, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: 141ff2ac, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:30 server Sending ACK because the ACK timer expired. 2025/04/30 17:41:30 server -> Sending packet 7 (35 bytes) for connection c309d787b2e6f306, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:30 server Short Header{DestConnectionID: 3cd0810de8fb8a90, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.246971ms} 2025/04/30 17:41:30 server <- Reading packet 6 (35 bytes) for connection 141ff2ac, 1-RTT 2025/04/30 17:41:30 server Short Header{DestConnectionID: 141ff2ac, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:30 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:30 Replacing connection for connection IDs [141ff2ac aee649cc] with a closed connection. 2025/04/30 17:41:30 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:30 server Connection c309d787b2e6f306 closed. 2025/04/30 17:41:30 server <- Received Initial packet. 2025/04/30 17:41:30 Created qlog file: /logs/qlog/68a6b291f5dc732e.sqlog 2025/04/30 17:41:30 server Changing connection ID to 3b575d53. 2025/04/30 17:41:30 Adding connection IDs 68a6b291f5dc732e and 3b575d53 for a new connection. 2025/04/30 17:41:30 server <- Reading packet 0 (1200 bytes) for connection 68a6b291f5dc732e, Initial 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: 68a6b291f5dc732e, SrcConnectionID: 5a1fa9dd6488b84a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 5a1fa9dd6488b84a, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:30 Adding connection ID c3269bc5. 2025/04/30 17:41:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 68a6b291f5dc732e 2025/04/30 17:41:30 server Long Header{Type: Initial, DestConnectionID: 5a1fa9dd6488b84a, SrcConnectionID: 3b575d53, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 460, Version: v1} 2025/04/30 17:41:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:30 server Long Header{Type: Handshake, DestConnectionID: 5a1fa9dd6488b84a, SrcConnectionID: 3b575d53, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:30 server Short Header{DestConnectionID: 5a1fa9dd6488b84a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c3269bc5, StatelessResetToken: 0x950c6dd8dee24f4a47ccd29a73a6c8ae} 2025/04/30 17:41:31 Tracking 44 connection IDs and 0 reset tokens. 2025/04/30 17:41:31 server <- Reading packet 1 (1201 bytes) for connection 3b575d53, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 3b575d53, SrcConnectionID: 5a1fa9dd6488b84a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:31 server newly acked packets (1): [0] 2025/04/30 17:41:31 server updated RTT: 35.78606ms (σ: 17.89303ms) 2025/04/30 17:41:31 server <- Reading packet 0 (76 bytes) for connection 3b575d53, Handshake 2025/04/30 17:41:31 server Long Header{Type: Handshake, DestConnectionID: 3b575d53, SrcConnectionID: 5a1fa9dd6488b84a, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:31 server Dropping Initial keys. 2025/04/30 17:41:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 Retiring connection ID 68a6b291f5dc732e in 5s. 2025/04/30 17:41:31 server Dropping Handshake keys. 2025/04/30 17:41:31 server -> Sending packet 1 (259 bytes) for connection 68a6b291f5dc732e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 5a1fa9dd6488b84a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:31 server -> &wire.NewTokenFrame{Token: 0x2f072a7089f4aff1cd7def7e20e608231bd3a2deac4f2c4a93edc4d57c8a90ef2f7faef94eac29f6b102678dd3bc4cba1e7568a1dddd2510fb894cff0ce0fe47968b38a9f3dad7457dc76a882fa294e0936735fd90fb} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:31 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:31 server <- Reading packet 0 (48 bytes) for connection 3b575d53, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 3b575d53, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:31 server newly acked packets (1): [0] 2025/04/30 17:41:31 server updated RTT: 36.112ms (σ: 14.071ms) 2025/04/30 17:41:31 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:31 server -> Sending packet 2 (32 bytes) for connection 68a6b291f5dc732e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 5a1fa9dd6488b84a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.943µs} 2025/04/30 17:41:31 Received request: GET /zcbmdqqmyi 2025/04/30 17:41:31 server -> Sending packet 3 (1053 bytes) for connection 68a6b291f5dc732e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 5a1fa9dd6488b84a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:31 server <- Reading packet 1 (30 bytes) for connection 3b575d53, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 3b575d53, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 1ms} 2025/04/30 17:41:31 server newly acked packets (2): [1 3] 2025/04/30 17:41:31 server updated RTT: 35.591ms (σ: 11.595ms) 2025/04/30 17:41:31 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:31 server Canceling loss detection timer. 2025/04/30 17:41:31 server -> Sending packet 4 (30 bytes) for connection 68a6b291f5dc732e, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 5a1fa9dd6488b84a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:31 server <- Reading packet 2 (33 bytes) for connection 3b575d53, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 3b575d53, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:31 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:31 Replacing connection for connection IDs [3b575d53 c3269bc5] with a closed connection. 2025/04/30 17:41:31 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:31 server Connection 68a6b291f5dc732e closed. 2025/04/30 17:41:31 server <- Received Initial packet. 2025/04/30 17:41:31 Created qlog file: /logs/qlog/b4d2b953ffb41697.sqlog 2025/04/30 17:41:31 server Changing connection ID to 0ec6cda2. 2025/04/30 17:41:31 Adding connection IDs b4d2b953ffb41697 and 0ec6cda2 for a new connection. 2025/04/30 17:41:31 server <- Reading packet 0 (1200 bytes) for connection b4d2b953ffb41697, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: b4d2b953ffb41697, SrcConnectionID: 573b5648c0a0c3ef, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 573b5648c0a0c3ef, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:31 Adding connection ID aba71531. 2025/04/30 17:41:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b4d2b953ffb41697 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 573b5648c0a0c3ef, SrcConnectionID: 0ec6cda2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 455, Version: v1} 2025/04/30 17:41:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:31 server Long Header{Type: Handshake, DestConnectionID: 573b5648c0a0c3ef, SrcConnectionID: 0ec6cda2, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:31 server Short Header{DestConnectionID: 573b5648c0a0c3ef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: aba71531, StatelessResetToken: 0x220f1591ac7c6806db2eb35c0f8bb8a6} 2025/04/30 17:41:31 server <- Reading packet 1 (1201 bytes) for connection 0ec6cda2, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 0ec6cda2, SrcConnectionID: 573b5648c0a0c3ef, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:31 server newly acked packets (1): [0] 2025/04/30 17:41:31 server updated RTT: 35.592635ms (σ: 17.796317ms) 2025/04/30 17:41:31 server <- Reading packet 0 (76 bytes) for connection 0ec6cda2, Handshake 2025/04/30 17:41:31 server Long Header{Type: Handshake, DestConnectionID: 0ec6cda2, SrcConnectionID: 573b5648c0a0c3ef, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:31 server Dropping Initial keys. 2025/04/30 17:41:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 Retiring connection ID b4d2b953ffb41697 in 5s. 2025/04/30 17:41:31 server Dropping Handshake keys. 2025/04/30 17:41:31 server -> Sending packet 1 (259 bytes) for connection b4d2b953ffb41697, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 573b5648c0a0c3ef, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:31 server -> &wire.NewTokenFrame{Token: 0x838b0f4bbcd7b8f8f04cec6ba4c967b03e235339b44f058d9d4369ddf54ee1d3e0942a1fe264716e6cd20bd5c23c7eba344c07ed5d67ccef332453d2de108725e3ce17f07c4910f3407e2c7e6c5dc3d9421b75c2fe51} 2025/04/30 17:41:31 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:31 server <- Reading packet 1 (28 bytes) for connection 0ec6cda2, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 0ec6cda2, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 17:41:31 server newly acked packets (2): [0 1] 2025/04/30 17:41:31 server updated RTT: 37.55ms (σ: 17.264ms) 2025/04/30 17:41:31 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:31 server Canceling loss detection timer. 2025/04/30 17:41:31 Removing connection IDs [ddf849eb bce013c8] for a closed connection after it has been retired. 2025/04/30 17:41:31 Removing connection ID 8a87f86679f0e1b8 after it has been retired. 2025/04/30 17:41:31 Removing connection IDs [ab97cf4f 4eed2c5f] for a closed connection after it has been retired. 2025/04/30 17:41:31 server <- Reading packet 3 (43 bytes) for connection 0ec6cda2, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 0ec6cda2, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:31 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:31 server -> Sending packet 2 (1366 bytes) for connection b4d2b953ffb41697, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 573b5648c0a0c3ef, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.PingFrame{} 2025/04/30 17:41:31 Received request: GET /kpfmbhfnev 2025/04/30 17:41:31 server -> Sending packet 3 (34 bytes) for connection b4d2b953ffb41697, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 573b5648c0a0c3ef, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 210.032µs} 2025/04/30 17:41:31 server -> Sending packet 4 (1053 bytes) for connection b4d2b953ffb41697, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 573b5648c0a0c3ef, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:31 server <- Reading packet 4 (43 bytes) for connection 0ec6cda2, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 0ec6cda2, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:31 server Sending ACK because the ACK timer expired. 2025/04/30 17:41:31 server -> Sending packet 5 (35 bytes) for connection b4d2b953ffb41697, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 573b5648c0a0c3ef, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.255089ms} 2025/04/30 17:41:31 server <- Reading packet 5 (48 bytes) for connection 0ec6cda2, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 0ec6cda2, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:31 server newly acked packets (1): [2] 2025/04/30 17:41:31 server updated RTT: 37.051ms (σ: 13.944ms) 2025/04/30 17:41:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:31 server <- Reading packet 6 (31 bytes) for connection 0ec6cda2, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 0ec6cda2, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:31 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:31 Replacing connection for connection IDs [0ec6cda2 aba71531] with a closed connection. 2025/04/30 17:41:31 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:31 server Connection b4d2b953ffb41697 closed. 2025/04/30 17:41:31 server <- Received Initial packet. 2025/04/30 17:41:31 Created qlog file: /logs/qlog/84d636394d5f5a5b.sqlog 2025/04/30 17:41:31 server Changing connection ID to 592bec16. 2025/04/30 17:41:31 Adding connection IDs 84d636394d5f5a5b and 592bec16 for a new connection. 2025/04/30 17:41:31 server <- Reading packet 0 (1200 bytes) for connection 84d636394d5f5a5b, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 84d636394d5f5a5b, SrcConnectionID: 9897d2b9a31ba13a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 9897d2b9a31ba13a, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:31 Adding connection ID ad5756c2. 2025/04/30 17:41:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 84d636394d5f5a5b 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 9897d2b9a31ba13a, SrcConnectionID: 592bec16, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 463, Version: v1} 2025/04/30 17:41:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:31 server Long Header{Type: Handshake, DestConnectionID: 9897d2b9a31ba13a, SrcConnectionID: 592bec16, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 17:41:31 server Short Header{DestConnectionID: 9897d2b9a31ba13a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad5756c2, StatelessResetToken: 0x9389578fd9ea74db072aeec31832cfa4} 2025/04/30 17:41:31 Removing connection ID 3c258a3bae51d34f after it has been retired. 2025/04/30 17:41:31 Removing connection IDs [e43f8286 2bc96c24] for a closed connection after it has been retired. 2025/04/30 17:41:31 server <- Reading packet 1 (1200 bytes) for connection 84d636394d5f5a5b, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 84d636394d5f5a5b, SrcConnectionID: 9897d2b9a31ba13a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:31 server -> Sending packet 1 (45 bytes) for connection 84d636394d5f5a5b, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 9897d2b9a31ba13a, SrcConnectionID: 592bec16, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:31 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:31 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:31 server -> Sending packet 2 (1280 bytes) for connection 84d636394d5f5a5b, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 9897d2b9a31ba13a, SrcConnectionID: 592bec16, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:31 server -> Sending packet 3 (1280 bytes) for connection 84d636394d5f5a5b, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 9897d2b9a31ba13a, SrcConnectionID: 592bec16, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:31 server <- Reading packet 2 (1201 bytes) for connection 592bec16, Initial 2025/04/30 17:41:31 server Long Header{Type: Initial, DestConnectionID: 592bec16, SrcConnectionID: 9897d2b9a31ba13a, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:31 server <- Reading packet 0 (40 bytes) for connection 592bec16, Handshake 2025/04/30 17:41:31 server Long Header{Type: Handshake, DestConnectionID: 592bec16, SrcConnectionID: 9897d2b9a31ba13a, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:31 server Dropping Initial keys. 2025/04/30 17:41:31 server <- &wire.PingFrame{} 2025/04/30 17:41:31 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:31 server -> Sending packet 1 (749 bytes) for connection 84d636394d5f5a5b, Handshake 2025/04/30 17:41:31 server Long Header{Type: Handshake, DestConnectionID: 9897d2b9a31ba13a, SrcConnectionID: 592bec16, PacketNumber: 1, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 17:41:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 17:41:31 server -> Sending packet 2 (744 bytes) for connection 84d636394d5f5a5b, Handshake 2025/04/30 17:41:31 server Long Header{Type: Handshake, DestConnectionID: 9897d2b9a31ba13a, SrcConnectionID: 592bec16, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 17:41:31 server <- Reading packet 1 (76 bytes) for connection 592bec16, Handshake 2025/04/30 17:41:31 server Long Header{Type: Handshake, DestConnectionID: 592bec16, SrcConnectionID: 9897d2b9a31ba13a, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:31 Retiring connection ID 84d636394d5f5a5b in 5s. 2025/04/30 17:41:31 server Dropping Handshake keys. 2025/04/30 17:41:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:31 server -> Sending packet 2 (280 bytes) for connection 84d636394d5f5a5b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 9897d2b9a31ba13a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad5756c2, StatelessResetToken: 0x9389578fd9ea74db072aeec31832cfa4} 2025/04/30 17:41:31 server -> &wire.NewTokenFrame{Token: 0xde154df5a9c69e8864b3669372bc548754da45ba1b7475aae1ae1ec542548eeb1858efc18bc87658bf5470c46e1ff0dc6655dff68b83ee48c368331d33ac3ca01a9eab38ca49d8ce213898c3c4c670e2b0a9abe11e3d} 2025/04/30 17:41:31 server -> Sending packet 3 (280 bytes) for connection 84d636394d5f5a5b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 9897d2b9a31ba13a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:31 server -> &wire.NewTokenFrame{Token: 0xde154df5a9c69e8864b3669372bc548754da45ba1b7475aae1ae1ec542548eeb1858efc18bc87658bf5470c46e1ff0dc6655dff68b83ee48c368331d33ac3ca01a9eab38ca49d8ce213898c3c4c670e2b0a9abe11e3d} 2025/04/30 17:41:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad5756c2, StatelessResetToken: 0x9389578fd9ea74db072aeec31832cfa4} 2025/04/30 17:41:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:31 server -> Sending packet 4 (1366 bytes) for connection 84d636394d5f5a5b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 9897d2b9a31ba13a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.PingFrame{} 2025/04/30 17:41:31 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:31 server <- Reading packet 0 (43 bytes) for connection 592bec16, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 592bec16, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:31 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:31 server -> Sending packet 5 (32 bytes) for connection 84d636394d5f5a5b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 9897d2b9a31ba13a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 77.415µs} 2025/04/30 17:41:31 Received request: GET /nstlwvjjqe 2025/04/30 17:41:31 server -> Sending packet 6 (1053 bytes) for connection 84d636394d5f5a5b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 9897d2b9a31ba13a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:31 server <- Reading packet 2 (28 bytes) for connection 592bec16, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 592bec16, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 19ms} 2025/04/30 17:41:31 server newly acked packets (2): [3 4] 2025/04/30 17:41:31 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:31 server -> Sending packet 7 (1409 bytes) for connection 84d636394d5f5a5b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 9897d2b9a31ba13a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.PingFrame{} 2025/04/30 17:41:31 server <- Reading packet 3 (30 bytes) for connection 592bec16, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 592bec16, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 2}}, DelayTime: 19ms} 2025/04/30 17:41:31 server newly acked packets (1): [7] 2025/04/30 17:41:31 server updated RTT: 51.983986ms (σ: 25.991993ms) 2025/04/30 17:41:31 server lost packet 6 (time threshold) 2025/04/30 17:41:31 server Canceling loss detection timer. 2025/04/30 17:41:31 server -> Sending packet 8 (1053 bytes) for connection 84d636394d5f5a5b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:31 server Short Header{DestConnectionID: 9897d2b9a31ba13a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:31 Removing connection ID 004ad08e8e909d66 after it has been retired. 2025/04/30 17:41:31 server <- Reading packet 4 (33 bytes) for connection 592bec16, 1-RTT 2025/04/30 17:41:31 server Short Header{DestConnectionID: 592bec16, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:31 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:31 Replacing connection for connection IDs [592bec16 ad5756c2] with a closed connection. 2025/04/30 17:41:31 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:31 server Connection 84d636394d5f5a5b closed. 2025/04/30 17:41:32 server <- Received Initial packet. 2025/04/30 17:41:32 Created qlog file: /logs/qlog/05069ff3ff97db1b.sqlog 2025/04/30 17:41:32 server Changing connection ID to c29a1556. 2025/04/30 17:41:32 Adding connection IDs 05069ff3ff97db1b and c29a1556 for a new connection. 2025/04/30 17:41:32 server <- Reading packet 0 (1200 bytes) for connection 05069ff3ff97db1b, Initial 2025/04/30 17:41:32 server Long Header{Type: Initial, DestConnectionID: 05069ff3ff97db1b, SrcConnectionID: 6be7849d9a1f75e4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6be7849d9a1f75e4, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:32 Adding connection ID d6c258e8. 2025/04/30 17:41:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 05069ff3ff97db1b 2025/04/30 17:41:32 server Long Header{Type: Initial, DestConnectionID: 6be7849d9a1f75e4, SrcConnectionID: c29a1556, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 460, Version: v1} 2025/04/30 17:41:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:32 server Long Header{Type: Handshake, DestConnectionID: 6be7849d9a1f75e4, SrcConnectionID: c29a1556, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:32 server Short Header{DestConnectionID: 6be7849d9a1f75e4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d6c258e8, StatelessResetToken: 0x373ae48252ddcb185b07007fd391ae78} 2025/04/30 17:41:32 Removing connection IDs [8d9e3fc9 60e4c52a] for a closed connection after it has been retired. 2025/04/30 17:41:32 server <- Reading packet 1 (1201 bytes) for connection c29a1556, Initial 2025/04/30 17:41:32 server Long Header{Type: Initial, DestConnectionID: c29a1556, SrcConnectionID: 6be7849d9a1f75e4, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:32 server newly acked packets (1): [0] 2025/04/30 17:41:32 server updated RTT: 36.038351ms (σ: 18.019175ms) 2025/04/30 17:41:32 server <- Reading packet 0 (76 bytes) for connection c29a1556, Handshake 2025/04/30 17:41:32 server Long Header{Type: Handshake, DestConnectionID: c29a1556, SrcConnectionID: 6be7849d9a1f75e4, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:32 server Dropping Initial keys. 2025/04/30 17:41:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:32 Retiring connection ID 05069ff3ff97db1b in 5s. 2025/04/30 17:41:32 server Dropping Handshake keys. 2025/04/30 17:41:32 server -> Sending packet 1 (259 bytes) for connection 05069ff3ff97db1b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:32 server Short Header{DestConnectionID: 6be7849d9a1f75e4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:32 server -> &wire.NewTokenFrame{Token: 0x79e1062c1b891ac5f7ebb21eec4a520b3451195d0b19e08c44bfb486f1ee1a48c1aa7036692d87916be201b4c602bf0970d16233e126019d00b66e24f83bffbe2abdf84c6d3886c1cacb2d81b3389e07e603f6f9440c} 2025/04/30 17:41:32 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:32 Removing connection ID 2d66d107ad4f58a1 after it has been retired. 2025/04/30 17:41:32 server <- Reading packet 1 (28 bytes) for connection c29a1556, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: c29a1556, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 17:41:32 server newly acked packets (2): [0 1] 2025/04/30 17:41:32 server updated RTT: 37.993ms (σ: 17.425ms) 2025/04/30 17:41:32 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:32 server Canceling loss detection timer. 2025/04/30 17:41:32 Removing connection IDs [eccc60c9 291e84bf] for a closed connection after it has been retired. 2025/04/30 17:41:32 Removing connection ID 32853a6d784ca384 after it has been retired. 2025/04/30 17:41:32 Removing connection IDs [8093f3aa 9c940a74] for a closed connection after it has been retired. 2025/04/30 17:41:32 server <- Reading packet 3 (43 bytes) for connection c29a1556, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: c29a1556, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:32 server -> Sending packet 2 (1366 bytes) for connection 05069ff3ff97db1b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: 6be7849d9a1f75e4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.PingFrame{} 2025/04/30 17:41:32 server -> Sending packet 3 (34 bytes) for connection 05069ff3ff97db1b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: 6be7849d9a1f75e4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 Received request: GET /bzzipxygqn 2025/04/30 17:41:32 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 164.797µs} 2025/04/30 17:41:32 server -> Sending packet 4 (1053 bytes) for connection 05069ff3ff97db1b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: 6be7849d9a1f75e4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:32 server <- Reading packet 5 (48 bytes) for connection c29a1556, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: c29a1556, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:32 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:32 server newly acked packets (1): [2] 2025/04/30 17:41:32 server updated RTT: 37.385ms (σ: 14.284ms) 2025/04/30 17:41:32 server Queuing ACK because there's a new missing packet to report. 2025/04/30 17:41:32 server -> Sending packet 5 (36 bytes) for connection 05069ff3ff97db1b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: 6be7849d9a1f75e4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 149.829µs} 2025/04/30 17:41:32 server <- Reading packet 6 (31 bytes) for connection c29a1556, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: c29a1556, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:32 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:32 Replacing connection for connection IDs [c29a1556 d6c258e8] with a closed connection. 2025/04/30 17:41:32 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:32 server Connection 05069ff3ff97db1b closed. 2025/04/30 17:41:32 server <- Received Initial packet. 2025/04/30 17:41:32 Created qlog file: /logs/qlog/df632b9d0c03e42a.sqlog 2025/04/30 17:41:32 server Changing connection ID to 3fc005d8. 2025/04/30 17:41:32 Adding connection IDs df632b9d0c03e42a and 3fc005d8 for a new connection. 2025/04/30 17:41:32 server <- Reading packet 0 (1200 bytes) for connection df632b9d0c03e42a, Initial 2025/04/30 17:41:32 server Long Header{Type: Initial, DestConnectionID: df632b9d0c03e42a, SrcConnectionID: bfc0e2139c223110, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: bfc0e2139c223110, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:32 Adding connection ID 8e8f3d26. 2025/04/30 17:41:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection df632b9d0c03e42a 2025/04/30 17:41:32 server Long Header{Type: Initial, DestConnectionID: bfc0e2139c223110, SrcConnectionID: 3fc005d8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 462, Version: v1} 2025/04/30 17:41:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:32 server Long Header{Type: Handshake, DestConnectionID: bfc0e2139c223110, SrcConnectionID: 3fc005d8, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 17:41:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e8f3d26, StatelessResetToken: 0xf0ec0cfa23a5cfd2dbb1eae61a9b65a8} 2025/04/30 17:41:32 server <- Reading packet 1 (1201 bytes) for connection 3fc005d8, Initial 2025/04/30 17:41:32 server Long Header{Type: Initial, DestConnectionID: 3fc005d8, SrcConnectionID: bfc0e2139c223110, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:32 server newly acked packets (1): [0] 2025/04/30 17:41:32 server updated RTT: 35.950833ms (σ: 17.975416ms) 2025/04/30 17:41:32 server <- Reading packet 0 (76 bytes) for connection 3fc005d8, Handshake 2025/04/30 17:41:32 server Long Header{Type: Handshake, DestConnectionID: 3fc005d8, SrcConnectionID: bfc0e2139c223110, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:32 server Dropping Initial keys. 2025/04/30 17:41:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:32 Retiring connection ID df632b9d0c03e42a in 5s. 2025/04/30 17:41:32 server Dropping Handshake keys. 2025/04/30 17:41:32 server -> Sending packet 1 (259 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:32 server -> &wire.NewTokenFrame{Token: 0x76a19056017c585b459c780e057b0a262d49cd2cebd99d311ada49b7741913a2a4d1c5068b04ceb6b87e5cf04e46129b031d878da85ec21a7ed3b88fa9a25050c26c2bb5692dd5b8b4d99d12b413c9e344f8e8f9e2a7} 2025/04/30 17:41:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:32 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:32 server -> Sending packet 3 (51 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e8f3d26, StatelessResetToken: 0xf0ec0cfa23a5cfd2dbb1eae61a9b65a8} 2025/04/30 17:41:32 server Skipping packet number 2 2025/04/30 17:41:32 server -> Sending packet 4 (259 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:32 server -> &wire.NewTokenFrame{Token: 0x76a19056017c585b459c780e057b0a262d49cd2cebd99d311ada49b7741913a2a4d1c5068b04ceb6b87e5cf04e46129b031d878da85ec21a7ed3b88fa9a25050c26c2bb5692dd5b8b4d99d12b413c9e344f8e8f9e2a7} 2025/04/30 17:41:32 server <- Reading packet 1 (43 bytes) for connection 3fc005d8, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: 3fc005d8, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:32 server -> Sending packet 5 (32 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 96.63µs} 2025/04/30 17:41:32 Received request: GET /edunnhllbw 2025/04/30 17:41:32 server -> Sending packet 6 (1053 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:32 server <- Reading packet 2 (30 bytes) for connection 3fc005d8, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: 3fc005d8, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 17:41:32 server newly acked packets (1): [4] 2025/04/30 17:41:32 server updated RTT: 37.959ms (σ: 17.5ms) 2025/04/30 17:41:32 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:32 server setting loss timer for packet 3 (1-RTT) to 58.530395ms (in 2025-04-30 17:41:32.679890929 +0000 UTC m=+9.680364985) 2025/04/30 17:41:32 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 17:41:32.679890929 +0000 UTC m=+9.680364985 2025/04/30 17:41:32 server lost packet 3 (time threshold) 2025/04/30 17:41:32 server -> Sending packet 7 (1366 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.PingFrame{} 2025/04/30 17:41:32 server -> Sending packet 8 (51 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e8f3d26, StatelessResetToken: 0xf0ec0cfa23a5cfd2dbb1eae61a9b65a8} 2025/04/30 17:41:32 server <- Reading packet 5 (43 bytes) for connection 3fc005d8, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: 3fc005d8, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:32 server Queuing ACK because there's a new missing packet to report. 2025/04/30 17:41:32 server -> Sending packet 9 (34 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 126.216µs} 2025/04/30 17:41:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:32 server -> Sending packet 11 (1053 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:32 server Skipping packet number 10 2025/04/30 17:41:32 server -> Sending packet 12 (51 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8e8f3d26, StatelessResetToken: 0xf0ec0cfa23a5cfd2dbb1eae61a9b65a8} 2025/04/30 17:41:32 Removing connection ID d4199e1edb273363 after it has been retired. 2025/04/30 17:41:32 server <- Reading packet 6 (33 bytes) for connection 3fc005d8, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: 3fc005d8, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:32 server newly acked packets (2): [11 12] 2025/04/30 17:41:32 server updated RTT: 37.35ms (σ: 14.342ms) 2025/04/30 17:41:32 server lost packet 7 (time threshold) 2025/04/30 17:41:32 server Canceling loss detection timer. 2025/04/30 17:41:32 server -> Sending packet 13 (30 bytes) for connection df632b9d0c03e42a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:32 server Short Header{DestConnectionID: bfc0e2139c223110, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:32 server <- Reading packet 7 (37 bytes) for connection 3fc005d8, 1-RTT 2025/04/30 17:41:32 server Short Header{DestConnectionID: 3fc005d8, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:32 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:32 Replacing connection for connection IDs [3fc005d8 8e8f3d26] with a closed connection. 2025/04/30 17:41:32 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:32 server Connection df632b9d0c03e42a closed. 2025/04/30 17:41:32 Removing connection IDs [30db3eb7 71a67268] for a closed connection after it has been retired. 2025/04/30 17:41:33 Tracking 36 connection IDs and 0 reset tokens. 2025/04/30 17:41:33 server <- Received Initial packet. 2025/04/30 17:41:33 Created qlog file: /logs/qlog/4f6e0806cd51be2a.sqlog 2025/04/30 17:41:33 server Changing connection ID to 0d847b51. 2025/04/30 17:41:33 Adding connection IDs 4f6e0806cd51be2a and 0d847b51 for a new connection. 2025/04/30 17:41:33 server <- Reading packet 1 (1200 bytes) for connection 4f6e0806cd51be2a, Initial 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: 4f6e0806cd51be2a, SrcConnectionID: 16449b307d5a2bc3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 16449b307d5a2bc3, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:33 Adding connection ID fa17e183. 2025/04/30 17:41:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4f6e0806cd51be2a 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: 16449b307d5a2bc3, SrcConnectionID: 0d847b51, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 454, Version: v1} 2025/04/30 17:41:33 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:33 server Long Header{Type: Handshake, DestConnectionID: 16449b307d5a2bc3, SrcConnectionID: 0d847b51, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fa17e183, StatelessResetToken: 0xc6ba7216e94aabcf60ca6016b254db1f} 2025/04/30 17:41:33 server <- Reading packet 2 (1200 bytes) for connection 0d847b51, Initial 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: 0d847b51, SrcConnectionID: 16449b307d5a2bc3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 17:41:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:33 server -> Sending packet 1 (45 bytes) for connection 4f6e0806cd51be2a, Initial 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: 16449b307d5a2bc3, SrcConnectionID: 0d847b51, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:33 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:33 server <- Reading packet 0 (76 bytes) for connection 0d847b51, Handshake 2025/04/30 17:41:33 server Long Header{Type: Handshake, DestConnectionID: 0d847b51, SrcConnectionID: 16449b307d5a2bc3, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:33 server Dropping Initial keys. 2025/04/30 17:41:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:33 Retiring connection ID 4f6e0806cd51be2a in 5s. 2025/04/30 17:41:33 server Dropping Handshake keys. 2025/04/30 17:41:33 server -> Sending packet 1 (1366 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.PingFrame{} 2025/04/30 17:41:33 server -> Sending packet 2 (256 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:33 server -> &wire.NewTokenFrame{Token: 0x4bec43cc5232eaad547211bfff4780b9842f293d22a263dab7ebeaaa8da38f4f70d21709e10626272d2f3d36c478585de4b53230d171abc3edba8d22b72bb45beb533e5951c30264ce0ee54765b36132b04ef350a299} 2025/04/30 17:41:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:33 Removing connection ID 95638fae473b94fd after it has been retired. 2025/04/30 17:41:33 server <- Reading packet 2 (28 bytes) for connection 0d847b51, 1-RTT 2025/04/30 17:41:33 server Short Header{DestConnectionID: 0d847b51, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:33 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 17:41:33 server newly acked packets (2): [0 1] 2025/04/30 17:41:33 server updated RTT: 51.655158ms (σ: 25.827579ms) 2025/04/30 17:41:33 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:33 Removing connection IDs [3fa5ccc9 1ebd374f] for a closed connection after it has been retired. 2025/04/30 17:41:33 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 17:41:33 Removing connection ID dd8ae5a787e88e6c after it has been retired. 2025/04/30 17:41:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:33 server -> Sending packet 4 (256 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:33 server -> &wire.NewTokenFrame{Token: 0x4bec43cc5232eaad547211bfff4780b9842f293d22a263dab7ebeaaa8da38f4f70d21709e10626272d2f3d36c478585de4b53230d171abc3edba8d22b72bb45beb533e5951c30264ce0ee54765b36132b04ef350a299} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:33 server -> Sending packet 5 (256 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:33 server -> &wire.NewTokenFrame{Token: 0x4bec43cc5232eaad547211bfff4780b9842f293d22a263dab7ebeaaa8da38f4f70d21709e10626272d2f3d36c478585de4b53230d171abc3edba8d22b72bb45beb533e5951c30264ce0ee54765b36132b04ef350a299} 2025/04/30 17:41:33 server <- Reading packet 3 (43 bytes) for connection 0d847b51, 1-RTT 2025/04/30 17:41:33 server Short Header{DestConnectionID: 0d847b51, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:33 server -> Sending packet 6 (32 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 131.656µs} 2025/04/30 17:41:33 Received request: GET /cxusrwkoxt 2025/04/30 17:41:33 server <- Reading packet 4 (29 bytes) for connection 0d847b51, 1-RTT 2025/04/30 17:41:33 server Short Header{DestConnectionID: 0d847b51, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:33 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:33 server newly acked packets (1): [5] 2025/04/30 17:41:33 server updated RTT: 49.286ms (σ: 24.107ms) 2025/04/30 17:41:33 server Canceling loss detection timer. 2025/04/30 17:41:33 server -> Sending packet 7 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:33 server <- Reading packet 5 (48 bytes) for connection 0d847b51, 1-RTT 2025/04/30 17:41:33 server Short Header{DestConnectionID: 0d847b51, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:33 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/04/30 17:41:33 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:33 server -> Sending packet 8 (1409 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.PingFrame{} 2025/04/30 17:41:33 server Sending ACK because the ACK timer expired. 2025/04/30 17:41:33 server -> Sending packet 9 (33 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 25.407482ms} 2025/04/30 17:41:33 server <- Reading packet 6 (30 bytes) for connection 0d847b51, 1-RTT 2025/04/30 17:41:33 server Short Header{DestConnectionID: 0d847b51, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:33 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}}, DelayTime: 19ms} 2025/04/30 17:41:33 server newly acked packets (1): [8] 2025/04/30 17:41:33 server updated RTT: 47.271ms (σ: 22.109ms) 2025/04/30 17:41:33 server lost packet 7 (time threshold) 2025/04/30 17:41:33 server Canceling loss detection timer. 2025/04/30 17:41:33 server -> Sending packet 10 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:33 server <- Reading packet 7 (43 bytes) for connection 0d847b51, 1-RTT 2025/04/30 17:41:33 server Short Header{DestConnectionID: 0d847b51, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:33 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:33 Removing connection IDs [16346738 a7a987dc] for a closed connection after it has been retired. 2025/04/30 17:41:33 server Sending ACK because the ACK timer expired. 2025/04/30 17:41:33 server -> Sending packet 11 (33 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, DelayTime: 25.407797ms} 2025/04/30 17:41:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:33 server -> Sending packet 13 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:33 server -> Sending packet 14 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:33 server <- Received Initial packet. 2025/04/30 17:41:33 Created qlog file: /logs/qlog/1bbcfa15fcd195b5.sqlog 2025/04/30 17:41:33 server Changing connection ID to 8682df25. 2025/04/30 17:41:33 Adding connection IDs 1bbcfa15fcd195b5 and 8682df25 for a new connection. 2025/04/30 17:41:33 server <- Reading packet 0 (1200 bytes) for connection 1bbcfa15fcd195b5, Initial 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: 1bbcfa15fcd195b5, SrcConnectionID: dae3a611a28aebda, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: dae3a611a28aebda, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:33 Adding connection ID 8363cbf2. 2025/04/30 17:41:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1bbcfa15fcd195b5 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: dae3a611a28aebda, SrcConnectionID: 8682df25, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 460, Version: v1} 2025/04/30 17:41:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:33 server Long Header{Type: Handshake, DestConnectionID: dae3a611a28aebda, SrcConnectionID: 8682df25, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:33 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8363cbf2, StatelessResetToken: 0x9cc49263e1724e1e1138ebffa345a5c0} 2025/04/30 17:41:33 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:33 server -> Sending packet 1 (1280 bytes) for connection 1bbcfa15fcd195b5, Initial 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: dae3a611a28aebda, SrcConnectionID: 8682df25, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:33 server -> Sending packet 2 (1280 bytes) for connection 1bbcfa15fcd195b5, Initial 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: dae3a611a28aebda, SrcConnectionID: 8682df25, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:33 server Canceling loss detection timer. 2025/04/30 17:41:33 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 17:41:33 Removing connection ID 797e13d43990816a after it has been retired. 2025/04/30 17:41:33 server <- Reading packet 2 (1201 bytes) for connection 8682df25, Initial 2025/04/30 17:41:33 server Long Header{Type: Initial, DestConnectionID: 8682df25, SrcConnectionID: dae3a611a28aebda, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:33 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:33 Removing connection IDs [b186d252 8e8302d5] for a closed connection after it has been retired. 2025/04/30 17:41:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 17:41:33 server -> Sending packet 16 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:33 server -> Sending packet 17 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:33 server -> Sending packet 18 (1430 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:33 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:33 server -> &wire.PingFrame{} 2025/04/30 17:41:34 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:34 Removing connection ID a61f4d0ba23cb7a1 after it has been retired. 2025/04/30 17:41:34 server -> Sending packet 1 (747 bytes) for connection 1bbcfa15fcd195b5, Handshake 2025/04/30 17:41:34 server Long Header{Type: Handshake, DestConnectionID: dae3a611a28aebda, SrcConnectionID: 8682df25, PacketNumber: 1, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:34 server -> Sending packet 2 (747 bytes) for connection 1bbcfa15fcd195b5, Handshake 2025/04/30 17:41:34 server Long Header{Type: Handshake, DestConnectionID: dae3a611a28aebda, SrcConnectionID: 8682df25, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:34 Removing connection IDs [649bcb69 59c68bce] for a closed connection after it has been retired. 2025/04/30 17:41:34 server <- Reading packet 1 (42 bytes) for connection 8682df25, Handshake 2025/04/30 17:41:34 server Long Header{Type: Handshake, DestConnectionID: 8682df25, SrcConnectionID: dae3a611a28aebda, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:34 server Dropping Initial keys. 2025/04/30 17:41:34 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:34 server newly acked packets (1): [2] 2025/04/30 17:41:34 server updated RTT: 36.019762ms (σ: 18.009881ms) 2025/04/30 17:41:34 server Canceling loss detection timer. 2025/04/30 17:41:34 server Queueing packet (43 bytes) for later decryption 2025/04/30 17:41:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 17:41:34 server -> Sending packet 20 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:34 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:34 server -> Sending packet 21 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:34 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:34 server <- Reading packet 3 (76 bytes) for connection 8682df25, Handshake 2025/04/30 17:41:34 server Long Header{Type: Handshake, DestConnectionID: 8682df25, SrcConnectionID: dae3a611a28aebda, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:34 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:34 Retiring connection ID 1bbcfa15fcd195b5 in 5s. 2025/04/30 17:41:34 server Dropping Handshake keys. 2025/04/30 17:41:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:34 server -> Sending packet 2 (283 bytes) for connection 1bbcfa15fcd195b5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:34 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8363cbf2, StatelessResetToken: 0x9cc49263e1724e1e1138ebffa345a5c0} 2025/04/30 17:41:34 server -> &wire.NewTokenFrame{Token: 0xe5b8a6ecb908125a1e13cc5ab38a51e507272a02ea21aad433e7db5df77bfbb2e2e6d82ad2b8fa89d7d774126dddad83aa624d9309707f48f72c71baf6114fc3fe67d776a5c1c9d8b15e5e65dc00c0baf321740b8911} 2025/04/30 17:41:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:34 server -> Sending packet 3 (283 bytes) for connection 1bbcfa15fcd195b5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:34 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8363cbf2, StatelessResetToken: 0x9cc49263e1724e1e1138ebffa345a5c0} 2025/04/30 17:41:34 server -> &wire.NewTokenFrame{Token: 0xe5b8a6ecb908125a1e13cc5ab38a51e507272a02ea21aad433e7db5df77bfbb2e2e6d82ad2b8fa89d7d774126dddad83aa624d9309707f48f72c71baf6114fc3fe67d776a5c1c9d8b15e5e65dc00c0baf321740b8911} 2025/04/30 17:41:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:34 server <- Reading packet 0 (43 bytes) for connection 8682df25, 1-RTT 2025/04/30 17:41:34 server Short Header{DestConnectionID: 8682df25, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:34 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:34 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:34 server -> Sending packet 4 (35 bytes) for connection 1bbcfa15fcd195b5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:34 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 600.243054ms} 2025/04/30 17:41:34 Received request: GET /wnjirffzoc 2025/04/30 17:41:34 server -> Sending packet 5 (1053 bytes) for connection 1bbcfa15fcd195b5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:34 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:34 server <- Reading packet 2 (28 bytes) for connection 8682df25, 1-RTT 2025/04/30 17:41:34 server Short Header{DestConnectionID: 8682df25, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:34 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 19ms} 2025/04/30 17:41:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 17:41:34 server -> Sending packet 7 (283 bytes) for connection 1bbcfa15fcd195b5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:34 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.NewTokenFrame{Token: 0xe5b8a6ecb908125a1e13cc5ab38a51e507272a02ea21aad433e7db5df77bfbb2e2e6d82ad2b8fa89d7d774126dddad83aa624d9309707f48f72c71baf6114fc3fe67d776a5c1c9d8b15e5e65dc00c0baf321740b8911} 2025/04/30 17:41:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8363cbf2, StatelessResetToken: 0x9cc49263e1724e1e1138ebffa345a5c0} 2025/04/30 17:41:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:34 server Skipping packet number 6 2025/04/30 17:41:34 server -> Sending packet 8 (1053 bytes) for connection 1bbcfa15fcd195b5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:34 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:34 server -> Sending packet 9 (1366 bytes) for connection 1bbcfa15fcd195b5, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:34 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.PingFrame{} 2025/04/30 17:41:34 server <- Reading packet 3 (29 bytes) for connection 8682df25, 1-RTT 2025/04/30 17:41:34 server Short Header{DestConnectionID: 8682df25, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:34 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 17:41:34 server newly acked packets (2): [7 8] 2025/04/30 17:41:34 server updated RTT: 35.617ms (σ: 14.31ms) 2025/04/30 17:41:34 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:34 server Canceling loss detection timer. 2025/04/30 17:41:34 server -> Sending packet 10 (30 bytes) for connection 1bbcfa15fcd195b5, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:34 server Short Header{DestConnectionID: dae3a611a28aebda, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:34 server <- Reading packet 4 (37 bytes) for connection 8682df25, 1-RTT 2025/04/30 17:41:34 server Short Header{DestConnectionID: 8682df25, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:34 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:34 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:34 Replacing connection for connection IDs [8682df25 8363cbf2] with a closed connection. 2025/04/30 17:41:34 server Connection 1bbcfa15fcd195b5 closed. 2025/04/30 17:41:34 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:35 Tracking 30 connection IDs and 0 reset tokens. 2025/04/30 17:41:35 server <- Received Initial packet. 2025/04/30 17:41:35 Created qlog file: /logs/qlog/61e709fcb57c67d9.sqlog 2025/04/30 17:41:35 server Changing connection ID to b993c36b. 2025/04/30 17:41:35 Adding connection IDs 61e709fcb57c67d9 and b993c36b for a new connection. 2025/04/30 17:41:35 server <- Reading packet 1 (1200 bytes) for connection 61e709fcb57c67d9, Initial 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: 61e709fcb57c67d9, SrcConnectionID: 21b8607a9e0de1da, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 21b8607a9e0de1da, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:35 Adding connection ID 3e2d9759. 2025/04/30 17:41:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 61e709fcb57c67d9 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: 21b8607a9e0de1da, SrcConnectionID: b993c36b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 467, Version: v1} 2025/04/30 17:41:35 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:35 server Long Header{Type: Handshake, DestConnectionID: 21b8607a9e0de1da, SrcConnectionID: b993c36b, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 17:41:35 server Short Header{DestConnectionID: 21b8607a9e0de1da, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e2d9759, StatelessResetToken: 0xa4262ea6ab6f663b617812921617f860} 2025/04/30 17:41:35 server <- Reading packet 3 (1201 bytes) for connection b993c36b, Initial 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: b993c36b, SrcConnectionID: 21b8607a9e0de1da, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:35 server newly acked packets (1): [0] 2025/04/30 17:41:35 server updated RTT: 35.935759ms (σ: 17.967879ms) 2025/04/30 17:41:35 server <- Reading packet 0 (76 bytes) for connection b993c36b, Handshake 2025/04/30 17:41:35 server Long Header{Type: Handshake, DestConnectionID: b993c36b, SrcConnectionID: 21b8607a9e0de1da, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:35 server Dropping Initial keys. 2025/04/30 17:41:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 Retiring connection ID 61e709fcb57c67d9 in 5s. 2025/04/30 17:41:35 server Dropping Handshake keys. 2025/04/30 17:41:35 server -> Sending packet 1 (259 bytes) for connection 61e709fcb57c67d9, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:35 server Short Header{DestConnectionID: 21b8607a9e0de1da, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.NewTokenFrame{Token: 0x7de52a1edc13c306791269a60d0d3c4073a02ef32824c591429df0202c25dc3e0f0ad3859ba4a4d4c281b5f43dba05e0b68b44b21888bfeae3fdb239ed606b42657193d686d534fc205bd75b7af423221d71d6e22ed6} 2025/04/30 17:41:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:35 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:35 server <- Reading packet 0 (48 bytes) for connection b993c36b, 1-RTT 2025/04/30 17:41:35 server Short Header{DestConnectionID: b993c36b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:35 server newly acked packets (1): [0] 2025/04/30 17:41:35 server updated RTT: 36.243ms (σ: 14.091ms) 2025/04/30 17:41:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:35 Received request: GET /edzwubbdvm 2025/04/30 17:41:35 server -> Sending packet 2 (32 bytes) for connection 61e709fcb57c67d9, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:35 server Short Header{DestConnectionID: 21b8607a9e0de1da, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 117.439µs} 2025/04/30 17:41:35 server -> Sending packet 3 (1053 bytes) for connection 61e709fcb57c67d9, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:35 server Short Header{DestConnectionID: 21b8607a9e0de1da, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:35 server <- Reading packet 1 (28 bytes) for connection b993c36b, 1-RTT 2025/04/30 17:41:35 server Short Header{DestConnectionID: b993c36b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:35 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 19ms} 2025/04/30 17:41:35 server newly acked packets (1): [1] 2025/04/30 17:41:35 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:35 server -> Sending packet 5 (1053 bytes) for connection 61e709fcb57c67d9, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:35 server Short Header{DestConnectionID: 21b8607a9e0de1da, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:35 server -> Sending packet 6 (1053 bytes) for connection 61e709fcb57c67d9, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:35 server Short Header{DestConnectionID: 21b8607a9e0de1da, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:35 server <- Reading packet 2 (33 bytes) for connection b993c36b, 1-RTT 2025/04/30 17:41:35 server Short Header{DestConnectionID: b993c36b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:35 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 17:41:35 server newly acked packets (1): [6] 2025/04/30 17:41:35 server updated RTT: 35.868ms (σ: 11.318ms) 2025/04/30 17:41:35 server Canceling loss detection timer. 2025/04/30 17:41:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:35 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:35 Replacing connection for connection IDs [3e2d9759 b993c36b] with a closed connection. 2025/04/30 17:41:35 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:35 server Connection 61e709fcb57c67d9 closed. 2025/04/30 17:41:35 Removing connection ID 7ef6ab932594c3ba after it has been retired. 2025/04/30 17:41:35 Removing connection IDs [93b92f72 9d2ecc5b] for a closed connection after it has been retired. 2025/04/30 17:41:35 Removing connection ID b2c8964473c4c5f5 after it has been retired. 2025/04/30 17:41:35 Removing connection IDs [e88d6070 d38ad7bc] for a closed connection after it has been retired. 2025/04/30 17:41:35 server <- Received Initial packet. 2025/04/30 17:41:35 Created qlog file: /logs/qlog/71167ff7c8dd14f0.sqlog 2025/04/30 17:41:35 server Changing connection ID to df717020. 2025/04/30 17:41:35 Adding connection IDs 71167ff7c8dd14f0 and df717020 for a new connection. 2025/04/30 17:41:35 server <- Reading packet 1 (1200 bytes) for connection 71167ff7c8dd14f0, Initial 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: 71167ff7c8dd14f0, SrcConnectionID: a13ea9543c412ffb, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a13ea9543c412ffb, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:35 Adding connection ID c44aee81. 2025/04/30 17:41:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 71167ff7c8dd14f0 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: a13ea9543c412ffb, SrcConnectionID: df717020, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 464, Version: v1} 2025/04/30 17:41:35 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:35 server Long Header{Type: Handshake, DestConnectionID: a13ea9543c412ffb, SrcConnectionID: df717020, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 17:41:35 server Short Header{DestConnectionID: a13ea9543c412ffb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c44aee81, StatelessResetToken: 0x42fa8607769888944ea3baba2c7623d7} 2025/04/30 17:41:35 Removing connection ID c309d787b2e6f306 after it has been retired. 2025/04/30 17:41:35 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 17:41:35 server <- Reading packet 1 (42 bytes) for connection df717020, Handshake 2025/04/30 17:41:35 server Long Header{Type: Handshake, DestConnectionID: df717020, SrcConnectionID: a13ea9543c412ffb, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:35 server Dropping Initial keys. 2025/04/30 17:41:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:35 server newly acked packets (1): [0] 2025/04/30 17:41:35 server updated RTT: 38.836356ms (σ: 19.418178ms) 2025/04/30 17:41:35 server Canceling loss detection timer. 2025/04/30 17:41:35 server Queueing packet (48 bytes) for later decryption 2025/04/30 17:41:35 server <- Reading packet 2 (76 bytes) for connection df717020, Handshake 2025/04/30 17:41:35 server Long Header{Type: Handshake, DestConnectionID: df717020, SrcConnectionID: a13ea9543c412ffb, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 Retiring connection ID 71167ff7c8dd14f0 in 5s. 2025/04/30 17:41:35 server Dropping Handshake keys. 2025/04/30 17:41:35 server -> Sending packet 1 (259 bytes) for connection 71167ff7c8dd14f0, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:35 server Short Header{DestConnectionID: a13ea9543c412ffb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:35 server -> &wire.NewTokenFrame{Token: 0xf636b0de98edbee3094103cd1eefb5067fbd8a8c2fcdcb2e49122bbcecdaf2c165acb12ef504edf8b1a82c889102601197715810631852449cb502b6d4d0db36303274fd57b5ac46870c530990bbe3aa6c9e86c0ce89} 2025/04/30 17:41:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:35 server <- Reading packet 0 (48 bytes) for connection df717020, 1-RTT 2025/04/30 17:41:35 server Short Header{DestConnectionID: df717020, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:35 server newly acked packets (1): [0] 2025/04/30 17:41:35 server updated RTT: 38.836ms (σ: 14.563ms) 2025/04/30 17:41:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:35 Received request: GET /ypbdbndqxz 2025/04/30 17:41:35 server -> Sending packet 2 (33 bytes) for connection 71167ff7c8dd14f0, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:35 server Short Header{DestConnectionID: a13ea9543c412ffb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.093696ms} 2025/04/30 17:41:35 server -> Sending packet 3 (1053 bytes) for connection 71167ff7c8dd14f0, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:35 server Short Header{DestConnectionID: a13ea9543c412ffb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:35 server <- Reading packet 1 (43 bytes) for connection df717020, 1-RTT 2025/04/30 17:41:35 server Short Header{DestConnectionID: df717020, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:35 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:35 server <- Reading packet 2 (29 bytes) for connection df717020, 1-RTT 2025/04/30 17:41:35 server Short Header{DestConnectionID: df717020, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:35 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:35 server newly acked packets (2): [1 3] 2025/04/30 17:41:35 server updated RTT: 38.023ms (σ: 12.548ms) 2025/04/30 17:41:35 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:35 server Canceling loss detection timer. 2025/04/30 17:41:35 server -> Sending packet 4 (35 bytes) for connection 71167ff7c8dd14f0, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:35 server Short Header{DestConnectionID: a13ea9543c412ffb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 144.841µs} 2025/04/30 17:41:35 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:35 server <- Reading packet 3 (33 bytes) for connection df717020, 1-RTT 2025/04/30 17:41:35 server Short Header{DestConnectionID: df717020, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:35 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:35 Replacing connection for connection IDs [df717020 c44aee81] with a closed connection. 2025/04/30 17:41:35 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:35 server Connection 71167ff7c8dd14f0 closed. 2025/04/30 17:41:35 server <- Received Initial packet. 2025/04/30 17:41:35 Created qlog file: /logs/qlog/ea456fe8c9b60c9c.sqlog 2025/04/30 17:41:35 server Changing connection ID to 74e293f7. 2025/04/30 17:41:35 Adding connection IDs ea456fe8c9b60c9c and 74e293f7 for a new connection. 2025/04/30 17:41:35 server <- Reading packet 0 (1200 bytes) for connection ea456fe8c9b60c9c, Initial 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: ea456fe8c9b60c9c, SrcConnectionID: 079c1b6fc18fbf9d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 079c1b6fc18fbf9d, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:35 Adding connection ID 7706152b. 2025/04/30 17:41:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ea456fe8c9b60c9c 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 459, Version: v1} 2025/04/30 17:41:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:35 server Long Header{Type: Handshake, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 17:41:35 server Short Header{DestConnectionID: 079c1b6fc18fbf9d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7706152b, StatelessResetToken: 0x4b7042062fd7fecaa44dd222a2d4faa6} 2025/04/30 17:41:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 17:41:35 server -> Sending packet 23 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:35 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:35 server -> Sending packet 24 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:35 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:35 server <- Reading packet 1 (1200 bytes) for connection ea456fe8c9b60c9c, Initial 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: ea456fe8c9b60c9c, SrcConnectionID: 079c1b6fc18fbf9d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:35 server -> Sending packet 1 (45 bytes) for connection ea456fe8c9b60c9c, Initial 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:35 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:35 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:35 server -> Sending packet 2 (1280 bytes) for connection ea456fe8c9b60c9c, Initial 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:35 server -> Sending packet 3 (1280 bytes) for connection ea456fe8c9b60c9c, Initial 2025/04/30 17:41:35 server Long Header{Type: Initial, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:35 Removing connection IDs [141ff2ac aee649cc] for a closed connection after it has been retired. 2025/04/30 17:41:36 Removing connection ID 68a6b291f5dc732e after it has been retired. 2025/04/30 17:41:36 Removing connection IDs [3b575d53 c3269bc5] for a closed connection after it has been retired. 2025/04/30 17:41:36 Removing connection ID b4d2b953ffb41697 after it has been retired. 2025/04/30 17:41:36 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:36 server -> Sending packet 1 (748 bytes) for connection ea456fe8c9b60c9c, Handshake 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, PacketNumber: 1, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 17:41:36 server -> Sending packet 2 (748 bytes) for connection ea456fe8c9b60c9c, Handshake 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, PacketNumber: 2, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 17:41:36 server <- Reading packet 2 (40 bytes) for connection 74e293f7, Handshake 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 74e293f7, SrcConnectionID: 079c1b6fc18fbf9d, PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:36 server Dropping Initial keys. 2025/04/30 17:41:36 server <- &wire.PingFrame{} 2025/04/30 17:41:36 server -> Sending packet 3 (44 bytes) for connection ea456fe8c9b60c9c, Handshake 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:36 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:36 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:36 server -> Sending packet 4 (748 bytes) for connection ea456fe8c9b60c9c, Handshake 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, PacketNumber: 4, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 17:41:36 server -> Sending packet 5 (748 bytes) for connection ea456fe8c9b60c9c, Handshake 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 079c1b6fc18fbf9d, SrcConnectionID: 74e293f7, PacketNumber: 5, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 17:41:36 server Queueing packet (43 bytes) for later decryption 2025/04/30 17:41:36 server <- Reading packet 5 (42 bytes) for connection 74e293f7, Handshake 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 74e293f7, SrcConnectionID: 079c1b6fc18fbf9d, PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:36 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s} 2025/04/30 17:41:36 server newly acked packets (1): [5] 2025/04/30 17:41:36 server updated RTT: 35.787242ms (σ: 17.893621ms) 2025/04/30 17:41:36 server Canceling loss detection timer. 2025/04/30 17:41:36 Removing connection IDs [0ec6cda2 aba71531] for a closed connection after it has been retired. 2025/04/30 17:41:36 server <- Reading packet 6 (76 bytes) for connection 74e293f7, Handshake 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 74e293f7, SrcConnectionID: 079c1b6fc18fbf9d, PacketNumber: 6, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:36 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:36 Retiring connection ID ea456fe8c9b60c9c in 5s. 2025/04/30 17:41:36 server Dropping Handshake keys. 2025/04/30 17:41:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:36 server -> Sending packet 2 (283 bytes) for connection ea456fe8c9b60c9c, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:36 server Short Header{DestConnectionID: 079c1b6fc18fbf9d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7706152b, StatelessResetToken: 0x4b7042062fd7fecaa44dd222a2d4faa6} 2025/04/30 17:41:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:36 server -> &wire.NewTokenFrame{Token: 0x16fe233e03acdc382e6390092db81bf6c9cd691ed08f0d473889e34cd3b4f3ee9d19d55e549d34dd7dd77ceec7c3d89903db57245eb799d84e402f227fc15c46a57f7e233b60e4f88776e1f38382a3939e5d08a451f7} 2025/04/30 17:41:36 server -> Sending packet 3 (283 bytes) for connection ea456fe8c9b60c9c, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:36 server Short Header{DestConnectionID: 079c1b6fc18fbf9d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:36 server -> &wire.NewTokenFrame{Token: 0x16fe233e03acdc382e6390092db81bf6c9cd691ed08f0d473889e34cd3b4f3ee9d19d55e549d34dd7dd77ceec7c3d89903db57245eb799d84e402f227fc15c46a57f7e233b60e4f88776e1f38382a3939e5d08a451f7} 2025/04/30 17:41:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7706152b, StatelessResetToken: 0x4b7042062fd7fecaa44dd222a2d4faa6} 2025/04/30 17:41:36 server <- Reading packet 0 (43 bytes) for connection 74e293f7, 1-RTT 2025/04/30 17:41:36 server Short Header{DestConnectionID: 74e293f7, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:36 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:36 server -> Sending packet 4 (35 bytes) for connection ea456fe8c9b60c9c, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:36 server Short Header{DestConnectionID: 079c1b6fc18fbf9d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:36 Received request: GET /jhisckcniv 2025/04/30 17:41:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 315.438919ms} 2025/04/30 17:41:36 server -> Sending packet 5 (1053 bytes) for connection ea456fe8c9b60c9c, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:36 server Short Header{DestConnectionID: 079c1b6fc18fbf9d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:36 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 17:41:36 server <- Reading packet 1 (43 bytes) for connection 74e293f7, 1-RTT 2025/04/30 17:41:36 server Short Header{DestConnectionID: 74e293f7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:36 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:36 server <- Reading packet 3 (33 bytes) for connection 74e293f7, 1-RTT 2025/04/30 17:41:36 server Short Header{DestConnectionID: 74e293f7, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:36 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:36 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:36 Replacing connection for connection IDs [74e293f7 7706152b] with a closed connection. 2025/04/30 17:41:36 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:36 server Connection ea456fe8c9b60c9c closed. 2025/04/30 17:41:36 server <- Received Initial packet. 2025/04/30 17:41:36 Created qlog file: /logs/qlog/f56da0114bb48801.sqlog 2025/04/30 17:41:36 server Changing connection ID to ad1dbba0. 2025/04/30 17:41:36 Adding connection IDs f56da0114bb48801 and ad1dbba0 for a new connection. 2025/04/30 17:41:36 server <- Reading packet 0 (1200 bytes) for connection f56da0114bb48801, Initial 2025/04/30 17:41:36 server Long Header{Type: Initial, DestConnectionID: f56da0114bb48801, SrcConnectionID: 2b0a1d6194615714, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2b0a1d6194615714, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:36 Adding connection ID 32f5ea8c. 2025/04/30 17:41:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f56da0114bb48801 2025/04/30 17:41:36 server Long Header{Type: Initial, DestConnectionID: 2b0a1d6194615714, SrcConnectionID: ad1dbba0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 468, Version: v1} 2025/04/30 17:41:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:36 server Long Header{Type: Handshake, DestConnectionID: 2b0a1d6194615714, SrcConnectionID: ad1dbba0, PacketNumber: 0, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 17:41:36 server Short Header{DestConnectionID: 2b0a1d6194615714, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 32f5ea8c, StatelessResetToken: 0x9029d495b2f2f60facdd1c9fe6aab19e} 2025/04/30 17:41:36 Removing connection ID 84d636394d5f5a5b after it has been retired. 2025/04/30 17:41:36 server <- Reading packet 1 (1200 bytes) for connection f56da0114bb48801, Initial 2025/04/30 17:41:36 server Long Header{Type: Initial, DestConnectionID: f56da0114bb48801, SrcConnectionID: 2b0a1d6194615714, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:36 server -> Sending packet 1 (45 bytes) for connection f56da0114bb48801, Initial 2025/04/30 17:41:36 server Long Header{Type: Initial, DestConnectionID: 2b0a1d6194615714, SrcConnectionID: ad1dbba0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:36 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:36 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:36 server -> Sending packet 2 (1280 bytes) for connection f56da0114bb48801, Initial 2025/04/30 17:41:36 server Long Header{Type: Initial, DestConnectionID: 2b0a1d6194615714, SrcConnectionID: ad1dbba0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:36 server -> Sending packet 3 (1280 bytes) for connection f56da0114bb48801, Initial 2025/04/30 17:41:36 server Long Header{Type: Initial, DestConnectionID: 2b0a1d6194615714, SrcConnectionID: ad1dbba0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:36 Removing connection IDs [592bec16 ad5756c2] for a closed connection after it has been retired. 2025/04/30 17:41:37 Tracking 24 connection IDs and 0 reset tokens. 2025/04/30 17:41:37 Removing connection ID 05069ff3ff97db1b after it has been retired. 2025/04/30 17:41:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:37 server -> Sending packet 1 (739 bytes) for connection f56da0114bb48801, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: 2b0a1d6194615714, SrcConnectionID: ad1dbba0, PacketNumber: 1, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 17:41:37 server -> Sending packet 2 (739 bytes) for connection f56da0114bb48801, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: 2b0a1d6194615714, SrcConnectionID: ad1dbba0, PacketNumber: 2, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 17:41:37 server <- Reading packet 1 (40 bytes) for connection ad1dbba0, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: ad1dbba0, SrcConnectionID: 2b0a1d6194615714, PacketNumber: 1, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:37 server Dropping Initial keys. 2025/04/30 17:41:37 server <- &wire.PingFrame{} 2025/04/30 17:41:37 server -> Sending packet 3 (44 bytes) for connection f56da0114bb48801, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: 2b0a1d6194615714, SrcConnectionID: ad1dbba0, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:37 server <- Reading packet 3 (42 bytes) for connection ad1dbba0, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: ad1dbba0, SrcConnectionID: 2b0a1d6194615714, PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:37 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:37 server newly acked packets (1): [2] 2025/04/30 17:41:37 server updated RTT: 35.327136ms (σ: 17.663568ms) 2025/04/30 17:41:37 server Canceling loss detection timer. 2025/04/30 17:41:37 server Queueing packet (43 bytes) for later decryption 2025/04/30 17:41:37 server <- Reading packet 4 (81 bytes) for connection ad1dbba0, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: ad1dbba0, SrcConnectionID: 2b0a1d6194615714, PacketNumber: 4, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 17:41:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:37 Retiring connection ID f56da0114bb48801 in 5s. 2025/04/30 17:41:37 server Dropping Handshake keys. 2025/04/30 17:41:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:37 server -> Sending packet 2 (283 bytes) for connection f56da0114bb48801, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: 2b0a1d6194615714, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.NewTokenFrame{Token: 0x22b6331a70540f84de4415bcbec9055ca926c68404fa3274e8e14729ba2bbd4650acd06054e53136901beabb92daa6a5146a5002d4edc13c07cdbc9a68953f796f890bf1bf536caba706405910d3534a93d278f5620a} 2025/04/30 17:41:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 32f5ea8c, StatelessResetToken: 0x9029d495b2f2f60facdd1c9fe6aab19e} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:37 server -> Sending packet 3 (283 bytes) for connection f56da0114bb48801, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: 2b0a1d6194615714, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.NewTokenFrame{Token: 0x22b6331a70540f84de4415bcbec9055ca926c68404fa3274e8e14729ba2bbd4650acd06054e53136901beabb92daa6a5146a5002d4edc13c07cdbc9a68953f796f890bf1bf536caba706405910d3534a93d278f5620a} 2025/04/30 17:41:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 32f5ea8c, StatelessResetToken: 0x9029d495b2f2f60facdd1c9fe6aab19e} 2025/04/30 17:41:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:37 server <- Reading packet 0 (43 bytes) for connection ad1dbba0, 1-RTT 2025/04/30 17:41:37 server Short Header{DestConnectionID: ad1dbba0, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:37 server -> Sending packet 4 (33 bytes) for connection f56da0114bb48801, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: 2b0a1d6194615714, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 111.742228ms} 2025/04/30 17:41:37 Received request: GET /fhcsjaludr 2025/04/30 17:41:37 server -> Sending packet 5 (1053 bytes) for connection f56da0114bb48801, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: 2b0a1d6194615714, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:37 server <- Received Initial packet. 2025/04/30 17:41:37 Created qlog file: /logs/qlog/cb2c00da4ae54ee9.sqlog 2025/04/30 17:41:37 server Changing connection ID to 0de216ee. 2025/04/30 17:41:37 Adding connection IDs cb2c00da4ae54ee9 and 0de216ee for a new connection. 2025/04/30 17:41:37 server <- Reading packet 0 (1200 bytes) for connection cb2c00da4ae54ee9, Initial 2025/04/30 17:41:37 server Long Header{Type: Initial, DestConnectionID: cb2c00da4ae54ee9, SrcConnectionID: d2c776741461a956, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d2c776741461a956, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:37 Adding connection ID a6e9209a. 2025/04/30 17:41:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cb2c00da4ae54ee9 2025/04/30 17:41:37 server Long Header{Type: Initial, DestConnectionID: d2c776741461a956, SrcConnectionID: 0de216ee, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 455, Version: v1} 2025/04/30 17:41:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: d2c776741461a956, SrcConnectionID: 0de216ee, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6e9209a, StatelessResetToken: 0xb5daf04eff4fa552728055dbb1a681e6} 2025/04/30 17:41:37 Removing connection IDs [c29a1556 d6c258e8] for a closed connection after it has been retired. 2025/04/30 17:41:37 Removing connection ID df632b9d0c03e42a after it has been retired. 2025/04/30 17:41:37 server <- Reading packet 1 (1200 bytes) for connection cb2c00da4ae54ee9, Initial 2025/04/30 17:41:37 server Long Header{Type: Initial, DestConnectionID: cb2c00da4ae54ee9, SrcConnectionID: d2c776741461a956, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:37 server -> Sending packet 1 (45 bytes) for connection cb2c00da4ae54ee9, Initial 2025/04/30 17:41:37 server Long Header{Type: Initial, DestConnectionID: d2c776741461a956, SrcConnectionID: 0de216ee, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:37 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:37 server -> Sending packet 2 (1280 bytes) for connection cb2c00da4ae54ee9, Initial 2025/04/30 17:41:37 server Long Header{Type: Initial, DestConnectionID: d2c776741461a956, SrcConnectionID: 0de216ee, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:37 server -> Sending packet 3 (1280 bytes) for connection cb2c00da4ae54ee9, Initial 2025/04/30 17:41:37 server Long Header{Type: Initial, DestConnectionID: d2c776741461a956, SrcConnectionID: 0de216ee, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 17:41:37 server -> Sending packet 7 (283 bytes) for connection f56da0114bb48801, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: 2b0a1d6194615714, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:37 server -> &wire.NewTokenFrame{Token: 0x22b6331a70540f84de4415bcbec9055ca926c68404fa3274e8e14729ba2bbd4650acd06054e53136901beabb92daa6a5146a5002d4edc13c07cdbc9a68953f796f890bf1bf536caba706405910d3534a93d278f5620a} 2025/04/30 17:41:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 32f5ea8c, StatelessResetToken: 0x9029d495b2f2f60facdd1c9fe6aab19e} 2025/04/30 17:41:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:37 server Skipping packet number 6 2025/04/30 17:41:37 server -> Sending packet 8 (1053 bytes) for connection f56da0114bb48801, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: 2b0a1d6194615714, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:37 server -> Sending packet 9 (1366 bytes) for connection f56da0114bb48801, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: 2b0a1d6194615714, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.PingFrame{} 2025/04/30 17:41:37 server <- Reading packet 2 (31 bytes) for connection ad1dbba0, 1-RTT 2025/04/30 17:41:37 server Short Header{DestConnectionID: ad1dbba0, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:37 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:37 Replacing connection for connection IDs [ad1dbba0 32f5ea8c] with a closed connection. 2025/04/30 17:41:37 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:37 server Connection f56da0114bb48801 closed. 2025/04/30 17:41:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:37 server -> Sending packet 1 (752 bytes) for connection cb2c00da4ae54ee9, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: d2c776741461a956, SrcConnectionID: 0de216ee, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:37 server -> Sending packet 2 (752 bytes) for connection cb2c00da4ae54ee9, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: d2c776741461a956, SrcConnectionID: 0de216ee, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:37 server <- Reading packet 0 (76 bytes) for connection 0de216ee, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: 0de216ee, SrcConnectionID: d2c776741461a956, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:37 server Dropping Initial keys. 2025/04/30 17:41:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 Retiring connection ID cb2c00da4ae54ee9 in 5s. 2025/04/30 17:41:37 server Dropping Handshake keys. 2025/04/30 17:41:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:37 server -> Sending packet 2 (280 bytes) for connection cb2c00da4ae54ee9, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6e9209a, StatelessResetToken: 0xb5daf04eff4fa552728055dbb1a681e6} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:37 server -> &wire.NewTokenFrame{Token: 0x977a6d2889b8739128e75527aa26aa481ee444f996badec252b6bad858769877f101b77fe14a865f439da519db157798dadbed433c696499dc291e35693f89dba1b931e23bd336952be37175dff87ead3755bbc3e1ac} 2025/04/30 17:41:37 server -> Sending packet 3 (280 bytes) for connection cb2c00da4ae54ee9, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.NewTokenFrame{Token: 0x977a6d2889b8739128e75527aa26aa481ee444f996badec252b6bad858769877f101b77fe14a865f439da519db157798dadbed433c696499dc291e35693f89dba1b931e23bd336952be37175dff87ead3755bbc3e1ac} 2025/04/30 17:41:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6e9209a, StatelessResetToken: 0xb5daf04eff4fa552728055dbb1a681e6} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:37 server -> Sending packet 4 (1366 bytes) for connection cb2c00da4ae54ee9, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.PingFrame{} 2025/04/30 17:41:37 server <- Reading packet 0 (43 bytes) for connection 0de216ee, 1-RTT 2025/04/30 17:41:37 server Short Header{DestConnectionID: 0de216ee, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:37 server -> Sending packet 5 (32 bytes) for connection cb2c00da4ae54ee9, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 96.48µs} 2025/04/30 17:41:37 Received request: GET /ijcurtvwvp 2025/04/30 17:41:37 server -> Sending packet 6 (1053 bytes) for connection cb2c00da4ae54ee9, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:37 server <- Reading packet 1 (27 bytes) for connection 0de216ee, 1-RTT 2025/04/30 17:41:37 server Short Header{DestConnectionID: 0de216ee, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:37 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:37 server newly acked packets (1): [3] 2025/04/30 17:41:37 server updated RTT: 32.911967ms (σ: 16.455983ms) 2025/04/30 17:41:37 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:37 Removing connection IDs [3fc005d8 8e8f3d26] for a closed connection after it has been retired. 2025/04/30 17:41:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:37 server -> Sending packet 8 (1053 bytes) for connection cb2c00da4ae54ee9, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:37 server -> Sending packet 9 (1053 bytes) for connection cb2c00da4ae54ee9, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:37 server <- Reading packet 2 (31 bytes) for connection 0de216ee, 1-RTT 2025/04/30 17:41:37 server Short Header{DestConnectionID: 0de216ee, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:37 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s} 2025/04/30 17:41:37 server newly acked packets (1): [9] 2025/04/30 17:41:37 server updated RTT: 32.914ms (σ: 12.347ms) 2025/04/30 17:41:37 server lost packet 4 (time threshold) 2025/04/30 17:41:37 server Canceling loss detection timer. 2025/04/30 17:41:37 server -> Sending packet 10 (30 bytes) for connection cb2c00da4ae54ee9, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:37 server Short Header{DestConnectionID: d2c776741461a956, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:37 server <- Reading packet 3 (35 bytes) for connection 0de216ee, 1-RTT 2025/04/30 17:41:37 server Short Header{DestConnectionID: 0de216ee, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:37 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:37 Replacing connection for connection IDs [a6e9209a 0de216ee] with a closed connection. 2025/04/30 17:41:37 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:37 server Connection cb2c00da4ae54ee9 closed. 2025/04/30 17:41:37 server <- Received Initial packet. 2025/04/30 17:41:37 Created qlog file: /logs/qlog/bede8d45eaad9062.sqlog 2025/04/30 17:41:37 server Changing connection ID to cdf69071. 2025/04/30 17:41:37 Adding connection IDs bede8d45eaad9062 and cdf69071 for a new connection. 2025/04/30 17:41:37 server <- Reading packet 0 (1200 bytes) for connection bede8d45eaad9062, Initial 2025/04/30 17:41:37 server Long Header{Type: Initial, DestConnectionID: bede8d45eaad9062, SrcConnectionID: f87dbc9411256918, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f87dbc9411256918, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:37 Adding connection ID cbac5451. 2025/04/30 17:41:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bede8d45eaad9062 2025/04/30 17:41:37 server Long Header{Type: Initial, DestConnectionID: f87dbc9411256918, SrcConnectionID: cdf69071, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 454, Version: v1} 2025/04/30 17:41:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: f87dbc9411256918, SrcConnectionID: cdf69071, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 17:41:37 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cbac5451, StatelessResetToken: 0x1b860f4bc2a936e34bb9d0c0094e850f} 2025/04/30 17:41:37 server <- Reading packet 0 (76 bytes) for connection cdf69071, Handshake 2025/04/30 17:41:37 server Long Header{Type: Handshake, DestConnectionID: cdf69071, SrcConnectionID: f87dbc9411256918, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:37 server Dropping Initial keys. 2025/04/30 17:41:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:37 Retiring connection ID bede8d45eaad9062 in 5s. 2025/04/30 17:41:37 server Dropping Handshake keys. 2025/04/30 17:41:37 server -> Sending packet 1 (1366 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.PingFrame{} 2025/04/30 17:41:37 server -> Sending packet 2 (256 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:37 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:37 server -> &wire.NewTokenFrame{Token: 0x1df080097b60c3db11981d658db9adcb7c611c6486be1fab3dce4527079c7329aa4730f139c8937d9a60e09bf8d9737cd2076ca9389c6290faebdf9916dd16149d60326bf120f4ed93d3d4ddafa030bb82ca9e568e07} 2025/04/30 17:41:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:37 server <- Reading packet 1 (27 bytes) for connection cdf69071, 1-RTT 2025/04/30 17:41:37 server Short Header{DestConnectionID: cdf69071, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:37 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:37 server newly acked packets (3): [0 1 2] 2025/04/30 17:41:37 server updated RTT: 33.186154ms (σ: 16.593077ms) 2025/04/30 17:41:37 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:37 server Canceling loss detection timer. 2025/04/30 17:41:38 server <- Reading packet 2 (43 bytes) for connection cdf69071, 1-RTT 2025/04/30 17:41:38 server Short Header{DestConnectionID: cdf69071, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:38 server -> Sending packet 3 (32 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 182.932µs} 2025/04/30 17:41:38 Received request: GET /jqchezlmch 2025/04/30 17:41:38 server -> Sending packet 4 (1053 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:38 server <- Reading packet 3 (43 bytes) for connection cdf69071, 1-RTT 2025/04/30 17:41:38 server Short Header{DestConnectionID: cdf69071, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:38 Removing connection ID 4f6e0806cd51be2a after it has been retired. 2025/04/30 17:41:38 server -> Sending packet 5 (1409 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.PingFrame{} 2025/04/30 17:41:38 server Sending ACK because the ACK timer expired. 2025/04/30 17:41:38 server -> Sending packet 6 (33 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.537832ms} 2025/04/30 17:41:38 server <- Reading packet 4 (30 bytes) for connection cdf69071, 1-RTT 2025/04/30 17:41:38 server Short Header{DestConnectionID: cdf69071, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:38 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 19ms} 2025/04/30 17:41:38 server newly acked packets (1): [5] 2025/04/30 17:41:38 server lost packet 4 (time threshold) 2025/04/30 17:41:38 server Canceling loss detection timer. 2025/04/30 17:41:38 server -> Sending packet 7 (1053 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:38 server -> Sending packet 9 (1053 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:38 server -> Sending packet 10 (1053 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:38 server -> Sending packet 11 (1430 bytes) for connection bede8d45eaad9062, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: f87dbc9411256918, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.PingFrame{} 2025/04/30 17:41:38 server <- Reading packet 5 (39 bytes) for connection cdf69071, 1-RTT 2025/04/30 17:41:38 server Short Header{DestConnectionID: cdf69071, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:38 Replacing connection for connection IDs [cbac5451 cdf69071] with a closed connection. 2025/04/30 17:41:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:38 server Connection bede8d45eaad9062 closed. 2025/04/30 17:41:38 server <- Received Initial packet. 2025/04/30 17:41:38 Created qlog file: /logs/qlog/2874278e99ff18f1.sqlog 2025/04/30 17:41:38 server Changing connection ID to 0ac72564. 2025/04/30 17:41:38 Adding connection IDs 2874278e99ff18f1 and 0ac72564 for a new connection. 2025/04/30 17:41:38 server <- Reading packet 0 (1200 bytes) for connection 2874278e99ff18f1, Initial 2025/04/30 17:41:38 server Long Header{Type: Initial, DestConnectionID: 2874278e99ff18f1, SrcConnectionID: 32c2fb74544f17b7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 32c2fb74544f17b7, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:38 Adding connection ID a2b4b69f. 2025/04/30 17:41:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2874278e99ff18f1 2025/04/30 17:41:38 server Long Header{Type: Initial, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 455, Version: v1} 2025/04/30 17:41:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:38 server Long Header{Type: Handshake, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:38 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a2b4b69f, StatelessResetToken: 0xfe5b9ffc2b4e7d87c489c4cc0310281c} 2025/04/30 17:41:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 17:41:38 server -> Sending packet 26 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:38 server -> Sending packet 27 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:38 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:38 server <- Reading packet 1 (1200 bytes) for connection 2874278e99ff18f1, Initial 2025/04/30 17:41:38 server Long Header{Type: Initial, DestConnectionID: 2874278e99ff18f1, SrcConnectionID: 32c2fb74544f17b7, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:38 server -> Sending packet 1 (45 bytes) for connection 2874278e99ff18f1, Initial 2025/04/30 17:41:38 server Long Header{Type: Initial, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:38 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:38 server -> Sending packet 2 (1280 bytes) for connection 2874278e99ff18f1, Initial 2025/04/30 17:41:38 server Long Header{Type: Initial, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:38 server -> Sending packet 3 (1280 bytes) for connection 2874278e99ff18f1, Initial 2025/04/30 17:41:38 server Long Header{Type: Initial, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:38 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:38 server -> Sending packet 1 (752 bytes) for connection 2874278e99ff18f1, Handshake 2025/04/30 17:41:38 server Long Header{Type: Handshake, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:38 server -> Sending packet 2 (752 bytes) for connection 2874278e99ff18f1, Handshake 2025/04/30 17:41:38 server Long Header{Type: Handshake, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:38 server <- Reading packet 2 (1201 bytes) for connection 0ac72564, Initial 2025/04/30 17:41:38 server Long Header{Type: Initial, DestConnectionID: 0ac72564, SrcConnectionID: 32c2fb74544f17b7, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:38 server <- &wire.PingFrame{} 2025/04/30 17:41:38 server -> Sending packet 4 (45 bytes) for connection 2874278e99ff18f1, Initial 2025/04/30 17:41:38 server Long Header{Type: Initial, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:39 Tracking 26 connection IDs and 0 reset tokens. 2025/04/30 17:41:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 17:41:39 server -> Sending packet 5 (1280 bytes) for connection 2874278e99ff18f1, Initial 2025/04/30 17:41:39 server Long Header{Type: Initial, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:39 server -> Sending packet 6 (1280 bytes) for connection 2874278e99ff18f1, Initial 2025/04/30 17:41:39 server Long Header{Type: Initial, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:39 server <- Reading packet 3 (1201 bytes) for connection 0ac72564, Initial 2025/04/30 17:41:39 server Long Header{Type: Initial, DestConnectionID: 0ac72564, SrcConnectionID: 32c2fb74544f17b7, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 17:41:39 server <- Reading packet 0 (40 bytes) for connection 0ac72564, Handshake 2025/04/30 17:41:39 server Long Header{Type: Handshake, DestConnectionID: 0ac72564, SrcConnectionID: 32c2fb74544f17b7, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:39 server Dropping Initial keys. 2025/04/30 17:41:39 server <- &wire.PingFrame{} 2025/04/30 17:41:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:39 server -> Sending packet 3 (757 bytes) for connection 2874278e99ff18f1, Handshake 2025/04/30 17:41:39 server Long Header{Type: Handshake, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, PacketNumber: 3, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 17:41:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:39 server -> Sending packet 4 (752 bytes) for connection 2874278e99ff18f1, Handshake 2025/04/30 17:41:39 server Long Header{Type: Handshake, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, PacketNumber: 4, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:39 Removing connection ID 1bbcfa15fcd195b5 after it has been retired. 2025/04/30 17:41:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:39 server -> Sending packet 5 (752 bytes) for connection 2874278e99ff18f1, Handshake 2025/04/30 17:41:39 server Long Header{Type: Handshake, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, PacketNumber: 5, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:39 server -> Sending packet 6 (752 bytes) for connection 2874278e99ff18f1, Handshake 2025/04/30 17:41:39 server Long Header{Type: Handshake, DestConnectionID: 32c2fb74544f17b7, SrcConnectionID: 0ac72564, PacketNumber: 6, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:39 server <- Reading packet 3 (76 bytes) for connection 0ac72564, Handshake 2025/04/30 17:41:39 server Long Header{Type: Handshake, DestConnectionID: 0ac72564, SrcConnectionID: 32c2fb74544f17b7, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:39 Retiring connection ID 2874278e99ff18f1 in 5s. 2025/04/30 17:41:39 server Dropping Handshake keys. 2025/04/30 17:41:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:39 server -> Sending packet 2 (280 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:39 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:39 server -> &wire.NewTokenFrame{Token: 0x3fa8064ccb47dd749ea3f23bae9ccf9d0f6ee2a5dd2eb797993c9b41ca848491fd281ddf902a00a612cfb2202a0bf968a2b4fde78381d3ee58d98ca4f02d1c9d570723268c39c1b01f3e09dfeee09e118371b4a5552e} 2025/04/30 17:41:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a2b4b69f, StatelessResetToken: 0xfe5b9ffc2b4e7d87c489c4cc0310281c} 2025/04/30 17:41:39 server Skipping packet number 3 2025/04/30 17:41:39 server -> Sending packet 4 (280 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:39 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:39 server -> &wire.NewTokenFrame{Token: 0x3fa8064ccb47dd749ea3f23bae9ccf9d0f6ee2a5dd2eb797993c9b41ca848491fd281ddf902a00a612cfb2202a0bf968a2b4fde78381d3ee58d98ca4f02d1c9d570723268c39c1b01f3e09dfeee09e118371b4a5552e} 2025/04/30 17:41:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a2b4b69f, StatelessResetToken: 0xfe5b9ffc2b4e7d87c489c4cc0310281c} 2025/04/30 17:41:39 server -> Sending packet 5 (1366 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:39 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:39 server -> &wire.PingFrame{} 2025/04/30 17:41:39 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:39 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 17:41:39 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:39 server <- Reading packet 0 (43 bytes) for connection 0ac72564, 1-RTT 2025/04/30 17:41:39 server Short Header{DestConnectionID: 0ac72564, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:39 server -> Sending packet 6 (32 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:39 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 111.207µs} 2025/04/30 17:41:39 Received request: GET /usbwxtoyug 2025/04/30 17:41:39 server -> Sending packet 7 (1053 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:39 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:39 server <- Reading packet 1 (29 bytes) for connection 0ac72564, 1-RTT 2025/04/30 17:41:39 server Short Header{DestConnectionID: 0ac72564, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 17:41:39 server newly acked packets (1): [4] 2025/04/30 17:41:39 server updated RTT: 32.595496ms (σ: 16.297748ms) 2025/04/30 17:41:39 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:39 server <- Reading packet 2 (30 bytes) for connection 0ac72564, 1-RTT 2025/04/30 17:41:39 server Short Header{DestConnectionID: 0ac72564, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 19ms} 2025/04/30 17:41:39 server newly acked packets (1): [5] 2025/04/30 17:41:39 Removing connection IDs [8682df25 8363cbf2] for a closed connection after it has been retired. 2025/04/30 17:41:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:40 server -> Sending packet 9 (1053 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 server -> Sending packet 10 (1053 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 server <- Reading packet 3 (31 bytes) for connection 0ac72564, 1-RTT 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0ac72564, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:40 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 17:41:40 server newly acked packets (1): [10] 2025/04/30 17:41:40 server updated RTT: 32.666ms (σ: 12.364ms) 2025/04/30 17:41:40 server Canceling loss detection timer. 2025/04/30 17:41:40 server -> Sending packet 11 (30 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:40 server -> Sending packet 13 (30 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:40 server -> Sending packet 14 (30 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:40 server -> Sending packet 15 (1409 bytes) for connection 2874278e99ff18f1, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 32c2fb74544f17b7, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.PingFrame{} 2025/04/30 17:41:40 server <- Reading packet 6 (35 bytes) for connection 0ac72564, 1-RTT 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0ac72564, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:40 Replacing connection for connection IDs [a2b4b69f 0ac72564] with a closed connection. 2025/04/30 17:41:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:40 server Connection 2874278e99ff18f1 closed. 2025/04/30 17:41:40 Removing connection ID 61e709fcb57c67d9 after it has been retired. 2025/04/30 17:41:40 server <- Received Initial packet. 2025/04/30 17:41:40 Created qlog file: /logs/qlog/54466cdbce48cdfc.sqlog 2025/04/30 17:41:40 server Changing connection ID to a1df8658. 2025/04/30 17:41:40 Adding connection IDs 54466cdbce48cdfc and a1df8658 for a new connection. 2025/04/30 17:41:40 server <- Reading packet 1 (1200 bytes) for connection 54466cdbce48cdfc, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: 54466cdbce48cdfc, SrcConnectionID: f3a2ac976307ca95, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f3a2ac976307ca95, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:40 Adding connection ID c08a75c0. 2025/04/30 17:41:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 54466cdbce48cdfc 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: f3a2ac976307ca95, SrcConnectionID: a1df8658, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 465, Version: v1} 2025/04/30 17:41:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:40 server Long Header{Type: Handshake, DestConnectionID: f3a2ac976307ca95, SrcConnectionID: a1df8658, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c08a75c0, StatelessResetToken: 0x4e645b48b4460d180d7a69f86235c821} 2025/04/30 17:41:40 server <- Reading packet 2 (1200 bytes) for connection a1df8658, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: a1df8658, SrcConnectionID: f3a2ac976307ca95, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 17:41:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:40 server -> Sending packet 1 (45 bytes) for connection 54466cdbce48cdfc, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: f3a2ac976307ca95, SrcConnectionID: a1df8658, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:40 server Queueing packet (48 bytes) for later decryption 2025/04/30 17:41:40 Removing connection IDs [3e2d9759 b993c36b] for a closed connection after it has been retired. 2025/04/30 17:41:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:40 server -> Sending packet 2 (1280 bytes) for connection 54466cdbce48cdfc, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: f3a2ac976307ca95, SrcConnectionID: a1df8658, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:40 server -> Sending packet 3 (1280 bytes) for connection 54466cdbce48cdfc, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: f3a2ac976307ca95, SrcConnectionID: a1df8658, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:40 server <- Reading packet 3 (76 bytes) for connection a1df8658, Handshake 2025/04/30 17:41:40 server Long Header{Type: Handshake, DestConnectionID: a1df8658, SrcConnectionID: f3a2ac976307ca95, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:40 server Dropping Initial keys. 2025/04/30 17:41:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 Retiring connection ID 54466cdbce48cdfc in 5s. 2025/04/30 17:41:40 server Dropping Handshake keys. 2025/04/30 17:41:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:40 server -> Sending packet 2 (280 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.NewTokenFrame{Token: 0x619552f542c87698b72d86c746eb0f0168ff24bf3cf61270529bc208b20422083d67729971041dc38d33d15057bfd8cc2608e20d5033f9f5af163e5ae7a3930649abe285ed94b7c2e7c32d986f76999df499ab201908} 2025/04/30 17:41:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c08a75c0, StatelessResetToken: 0x4e645b48b4460d180d7a69f86235c821} 2025/04/30 17:41:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:40 server -> Sending packet 3 (280 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:40 server -> &wire.NewTokenFrame{Token: 0x619552f542c87698b72d86c746eb0f0168ff24bf3cf61270529bc208b20422083d67729971041dc38d33d15057bfd8cc2608e20d5033f9f5af163e5ae7a3930649abe285ed94b7c2e7c32d986f76999df499ab201908} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c08a75c0, StatelessResetToken: 0x4e645b48b4460d180d7a69f86235c821} 2025/04/30 17:41:40 server -> Sending packet 4 (1366 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.PingFrame{} 2025/04/30 17:41:40 server <- Reading packet 0 (48 bytes) for connection a1df8658, 1-RTT 2025/04/30 17:41:40 server Short Header{DestConnectionID: a1df8658, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:40 server -> Sending packet 5 (35 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 Received request: GET /cinyjzrpgf 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 306.169065ms} 2025/04/30 17:41:40 server -> Sending packet 6 (1053 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 17:41:40 server <- Reading packet 2 (29 bytes) for connection a1df8658, 1-RTT 2025/04/30 17:41:40 server Short Header{DestConnectionID: a1df8658, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:40 server newly acked packets (2): [3 4] 2025/04/30 17:41:40 server updated RTT: 32.87607ms (σ: 16.438035ms) 2025/04/30 17:41:40 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:40 Removing connection ID 71167ff7c8dd14f0 after it has been retired. 2025/04/30 17:41:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:40 server -> Sending packet 8 (1053 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 server -> Sending packet 9 (1053 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 Removing connection IDs [df717020 c44aee81] for a closed connection after it has been retired. 2025/04/30 17:41:40 server <- Received Initial packet. 2025/04/30 17:41:40 Created qlog file: /logs/qlog/85d24cfe81b3d482.sqlog 2025/04/30 17:41:40 server Changing connection ID to d1f10015. 2025/04/30 17:41:40 Adding connection IDs 85d24cfe81b3d482 and d1f10015 for a new connection. 2025/04/30 17:41:40 server <- Reading packet 0 (1200 bytes) for connection 85d24cfe81b3d482, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: 85d24cfe81b3d482, SrcConnectionID: 0639d186e68bc6f7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0639d186e68bc6f7, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:40 Adding connection ID 471b3ec3. 2025/04/30 17:41:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 85d24cfe81b3d482 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: 0639d186e68bc6f7, SrcConnectionID: d1f10015, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 453, Version: v1} 2025/04/30 17:41:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:40 server Long Header{Type: Handshake, DestConnectionID: 0639d186e68bc6f7, SrcConnectionID: d1f10015, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 471b3ec3, StatelessResetToken: 0xc3bcf4d35d1cafc2b93869a16701ed0f} 2025/04/30 17:41:40 server <- Reading packet 1 (1201 bytes) for connection d1f10015, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: d1f10015, SrcConnectionID: 0639d186e68bc6f7, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:40 server newly acked packets (1): [0] 2025/04/30 17:41:40 server updated RTT: 36.144204ms (σ: 18.072102ms) 2025/04/30 17:41:40 server <- Reading packet 0 (76 bytes) for connection d1f10015, Handshake 2025/04/30 17:41:40 server Long Header{Type: Handshake, DestConnectionID: d1f10015, SrcConnectionID: 0639d186e68bc6f7, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:40 server Dropping Initial keys. 2025/04/30 17:41:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 Retiring connection ID 85d24cfe81b3d482 in 5s. 2025/04/30 17:41:40 server Dropping Handshake keys. 2025/04/30 17:41:40 server -> Sending packet 1 (259 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:40 server -> &wire.NewTokenFrame{Token: 0x92159ebd09f14049b6288c02a035f7fdf4600ceec54e584af3b39b953c24e03ad00f11f1f4e5469b1ebc6c4aa0f6911a13d4cf5d0bb4806b94f99cd76bf22da450d7329706a4cb38695f6f06e491b996f7a9e75cb30c} 2025/04/30 17:41:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:40 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:40 server <- Reading packet 0 (48 bytes) for connection d1f10015, 1-RTT 2025/04/30 17:41:40 server Short Header{DestConnectionID: d1f10015, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:40 server newly acked packets (1): [0] 2025/04/30 17:41:40 server updated RTT: 36.466ms (σ: 14.198ms) 2025/04/30 17:41:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:40 server -> Sending packet 2 (32 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 88.165µs} 2025/04/30 17:41:40 Received request: GET /jzihadvmtb 2025/04/30 17:41:40 server -> Sending packet 3 (1053 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 server <- Reading packet 1 (29 bytes) for connection d1f10015, 1-RTT 2025/04/30 17:41:40 server Short Header{DestConnectionID: d1f10015, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:40 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:40 server newly acked packets (2): [1 3] 2025/04/30 17:41:40 server updated RTT: 35.922ms (σ: 11.736ms) 2025/04/30 17:41:40 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:40 server Canceling loss detection timer. 2025/04/30 17:41:40 server -> Sending packet 4 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:40 server <- Received Initial packet. 2025/04/30 17:41:40 Created qlog file: /logs/qlog/659d8f07119901bc.sqlog 2025/04/30 17:41:40 server Changing connection ID to 3b3659c3. 2025/04/30 17:41:40 Adding connection IDs 659d8f07119901bc and 3b3659c3 for a new connection. 2025/04/30 17:41:40 server <- Reading packet 0 (1200 bytes) for connection 659d8f07119901bc, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: 659d8f07119901bc, SrcConnectionID: f9bf6716a5eba100, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f9bf6716a5eba100, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:40 Adding connection ID c5cf1343. 2025/04/30 17:41:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 659d8f07119901bc 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: f9bf6716a5eba100, SrcConnectionID: 3b3659c3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 467, Version: v1} 2025/04/30 17:41:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:40 server Long Header{Type: Handshake, DestConnectionID: f9bf6716a5eba100, SrcConnectionID: 3b3659c3, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 17:41:40 server Short Header{DestConnectionID: f9bf6716a5eba100, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c5cf1343, StatelessResetToken: 0x48d1b1fce87b65406c2f04edc7e6d47b} 2025/04/30 17:41:40 server <- Reading packet 1 (1201 bytes) for connection 3b3659c3, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: 3b3659c3, SrcConnectionID: f9bf6716a5eba100, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:40 server newly acked packets (1): [0] 2025/04/30 17:41:40 server updated RTT: 36.696602ms (σ: 18.348301ms) 2025/04/30 17:41:40 server <- Reading packet 0 (76 bytes) for connection 3b3659c3, Handshake 2025/04/30 17:41:40 server Long Header{Type: Handshake, DestConnectionID: 3b3659c3, SrcConnectionID: f9bf6716a5eba100, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:40 server Dropping Initial keys. 2025/04/30 17:41:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 Retiring connection ID 659d8f07119901bc in 5s. 2025/04/30 17:41:40 server Dropping Handshake keys. 2025/04/30 17:41:40 server -> Sending packet 1 (259 bytes) for connection 659d8f07119901bc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f9bf6716a5eba100, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.NewTokenFrame{Token: 0x2c7c4ef82d4d38e66fe97cf6a846ae166e2cb9af80253db99ae53ee70a7a4265267b72c3f50e60cb233e3a31dfcc207972dea8d1ea7812f334790b1ec580525c22e80645a7c17bfe1603f6f678b372fe9e1188ab88e3} 2025/04/30 17:41:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:40 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:40 server <- Reading packet 0 (48 bytes) for connection 3b3659c3, 1-RTT 2025/04/30 17:41:40 server Short Header{DestConnectionID: 3b3659c3, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:40 server newly acked packets (1): [0] 2025/04/30 17:41:40 server updated RTT: 37.009ms (σ: 14.388ms) 2025/04/30 17:41:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:40 server -> Sending packet 2 (32 bytes) for connection 659d8f07119901bc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f9bf6716a5eba100, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 138.037µs} 2025/04/30 17:41:40 Received request: GET /dwyuzrnibx 2025/04/30 17:41:40 server -> Sending packet 3 (1053 bytes) for connection 659d8f07119901bc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f9bf6716a5eba100, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 server <- Received Initial packet. 2025/04/30 17:41:40 Created qlog file: /logs/qlog/c798e85be988532b.sqlog 2025/04/30 17:41:40 server Changing connection ID to 0b2c883f. 2025/04/30 17:41:40 Adding connection IDs c798e85be988532b and 0b2c883f for a new connection. 2025/04/30 17:41:40 server <- Reading packet 0 (1200 bytes) for connection c798e85be988532b, Initial 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: c798e85be988532b, SrcConnectionID: 0dbb472ffe572b73, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0dbb472ffe572b73, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:40 Adding connection ID 4dfdc6f9. 2025/04/30 17:41:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c798e85be988532b 2025/04/30 17:41:40 server Long Header{Type: Initial, DestConnectionID: 0dbb472ffe572b73, SrcConnectionID: 0b2c883f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 453, Version: v1} 2025/04/30 17:41:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:40 server Long Header{Type: Handshake, DestConnectionID: 0dbb472ffe572b73, SrcConnectionID: 0b2c883f, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0dbb472ffe572b73, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4dfdc6f9, StatelessResetToken: 0xebd5413cfe44cb5c5efb302382ab6475} 2025/04/30 17:41:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:40 server -> Sending packet 6 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:40 server Skipping packet number 7 2025/04/30 17:41:40 server -> Sending packet 8 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 17:41:40 server -> Sending packet 11 (1053 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 server -> Sending packet 12 (1053 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:40 server -> Sending packet 13 (1409 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.PingFrame{} 2025/04/30 17:41:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:40 server -> Sending packet 5 (259 bytes) for connection 659d8f07119901bc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f9bf6716a5eba100, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:40 server -> &wire.NewTokenFrame{Token: 0x2c7c4ef82d4d38e66fe97cf6a846ae166e2cb9af80253db99ae53ee70a7a4265267b72c3f50e60cb233e3a31dfcc207972dea8d1ea7812f334790b1ec580525c22e80645a7c17bfe1603f6f678b372fe9e1188ab88e3} 2025/04/30 17:41:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:40 server Skipping packet number 4 2025/04/30 17:41:40 server -> Sending packet 6 (1053 bytes) for connection 659d8f07119901bc, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:40 server Short Header{DestConnectionID: f9bf6716a5eba100, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:41 Tracking 29 connection IDs and 0 reset tokens. 2025/04/30 17:41:41 server <- Reading packet 3 (33 bytes) for connection 3b3659c3, 1-RTT 2025/04/30 17:41:41 server Short Header{DestConnectionID: 3b3659c3, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:41 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:41 Replacing connection for connection IDs [3b3659c3 c5cf1343] with a closed connection. 2025/04/30 17:41:41 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:41 server Connection 659d8f07119901bc closed. 2025/04/30 17:41:41 server <- Reading packet 1 (1200 bytes) for connection c798e85be988532b, Initial 2025/04/30 17:41:41 server Long Header{Type: Initial, DestConnectionID: c798e85be988532b, SrcConnectionID: 0dbb472ffe572b73, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:41 server -> Sending packet 1 (45 bytes) for connection c798e85be988532b, Initial 2025/04/30 17:41:41 server Long Header{Type: Initial, DestConnectionID: 0dbb472ffe572b73, SrcConnectionID: 0b2c883f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:41 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:41 server -> Sending packet 2 (1280 bytes) for connection c798e85be988532b, Initial 2025/04/30 17:41:41 server Long Header{Type: Initial, DestConnectionID: 0dbb472ffe572b73, SrcConnectionID: 0b2c883f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:41 server -> Sending packet 3 (1280 bytes) for connection c798e85be988532b, Initial 2025/04/30 17:41:41 server Long Header{Type: Initial, DestConnectionID: 0dbb472ffe572b73, SrcConnectionID: 0b2c883f, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 17:41:41 server -> Sending packet 10 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:41 server -> Sending packet 11 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:41 server -> Sending packet 12 (1366 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.PingFrame{} 2025/04/30 17:41:41 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:41 server -> Sending packet 1 (754 bytes) for connection c798e85be988532b, Handshake 2025/04/30 17:41:41 server Long Header{Type: Handshake, DestConnectionID: 0dbb472ffe572b73, SrcConnectionID: 0b2c883f, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 17:41:41 server -> Sending packet 2 (754 bytes) for connection c798e85be988532b, Handshake 2025/04/30 17:41:41 server Long Header{Type: Handshake, DestConnectionID: 0dbb472ffe572b73, SrcConnectionID: 0b2c883f, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 17:41:41 server <- Reading packet 1 (76 bytes) for connection 0b2c883f, Handshake 2025/04/30 17:41:41 server Long Header{Type: Handshake, DestConnectionID: 0b2c883f, SrcConnectionID: 0dbb472ffe572b73, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:41 server Dropping Initial keys. 2025/04/30 17:41:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:41 Retiring connection ID c798e85be988532b in 5s. 2025/04/30 17:41:41 server Dropping Handshake keys. 2025/04/30 17:41:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:41 server -> Sending packet 2 (280 bytes) for connection c798e85be988532b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0dbb472ffe572b73, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.NewTokenFrame{Token: 0x1095e9d65803de2d006a0915a4a22314a591fa6d37cc0db29711c0502ca59486be3ee511fe904b12d544c60cc56e999934bc34b7b5782fc6f0bbfdb061f2c86668a5bf1cc0efd10a034da67fcb601602f43359c52b95} 2025/04/30 17:41:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4dfdc6f9, StatelessResetToken: 0xebd5413cfe44cb5c5efb302382ab6475} 2025/04/30 17:41:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:41 server -> Sending packet 3 (280 bytes) for connection c798e85be988532b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0dbb472ffe572b73, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4dfdc6f9, StatelessResetToken: 0xebd5413cfe44cb5c5efb302382ab6475} 2025/04/30 17:41:41 server -> &wire.NewTokenFrame{Token: 0x1095e9d65803de2d006a0915a4a22314a591fa6d37cc0db29711c0502ca59486be3ee511fe904b12d544c60cc56e999934bc34b7b5782fc6f0bbfdb061f2c86668a5bf1cc0efd10a034da67fcb601602f43359c52b95} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:41 server -> Sending packet 4 (1366 bytes) for connection c798e85be988532b, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0dbb472ffe572b73, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.PingFrame{} 2025/04/30 17:41:41 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:41 server <- Reading packet 1 (27 bytes) for connection 0b2c883f, 1-RTT 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0b2c883f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:41 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:41 server newly acked packets (1): [3] 2025/04/30 17:41:41 server updated RTT: 32.890425ms (σ: 16.445212ms) 2025/04/30 17:41:41 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:41 server Canceling loss detection timer. 2025/04/30 17:41:41 server <- Reading packet 2 (28 bytes) for connection 0b2c883f, 1-RTT 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0b2c883f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:41 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 19ms} 2025/04/30 17:41:41 server newly acked packets (1): [4] 2025/04/30 17:41:41 server updated RTT: 32.937ms (σ: 12.429ms) 2025/04/30 17:41:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 17:41:41 server -> Sending packet 15 (1053 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:41 server -> Sending packet 16 (1053 bytes) for connection 54466cdbce48cdfc, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: f3a2ac976307ca95, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:41 server <- Reading packet 6 (33 bytes) for connection a1df8658, 1-RTT 2025/04/30 17:41:41 server Short Header{DestConnectionID: a1df8658, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:41 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:41 Replacing connection for connection IDs [a1df8658 c08a75c0] with a closed connection. 2025/04/30 17:41:41 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:41 server Connection 54466cdbce48cdfc closed. 2025/04/30 17:41:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 17:41:41 server -> Sending packet 14 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:41 server -> Sending packet 15 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:41 Removing connection ID ea456fe8c9b60c9c after it has been retired. 2025/04/30 17:41:41 server <- Reading packet 5 (43 bytes) for connection 0b2c883f, 1-RTT 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0b2c883f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:41 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:41 server -> Sending packet 5 (1409 bytes) for connection c798e85be988532b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 Received request: GET /iwbdkyiiph 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0dbb472ffe572b73, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.PingFrame{} 2025/04/30 17:41:41 server -> Sending packet 6 (34 bytes) for connection c798e85be988532b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0dbb472ffe572b73, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 210.393µs} 2025/04/30 17:41:41 server -> Sending packet 7 (1053 bytes) for connection c798e85be988532b, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0dbb472ffe572b73, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:41 Removing connection IDs [74e293f7 7706152b] for a closed connection after it has been retired. 2025/04/30 17:41:41 server <- Reading packet 6 (48 bytes) for connection 0b2c883f, 1-RTT 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0b2c883f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:41 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/04/30 17:41:41 server newly acked packets (1): [5] 2025/04/30 17:41:41 server updated RTT: 32.977ms (σ: 9.403ms) 2025/04/30 17:41:41 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:41 server <- Reading packet 7 (31 bytes) for connection 0b2c883f, 1-RTT 2025/04/30 17:41:41 server Short Header{DestConnectionID: 0b2c883f, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:41 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:41 Replacing connection for connection IDs [4dfdc6f9 0b2c883f] with a closed connection. 2025/04/30 17:41:41 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:41 server Connection c798e85be988532b closed. 2025/04/30 17:41:41 server <- Received Initial packet. 2025/04/30 17:41:41 Created qlog file: /logs/qlog/be19fc14d1ccf153.sqlog 2025/04/30 17:41:41 server Changing connection ID to a747e376. 2025/04/30 17:41:41 Adding connection IDs be19fc14d1ccf153 and a747e376 for a new connection. 2025/04/30 17:41:41 server <- Reading packet 0 (1200 bytes) for connection be19fc14d1ccf153, Initial 2025/04/30 17:41:41 server Long Header{Type: Initial, DestConnectionID: be19fc14d1ccf153, SrcConnectionID: 3756bb6403f08c34, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3756bb6403f08c34, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:41 Adding connection ID da0c82da. 2025/04/30 17:41:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection be19fc14d1ccf153 2025/04/30 17:41:41 server Long Header{Type: Initial, DestConnectionID: 3756bb6403f08c34, SrcConnectionID: a747e376, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 453, Version: v1} 2025/04/30 17:41:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:41 server Long Header{Type: Handshake, DestConnectionID: 3756bb6403f08c34, SrcConnectionID: a747e376, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 17:41:41 server Short Header{DestConnectionID: 3756bb6403f08c34, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da0c82da, StatelessResetToken: 0xacdc417ee4161bf437eb547c8ce1b32e} 2025/04/30 17:41:41 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:41 server -> Sending packet 1 (1280 bytes) for connection be19fc14d1ccf153, Initial 2025/04/30 17:41:41 server Long Header{Type: Initial, DestConnectionID: 3756bb6403f08c34, SrcConnectionID: a747e376, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:41 server -> Sending packet 2 (1280 bytes) for connection be19fc14d1ccf153, Initial 2025/04/30 17:41:41 server Long Header{Type: Initial, DestConnectionID: 3756bb6403f08c34, SrcConnectionID: a747e376, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:41 server Canceling loss detection timer. 2025/04/30 17:41:41 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 17:41:42 server <- Reading packet 0 (40 bytes) for connection a747e376, Handshake 2025/04/30 17:41:42 server Long Header{Type: Handshake, DestConnectionID: a747e376, SrcConnectionID: 3756bb6403f08c34, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:42 server Dropping Initial keys. 2025/04/30 17:41:42 server <- &wire.PingFrame{} 2025/04/30 17:41:42 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:42 server -> Sending packet 1 (759 bytes) for connection be19fc14d1ccf153, Handshake 2025/04/30 17:41:42 server Long Header{Type: Handshake, DestConnectionID: 3756bb6403f08c34, SrcConnectionID: a747e376, PacketNumber: 1, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 17:41:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 17:41:42 server -> Sending packet 2 (754 bytes) for connection be19fc14d1ccf153, Handshake 2025/04/30 17:41:42 server Long Header{Type: Handshake, DestConnectionID: 3756bb6403f08c34, SrcConnectionID: a747e376, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 17:41:42 server Queueing packet (43 bytes) for later decryption 2025/04/30 17:41:42 Removing connection ID f56da0114bb48801 after it has been retired. 2025/04/30 17:41:42 server <- Reading packet 4 (76 bytes) for connection a747e376, Handshake 2025/04/30 17:41:42 server Long Header{Type: Handshake, DestConnectionID: a747e376, SrcConnectionID: 3756bb6403f08c34, PacketNumber: 4, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:42 Retiring connection ID be19fc14d1ccf153 in 5s. 2025/04/30 17:41:42 server Dropping Handshake keys. 2025/04/30 17:41:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:42 server -> Sending packet 2 (280 bytes) for connection be19fc14d1ccf153, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 3756bb6403f08c34, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.NewTokenFrame{Token: 0x919167fa446905995591a85eb9cf22de75c78061f947a0446d74f1cb8bf576df5364afc694e8d36676fdd86eeb9a6197d3dcdac7b68881cf3f10fa3324bb1e78a6fc7589486f7dc823f0b04bc126a6e82db4ac683b20} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da0c82da, StatelessResetToken: 0xacdc417ee4161bf437eb547c8ce1b32e} 2025/04/30 17:41:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:42 server -> Sending packet 3 (280 bytes) for connection be19fc14d1ccf153, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 3756bb6403f08c34, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da0c82da, StatelessResetToken: 0xacdc417ee4161bf437eb547c8ce1b32e} 2025/04/30 17:41:42 server -> &wire.NewTokenFrame{Token: 0x919167fa446905995591a85eb9cf22de75c78061f947a0446d74f1cb8bf576df5364afc694e8d36676fdd86eeb9a6197d3dcdac7b68881cf3f10fa3324bb1e78a6fc7589486f7dc823f0b04bc126a6e82db4ac683b20} 2025/04/30 17:41:42 server -> Sending packet 4 (1366 bytes) for connection be19fc14d1ccf153, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 3756bb6403f08c34, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.PingFrame{} 2025/04/30 17:41:42 server <- Reading packet 0 (43 bytes) for connection a747e376, 1-RTT 2025/04/30 17:41:42 server Short Header{DestConnectionID: a747e376, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:42 server -> Sending packet 5 (35 bytes) for connection be19fc14d1ccf153, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 3756bb6403f08c34, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 182.130132ms} 2025/04/30 17:41:42 Received request: GET /xxjpocdtux 2025/04/30 17:41:42 server -> Sending packet 6 (1053 bytes) for connection be19fc14d1ccf153, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 3756bb6403f08c34, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:42 server <- Reading packet 1 (43 bytes) for connection a747e376, 1-RTT 2025/04/30 17:41:42 server Short Header{DestConnectionID: a747e376, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:42 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:42 server <- Reading packet 2 (29 bytes) for connection a747e376, 1-RTT 2025/04/30 17:41:42 server Short Header{DestConnectionID: a747e376, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:42 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 17:41:42 server newly acked packets (1): [4] 2025/04/30 17:41:42 server updated RTT: 32.688352ms (σ: 16.344176ms) 2025/04/30 17:41:42 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:42 server setting loss timer for packet 3 (1-RTT) to 36.774396ms (in 2025-04-30 17:41:42.432043179 +0000 UTC m=+19.432517225) 2025/04/30 17:41:42 server <- Reading packet 3 (35 bytes) for connection a747e376, 1-RTT 2025/04/30 17:41:42 server Short Header{DestConnectionID: a747e376, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:42 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:42 Replacing connection for connection IDs [a747e376 da0c82da] with a closed connection. 2025/04/30 17:41:42 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:42 server Connection be19fc14d1ccf153 closed. 2025/04/30 17:41:42 server <- Received Initial packet. 2025/04/30 17:41:42 Created qlog file: /logs/qlog/bd61e4880f87fe17.sqlog 2025/04/30 17:41:42 server Changing connection ID to f3666213. 2025/04/30 17:41:42 Adding connection IDs bd61e4880f87fe17 and f3666213 for a new connection. 2025/04/30 17:41:42 server <- Reading packet 0 (1200 bytes) for connection bd61e4880f87fe17, Initial 2025/04/30 17:41:42 server Long Header{Type: Initial, DestConnectionID: bd61e4880f87fe17, SrcConnectionID: 37f1689f0670b731, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 37f1689f0670b731, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:42 Adding connection ID 6e2e5cfb. 2025/04/30 17:41:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bd61e4880f87fe17 2025/04/30 17:41:42 server Long Header{Type: Initial, DestConnectionID: 37f1689f0670b731, SrcConnectionID: f3666213, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 465, Version: v1} 2025/04/30 17:41:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:42 server Long Header{Type: Handshake, DestConnectionID: 37f1689f0670b731, SrcConnectionID: f3666213, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 17:41:42 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6e2e5cfb, StatelessResetToken: 0xa9ed2df38413766b449daef31dcf35ea} 2025/04/30 17:41:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 17:41:42 server -> Sending packet 17 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:42 server -> Sending packet 18 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:42 Removing connection IDs [ad1dbba0 32f5ea8c] for a closed connection after it has been retired. 2025/04/30 17:41:42 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:42 server -> Sending packet 1 (1280 bytes) for connection bd61e4880f87fe17, Initial 2025/04/30 17:41:42 server Long Header{Type: Initial, DestConnectionID: 37f1689f0670b731, SrcConnectionID: f3666213, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:42 server -> Sending packet 2 (1280 bytes) for connection bd61e4880f87fe17, Initial 2025/04/30 17:41:42 server Long Header{Type: Initial, DestConnectionID: 37f1689f0670b731, SrcConnectionID: f3666213, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:42 server Canceling loss detection timer. 2025/04/30 17:41:42 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 17:41:42 server <- Reading packet 2 (1201 bytes) for connection f3666213, Initial 2025/04/30 17:41:42 server Long Header{Type: Initial, DestConnectionID: f3666213, SrcConnectionID: 37f1689f0670b731, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:42 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:42 server newly acked packets (1): [2] 2025/04/30 17:41:42 server updated RTT: 36.606634ms (σ: 18.303317ms) 2025/04/30 17:41:42 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:42 server -> Sending packet 1 (742 bytes) for connection bd61e4880f87fe17, Handshake 2025/04/30 17:41:42 server Long Header{Type: Handshake, DestConnectionID: 37f1689f0670b731, SrcConnectionID: f3666213, PacketNumber: 1, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 17:41:42 server -> Sending packet 2 (742 bytes) for connection bd61e4880f87fe17, Handshake 2025/04/30 17:41:42 server Long Header{Type: Handshake, DestConnectionID: 37f1689f0670b731, SrcConnectionID: f3666213, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 17:41:42 server <- Reading packet 0 (76 bytes) for connection f3666213, Handshake 2025/04/30 17:41:42 server Long Header{Type: Handshake, DestConnectionID: f3666213, SrcConnectionID: 37f1689f0670b731, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:42 server Dropping Initial keys. 2025/04/30 17:41:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:42 Retiring connection ID bd61e4880f87fe17 in 5s. 2025/04/30 17:41:42 server Dropping Handshake keys. 2025/04/30 17:41:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:42 server -> Sending packet 2 (283 bytes) for connection bd61e4880f87fe17, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6e2e5cfb, StatelessResetToken: 0xa9ed2df38413766b449daef31dcf35ea} 2025/04/30 17:41:42 server -> &wire.NewTokenFrame{Token: 0xae53e772a178fde72957d8816714c72ee965b6af48ef2f499a4465b02321f1d5ecf4135f62dceeeb465a601627ff925f838e1d8e5d3dd8b629838a98738afb45e7186aec1442caff2f736056dbe526775843b1d11995} 2025/04/30 17:41:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:42 server -> Sending packet 3 (283 bytes) for connection bd61e4880f87fe17, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6e2e5cfb, StatelessResetToken: 0xa9ed2df38413766b449daef31dcf35ea} 2025/04/30 17:41:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:42 server -> &wire.NewTokenFrame{Token: 0xae53e772a178fde72957d8816714c72ee965b6af48ef2f499a4465b02321f1d5ecf4135f62dceeeb465a601627ff925f838e1d8e5d3dd8b629838a98738afb45e7186aec1442caff2f736056dbe526775843b1d11995} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:42 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:42 server <- Reading packet 0 (43 bytes) for connection f3666213, 1-RTT 2025/04/30 17:41:42 server Short Header{DestConnectionID: f3666213, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:42 server -> Sending packet 4 (32 bytes) for connection bd61e4880f87fe17, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.284µs} 2025/04/30 17:41:42 Received request: GET /ahjorapcri 2025/04/30 17:41:42 server -> Sending packet 5 (1053 bytes) for connection bd61e4880f87fe17, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:42 Removing connection ID cb2c00da4ae54ee9 after it has been retired. 2025/04/30 17:41:42 server <- Reading packet 1 (30 bytes) for connection f3666213, 1-RTT 2025/04/30 17:41:42 server Short Header{DestConnectionID: f3666213, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:42 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 19ms} 2025/04/30 17:41:42 Removing connection IDs [a6e9209a 0de216ee] for a closed connection after it has been retired. 2025/04/30 17:41:42 Removing connection ID bede8d45eaad9062 after it has been retired. 2025/04/30 17:41:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 17:41:42 server -> Sending packet 7 (283 bytes) for connection bd61e4880f87fe17, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:42 server -> &wire.NewTokenFrame{Token: 0xae53e772a178fde72957d8816714c72ee965b6af48ef2f499a4465b02321f1d5ecf4135f62dceeeb465a601627ff925f838e1d8e5d3dd8b629838a98738afb45e7186aec1442caff2f736056dbe526775843b1d11995} 2025/04/30 17:41:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6e2e5cfb, StatelessResetToken: 0xa9ed2df38413766b449daef31dcf35ea} 2025/04/30 17:41:42 server Skipping packet number 6 2025/04/30 17:41:42 server -> Sending packet 8 (1053 bytes) for connection bd61e4880f87fe17, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:42 server -> Sending packet 9 (1366 bytes) for connection bd61e4880f87fe17, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:42 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:42 server -> &wire.PingFrame{} 2025/04/30 17:41:43 Tracking 25 connection IDs and 0 reset tokens. 2025/04/30 17:41:43 server <- Reading packet 2 (31 bytes) for connection f3666213, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: f3666213, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 17:41:43 server newly acked packets (2): [7 8] 2025/04/30 17:41:43 server updated RTT: 36.088ms (σ: 14.761ms) 2025/04/30 17:41:43 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:43 server Canceling loss detection timer. 2025/04/30 17:41:43 server -> Sending packet 10 (30 bytes) for connection bd61e4880f87fe17, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 37f1689f0670b731, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:43 server <- Reading packet 3 (35 bytes) for connection f3666213, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: f3666213, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:43 Replacing connection for connection IDs [f3666213 6e2e5cfb] with a closed connection. 2025/04/30 17:41:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:43 server Connection bd61e4880f87fe17 closed. 2025/04/30 17:41:43 server <- Received Initial packet. 2025/04/30 17:41:43 Created qlog file: /logs/qlog/782e08ec5ce30a71.sqlog 2025/04/30 17:41:43 server Changing connection ID to 490fd802. 2025/04/30 17:41:43 Adding connection IDs 782e08ec5ce30a71 and 490fd802 for a new connection. 2025/04/30 17:41:43 server <- Reading packet 0 (1200 bytes) for connection 782e08ec5ce30a71, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 782e08ec5ce30a71, SrcConnectionID: 16d0c0e070e8bc3a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 16d0c0e070e8bc3a, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:43 Adding connection ID b0fe2785. 2025/04/30 17:41:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 782e08ec5ce30a71 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 16d0c0e070e8bc3a, SrcConnectionID: 490fd802, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 457, Version: v1} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: 16d0c0e070e8bc3a, SrcConnectionID: 490fd802, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16d0c0e070e8bc3a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b0fe2785, StatelessResetToken: 0x8bdbf96b71699d2dbbe8eae7ab89ade1} 2025/04/30 17:41:43 server <- Reading packet 1 (1201 bytes) for connection 490fd802, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 490fd802, SrcConnectionID: 16d0c0e070e8bc3a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server newly acked packets (1): [0] 2025/04/30 17:41:43 server updated RTT: 35.83934ms (σ: 17.91967ms) 2025/04/30 17:41:43 server <- Reading packet 0 (76 bytes) for connection 490fd802, Handshake 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: 490fd802, SrcConnectionID: 16d0c0e070e8bc3a, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:43 server Dropping Initial keys. 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 Retiring connection ID 782e08ec5ce30a71 in 5s. 2025/04/30 17:41:43 server Dropping Handshake keys. 2025/04/30 17:41:43 server -> Sending packet 1 (259 bytes) for connection 782e08ec5ce30a71, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16d0c0e070e8bc3a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.NewTokenFrame{Token: 0xe0146609d2a172afcb8cf367ee3332f131fc9426acb9cc80d6977ca34de262ad5c343bfb3e53e388c1900ce15932475c05f88407da117185a2772fa0b8dfda4ec820ea9229e6ae847f8dcc78a9cf3d176a694afc9a26} 2025/04/30 17:41:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:43 server <- Reading packet 1 (28 bytes) for connection 490fd802, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: 490fd802, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 17:41:43 server newly acked packets (2): [0 1] 2025/04/30 17:41:43 server updated RTT: 37.727ms (σ: 17.216ms) 2025/04/30 17:41:43 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:43 server Canceling loss detection timer. 2025/04/30 17:41:43 server <- Reading packet 2 (43 bytes) for connection 490fd802, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: 490fd802, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:43 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:43 server -> Sending packet 2 (32 bytes) for connection 782e08ec5ce30a71, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16d0c0e070e8bc3a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 Received request: GET /yfojlesaya 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 138.298µs} 2025/04/30 17:41:43 server -> Sending packet 3 (1053 bytes) for connection 782e08ec5ce30a71, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16d0c0e070e8bc3a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:43 server <- Reading packet 3 (43 bytes) for connection 490fd802, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: 490fd802, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:43 server <- Received Initial packet. 2025/04/30 17:41:43 Created qlog file: /logs/qlog/72f115143fa52a69.sqlog 2025/04/30 17:41:43 server Changing connection ID to f9daa609. 2025/04/30 17:41:43 Adding connection IDs 72f115143fa52a69 and f9daa609 for a new connection. 2025/04/30 17:41:43 server <- Reading packet 0 (1200 bytes) for connection 72f115143fa52a69, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 72f115143fa52a69, SrcConnectionID: 435bc361fa05b57a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 435bc361fa05b57a, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:43 Adding connection ID 9299145b. 2025/04/30 17:41:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 72f115143fa52a69 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 435bc361fa05b57a, SrcConnectionID: f9daa609, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 459, Version: v1} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: 435bc361fa05b57a, SrcConnectionID: f9daa609, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 17:41:43 server Short Header{DestConnectionID: 435bc361fa05b57a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9299145b, StatelessResetToken: 0xb39eac825055ba892b75cbfb69644c9f} 2025/04/30 17:41:43 server Sending ACK because the ACK timer expired. 2025/04/30 17:41:43 server -> Sending packet 4 (33 bytes) for connection 782e08ec5ce30a71, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16d0c0e070e8bc3a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.041933ms} 2025/04/30 17:41:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:43 server -> Sending packet 6 (1053 bytes) for connection 782e08ec5ce30a71, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16d0c0e070e8bc3a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:43 server -> Sending packet 7 (1053 bytes) for connection 782e08ec5ce30a71, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16d0c0e070e8bc3a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:43 server -> Sending packet 8 (1366 bytes) for connection 782e08ec5ce30a71, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16d0c0e070e8bc3a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.PingFrame{} 2025/04/30 17:41:43 Removing connection IDs [cbac5451 cdf69071] for a closed connection after it has been retired. 2025/04/30 17:41:43 server <- Reading packet 6 (31 bytes) for connection 490fd802, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: 490fd802, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:43 Replacing connection for connection IDs [490fd802 b0fe2785] with a closed connection. 2025/04/30 17:41:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:43 server Connection 782e08ec5ce30a71 closed. 2025/04/30 17:41:43 server <- Reading packet 1 (1200 bytes) for connection 72f115143fa52a69, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 72f115143fa52a69, SrcConnectionID: 435bc361fa05b57a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:43 server -> Sending packet 1 (45 bytes) for connection 72f115143fa52a69, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 435bc361fa05b57a, SrcConnectionID: f9daa609, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:43 server -> Sending packet 2 (1280 bytes) for connection 72f115143fa52a69, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 435bc361fa05b57a, SrcConnectionID: f9daa609, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:43 server -> Sending packet 3 (1280 bytes) for connection 72f115143fa52a69, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 435bc361fa05b57a, SrcConnectionID: f9daa609, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:43 server <- Reading packet 2 (1201 bytes) for connection f9daa609, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: f9daa609, SrcConnectionID: 435bc361fa05b57a, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 17:41:43 server -> Sending packet 29 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:43 server -> Sending packet 30 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:43 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:43 server -> Sending packet 1 (748 bytes) for connection 72f115143fa52a69, Handshake 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: 435bc361fa05b57a, SrcConnectionID: f9daa609, PacketNumber: 1, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 17:41:43 server -> Sending packet 2 (748 bytes) for connection 72f115143fa52a69, Handshake 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: 435bc361fa05b57a, SrcConnectionID: f9daa609, PacketNumber: 2, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 17:41:43 server <- Reading packet 2 (42 bytes) for connection f9daa609, Handshake 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: f9daa609, SrcConnectionID: 435bc361fa05b57a, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:43 server Dropping Initial keys. 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:43 server newly acked packets (1): [2] 2025/04/30 17:41:43 server updated RTT: 35.584076ms (σ: 17.792038ms) 2025/04/30 17:41:43 server Canceling loss detection timer. 2025/04/30 17:41:43 server Queueing packet (43 bytes) for later decryption 2025/04/30 17:41:43 server <- Reading packet 3 (76 bytes) for connection f9daa609, Handshake 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: f9daa609, SrcConnectionID: 435bc361fa05b57a, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 Retiring connection ID 72f115143fa52a69 in 5s. 2025/04/30 17:41:43 server Dropping Handshake keys. 2025/04/30 17:41:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:43 server -> Sending packet 2 (283 bytes) for connection 72f115143fa52a69, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 435bc361fa05b57a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:43 server -> &wire.NewTokenFrame{Token: 0xce4cab9191d1eb8e45e66938d8b0d05ccb794f787230f2e16b76fa9c45ac8c1caa3cf31e0cf46ad45a918ddd97ffd8cde8a76dbfddd20af3217031724abac34bf5ede2133434a809358a4be5de5aa41cb885eb672b8d} 2025/04/30 17:41:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9299145b, StatelessResetToken: 0xb39eac825055ba892b75cbfb69644c9f} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:43 server -> Sending packet 3 (283 bytes) for connection 72f115143fa52a69, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 435bc361fa05b57a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9299145b, StatelessResetToken: 0xb39eac825055ba892b75cbfb69644c9f} 2025/04/30 17:41:43 server -> &wire.NewTokenFrame{Token: 0xce4cab9191d1eb8e45e66938d8b0d05ccb794f787230f2e16b76fa9c45ac8c1caa3cf31e0cf46ad45a918ddd97ffd8cde8a76dbfddd20af3217031724abac34bf5ede2133434a809358a4be5de5aa41cb885eb672b8d} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:43 server <- Reading packet 0 (43 bytes) for connection f9daa609, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: f9daa609, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:43 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:43 server -> Sending packet 4 (35 bytes) for connection 72f115143fa52a69, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 435bc361fa05b57a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192.28638ms} 2025/04/30 17:41:43 Received request: GET /eekrztobjg 2025/04/30 17:41:43 server -> Sending packet 5 (1053 bytes) for connection 72f115143fa52a69, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 435bc361fa05b57a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:43 server <- Reading packet 1 (43 bytes) for connection f9daa609, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: f9daa609, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:43 server <- Reading packet 2 (29 bytes) for connection f9daa609, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: f9daa609, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/04/30 17:41:43 server newly acked packets (1): [5] 2025/04/30 17:41:43 server updated RTT: 35.253ms (σ: 14.005ms) 2025/04/30 17:41:43 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:43 server setting loss timer for packet 3 (1-RTT) to 39.659625ms (in 2025-04-30 17:41:43.880818155 +0000 UTC m=+20.881292211) 2025/04/30 17:41:43 server -> Sending packet 6 (35 bytes) for connection 72f115143fa52a69, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 435bc361fa05b57a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 99.867µs} 2025/04/30 17:41:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:43 server <- Reading packet 3 (33 bytes) for connection f9daa609, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: f9daa609, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:43 Replacing connection for connection IDs [f9daa609 9299145b] with a closed connection. 2025/04/30 17:41:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:43 server Connection 72f115143fa52a69 closed. 2025/04/30 17:41:43 server <- Received Initial packet. 2025/04/30 17:41:43 Created qlog file: /logs/qlog/16883d37bb221435.sqlog 2025/04/30 17:41:43 server Changing connection ID to e4893745. 2025/04/30 17:41:43 Adding connection IDs 16883d37bb221435 and e4893745 for a new connection. 2025/04/30 17:41:43 server <- Reading packet 0 (1200 bytes) for connection 16883d37bb221435, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 16883d37bb221435, SrcConnectionID: dcbf4af1ddd11168, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: dcbf4af1ddd11168, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:43 Adding connection ID 7f76091a. 2025/04/30 17:41:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 16883d37bb221435 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: dcbf4af1ddd11168, SrcConnectionID: e4893745, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 464, Version: v1} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: dcbf4af1ddd11168, SrcConnectionID: e4893745, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 17:41:43 server Short Header{DestConnectionID: dcbf4af1ddd11168, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7f76091a, StatelessResetToken: 0x5b27aef24005762036936de2ddeddeca} 2025/04/30 17:41:43 server <- Reading packet 1 (1201 bytes) for connection e4893745, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: e4893745, SrcConnectionID: dcbf4af1ddd11168, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server newly acked packets (1): [0] 2025/04/30 17:41:43 server updated RTT: 36.709534ms (σ: 18.354767ms) 2025/04/30 17:41:43 server <- Reading packet 0 (76 bytes) for connection e4893745, Handshake 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: e4893745, SrcConnectionID: dcbf4af1ddd11168, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:43 server Dropping Initial keys. 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 Retiring connection ID 16883d37bb221435 in 5s. 2025/04/30 17:41:43 server Dropping Handshake keys. 2025/04/30 17:41:43 server -> Sending packet 1 (259 bytes) for connection 16883d37bb221435, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: dcbf4af1ddd11168, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:43 server -> &wire.NewTokenFrame{Token: 0x1ea11dc4aba54b093da41644f7d353072a43c731ce2ce7ce044a8623a076e3e40f1d5af3805ed9d618b49195bf67f3d14031074c02caa90c4d5c217ecfee7a317a990238bf8c73dd9ddba15793324eb6121ade8fd0b8} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:43 server <- Reading packet 0 (48 bytes) for connection e4893745, 1-RTT 2025/04/30 17:41:43 server Short Header{DestConnectionID: e4893745, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server newly acked packets (1): [0] 2025/04/30 17:41:43 server updated RTT: 37.041ms (σ: 14.429ms) 2025/04/30 17:41:43 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:43 server -> Sending packet 2 (32 bytes) for connection 16883d37bb221435, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: dcbf4af1ddd11168, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.662µs} 2025/04/30 17:41:43 Received request: GET /qhakxepqeq 2025/04/30 17:41:43 server -> Sending packet 3 (1053 bytes) for connection 16883d37bb221435, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: dcbf4af1ddd11168, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:43 server <- Received Initial packet. 2025/04/30 17:41:43 Created qlog file: /logs/qlog/792e08afbadf6e22.sqlog 2025/04/30 17:41:43 server Changing connection ID to ed6d2b84. 2025/04/30 17:41:43 Adding connection IDs 792e08afbadf6e22 and ed6d2b84 for a new connection. 2025/04/30 17:41:43 server <- Reading packet 0 (1200 bytes) for connection 792e08afbadf6e22, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 792e08afbadf6e22, SrcConnectionID: 0ea2d669798c964b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0ea2d669798c964b, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:43 Adding connection ID bb77c542. 2025/04/30 17:41:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 792e08afbadf6e22 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: 0ea2d669798c964b, SrcConnectionID: ed6d2b84, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 454, Version: v1} 2025/04/30 17:41:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: 0ea2d669798c964b, SrcConnectionID: ed6d2b84, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 17:41:43 server Short Header{DestConnectionID: 0ea2d669798c964b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bb77c542, StatelessResetToken: 0x22ca2e5eaa98125856b3328c6e03484c} 2025/04/30 17:41:43 server <- Reading packet 1 (1201 bytes) for connection ed6d2b84, Initial 2025/04/30 17:41:43 server Long Header{Type: Initial, DestConnectionID: ed6d2b84, SrcConnectionID: 0ea2d669798c964b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:43 server newly acked packets (1): [0] 2025/04/30 17:41:43 server updated RTT: 35.35546ms (σ: 17.67773ms) 2025/04/30 17:41:43 server <- Reading packet 0 (76 bytes) for connection ed6d2b84, Handshake 2025/04/30 17:41:43 server Long Header{Type: Handshake, DestConnectionID: ed6d2b84, SrcConnectionID: 0ea2d669798c964b, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:43 server Dropping Initial keys. 2025/04/30 17:41:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:43 Retiring connection ID 792e08afbadf6e22 in 5s. 2025/04/30 17:41:43 server Dropping Handshake keys. 2025/04/30 17:41:43 server -> Sending packet 1 (259 bytes) for connection 792e08afbadf6e22, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:43 server Short Header{DestConnectionID: 0ea2d669798c964b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:43 server -> &wire.NewTokenFrame{Token: 0xd1281a46f2b19b55cc81e34a40de6110c87c7b40555086fd9be96ad88b56219a0e0753e58344dbf5793247ab3fbafa78bed2581a12037b93036134acefc5a416b07816ee03e87fa56842b7ff07e3bbfe38c60e7e734b} 2025/04/30 17:41:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:44 server -> Sending packet 5 (259 bytes) for connection 16883d37bb221435, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: dcbf4af1ddd11168, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:44 server -> &wire.NewTokenFrame{Token: 0x1ea11dc4aba54b093da41644f7d353072a43c731ce2ce7ce044a8623a076e3e40f1d5af3805ed9d618b49195bf67f3d14031074c02caa90c4d5c217ecfee7a317a990238bf8c73dd9ddba15793324eb6121ade8fd0b8} 2025/04/30 17:41:44 server Skipping packet number 4 2025/04/30 17:41:44 server -> Sending packet 6 (1053 bytes) for connection 16883d37bb221435, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: dcbf4af1ddd11168, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:44 server <- Reading packet 1 (28 bytes) for connection ed6d2b84, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: ed6d2b84, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 19ms} 2025/04/30 17:41:44 server newly acked packets (2): [0 1] 2025/04/30 17:41:44 server updated RTT: 37.295ms (σ: 17.138ms) 2025/04/30 17:41:44 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:44 server Canceling loss detection timer. 2025/04/30 17:41:44 server <- Reading packet 3 (33 bytes) for connection e4893745, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: e4893745, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:44 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:44 Replacing connection for connection IDs [e4893745 7f76091a] with a closed connection. 2025/04/30 17:41:44 server Connection 16883d37bb221435 closed. 2025/04/30 17:41:44 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 17:41:44 server -> Sending packet 20 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:44 server -> Sending packet 21 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:44 server <- Reading packet 3 (43 bytes) for connection ed6d2b84, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: ed6d2b84, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:44 server -> Sending packet 2 (1366 bytes) for connection 792e08afbadf6e22, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0ea2d669798c964b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.PingFrame{} 2025/04/30 17:41:44 Received request: GET /xsfaaoxsmi 2025/04/30 17:41:44 server -> Sending packet 3 (34 bytes) for connection 792e08afbadf6e22, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0ea2d669798c964b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 193.561µs} 2025/04/30 17:41:44 server -> Sending packet 4 (1053 bytes) for connection 792e08afbadf6e22, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0ea2d669798c964b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:44 server <- Reading packet 4 (43 bytes) for connection ed6d2b84, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: ed6d2b84, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:44 server Sending ACK because the ACK timer expired. 2025/04/30 17:41:44 server -> Sending packet 5 (35 bytes) for connection 792e08afbadf6e22, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0ea2d669798c964b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.263399ms} 2025/04/30 17:41:44 server <- Reading packet 5 (43 bytes) for connection ed6d2b84, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: ed6d2b84, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:44 server <- Reading packet 6 (31 bytes) for connection ed6d2b84, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: ed6d2b84, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:44 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:44 Replacing connection for connection IDs [ed6d2b84 bb77c542] with a closed connection. 2025/04/30 17:41:44 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:44 server Connection 792e08afbadf6e22 closed. 2025/04/30 17:41:44 server <- Received Initial packet. 2025/04/30 17:41:44 Created qlog file: /logs/qlog/cd85e08948d2d868.sqlog 2025/04/30 17:41:44 server Changing connection ID to 8d7a81ba. 2025/04/30 17:41:44 Adding connection IDs cd85e08948d2d868 and 8d7a81ba for a new connection. 2025/04/30 17:41:44 server <- Reading packet 0 (1200 bytes) for connection cd85e08948d2d868, Initial 2025/04/30 17:41:44 server Long Header{Type: Initial, DestConnectionID: cd85e08948d2d868, SrcConnectionID: 3bb0f543b44c3899, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3bb0f543b44c3899, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:44 Adding connection ID 85d2a648. 2025/04/30 17:41:44 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cd85e08948d2d868 2025/04/30 17:41:44 server Long Header{Type: Initial, DestConnectionID: 3bb0f543b44c3899, SrcConnectionID: 8d7a81ba, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 455, Version: v1} 2025/04/30 17:41:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:44 server Long Header{Type: Handshake, DestConnectionID: 3bb0f543b44c3899, SrcConnectionID: 8d7a81ba, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:44 server Short Header{DestConnectionID: 3bb0f543b44c3899, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 85d2a648, StatelessResetToken: 0xaa291ba58e40b44f31661b0c145f24c3} 2025/04/30 17:41:44 server <- Reading packet 1 (1201 bytes) for connection 8d7a81ba, Initial 2025/04/30 17:41:44 server Long Header{Type: Initial, DestConnectionID: 8d7a81ba, SrcConnectionID: 3bb0f543b44c3899, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:44 server newly acked packets (1): [0] 2025/04/30 17:41:44 server updated RTT: 36.727853ms (σ: 18.363926ms) 2025/04/30 17:41:44 server <- Reading packet 0 (76 bytes) for connection 8d7a81ba, Handshake 2025/04/30 17:41:44 server Long Header{Type: Handshake, DestConnectionID: 8d7a81ba, SrcConnectionID: 3bb0f543b44c3899, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:44 server Dropping Initial keys. 2025/04/30 17:41:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:44 Retiring connection ID cd85e08948d2d868 in 5s. 2025/04/30 17:41:44 server Dropping Handshake keys. 2025/04/30 17:41:44 server -> Sending packet 1 (259 bytes) for connection cd85e08948d2d868, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 3bb0f543b44c3899, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.NewTokenFrame{Token: 0x3f0753eb157583664f9f8e066976b77bd9c0e27e3999130aee47f022ab30537341d9a270c9424ccdad8284b3eb4414e40d7ed2c11d69fdec2c49349da4585c970646d69669ea35744d8ffbfa46cb63f0b07032236fa7} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:44 server <- Reading packet 0 (48 bytes) for connection 8d7a81ba, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: 8d7a81ba, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:44 server newly acked packets (1): [0] 2025/04/30 17:41:44 server updated RTT: 37.114ms (σ: 14.547ms) 2025/04/30 17:41:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:44 Received request: GET /lexcosjtgf 2025/04/30 17:41:44 server -> Sending packet 2 (32 bytes) for connection cd85e08948d2d868, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 3bb0f543b44c3899, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 118.441µs} 2025/04/30 17:41:44 server -> Sending packet 3 (1053 bytes) for connection cd85e08948d2d868, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 3bb0f543b44c3899, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:44 server <- Reading packet 2 (31 bytes) for connection 8d7a81ba, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: 8d7a81ba, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:44 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:44 Replacing connection for connection IDs [8d7a81ba 85d2a648] with a closed connection. 2025/04/30 17:41:44 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:44 server Connection cd85e08948d2d868 closed. 2025/04/30 17:41:44 server <- Received Initial packet. 2025/04/30 17:41:44 Created qlog file: /logs/qlog/84d96b6c86bbd0b2.sqlog 2025/04/30 17:41:44 server Changing connection ID to 37e732eb. 2025/04/30 17:41:44 Adding connection IDs 84d96b6c86bbd0b2 and 37e732eb for a new connection. 2025/04/30 17:41:44 server <- Reading packet 0 (1200 bytes) for connection 84d96b6c86bbd0b2, Initial 2025/04/30 17:41:44 server Long Header{Type: Initial, DestConnectionID: 84d96b6c86bbd0b2, SrcConnectionID: 0b6206dad287eb1a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0b6206dad287eb1a, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:44 Adding connection ID 644e1213. 2025/04/30 17:41:44 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 84d96b6c86bbd0b2 2025/04/30 17:41:44 server Long Header{Type: Initial, DestConnectionID: 0b6206dad287eb1a, SrcConnectionID: 37e732eb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 460, Version: v1} 2025/04/30 17:41:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:44 server Long Header{Type: Handshake, DestConnectionID: 0b6206dad287eb1a, SrcConnectionID: 37e732eb, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 644e1213, StatelessResetToken: 0x1c5da91428d1bbba780d9234b8802939} 2025/04/30 17:41:44 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:44 server -> Sending packet 1 (1280 bytes) for connection 84d96b6c86bbd0b2, Initial 2025/04/30 17:41:44 server Long Header{Type: Initial, DestConnectionID: 0b6206dad287eb1a, SrcConnectionID: 37e732eb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:44 server -> Sending packet 2 (1280 bytes) for connection 84d96b6c86bbd0b2, Initial 2025/04/30 17:41:44 server Long Header{Type: Initial, DestConnectionID: 0b6206dad287eb1a, SrcConnectionID: 37e732eb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:44 server Canceling loss detection timer. 2025/04/30 17:41:44 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 17:41:44 Removing connection ID 2874278e99ff18f1 after it has been retired. 2025/04/30 17:41:44 server <- Reading packet 0 (40 bytes) for connection 37e732eb, Handshake 2025/04/30 17:41:44 server Long Header{Type: Handshake, DestConnectionID: 37e732eb, SrcConnectionID: 0b6206dad287eb1a, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:44 server Dropping Initial keys. 2025/04/30 17:41:44 server <- &wire.PingFrame{} 2025/04/30 17:41:44 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:44 server -> Sending packet 1 (752 bytes) for connection 84d96b6c86bbd0b2, Handshake 2025/04/30 17:41:44 server Long Header{Type: Handshake, DestConnectionID: 0b6206dad287eb1a, SrcConnectionID: 37e732eb, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:44 server -> Sending packet 2 (747 bytes) for connection 84d96b6c86bbd0b2, Handshake 2025/04/30 17:41:44 server Long Header{Type: Handshake, DestConnectionID: 0b6206dad287eb1a, SrcConnectionID: 37e732eb, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:44 server <- Reading packet 1 (76 bytes) for connection 37e732eb, Handshake 2025/04/30 17:41:44 server Long Header{Type: Handshake, DestConnectionID: 37e732eb, SrcConnectionID: 0b6206dad287eb1a, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:44 Retiring connection ID 84d96b6c86bbd0b2 in 5s. 2025/04/30 17:41:44 server Dropping Handshake keys. 2025/04/30 17:41:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:44 server -> Sending packet 2 (280 bytes) for connection 84d96b6c86bbd0b2, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.NewTokenFrame{Token: 0x916ebef6b6039f56bea9bc0b0e47edee4f2ddb07c30256d0357e1fc403ed53acf719c24847ec151f07e00386d1586f971e7641caaaa209a547de539551fc4e9e8f0ca3ae08686c8773aec082f1cd40f822dc213d0e3f} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 644e1213, StatelessResetToken: 0x1c5da91428d1bbba780d9234b8802939} 2025/04/30 17:41:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:44 server -> Sending packet 3 (280 bytes) for connection 84d96b6c86bbd0b2, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.NewTokenFrame{Token: 0x916ebef6b6039f56bea9bc0b0e47edee4f2ddb07c30256d0357e1fc403ed53acf719c24847ec151f07e00386d1586f971e7641caaaa209a547de539551fc4e9e8f0ca3ae08686c8773aec082f1cd40f822dc213d0e3f} 2025/04/30 17:41:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 644e1213, StatelessResetToken: 0x1c5da91428d1bbba780d9234b8802939} 2025/04/30 17:41:44 server -> Sending packet 4 (1366 bytes) for connection 84d96b6c86bbd0b2, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.PingFrame{} 2025/04/30 17:41:44 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 17:41:44 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:44 server <- Reading packet 0 (43 bytes) for connection 37e732eb, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: 37e732eb, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:44 server -> Sending packet 5 (32 bytes) for connection 84d96b6c86bbd0b2, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 94.307µs} 2025/04/30 17:41:44 Received request: GET /efxmvidqnc 2025/04/30 17:41:44 server -> Sending packet 6 (1053 bytes) for connection 84d96b6c86bbd0b2, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:44 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:44 server <- Reading packet 1 (27 bytes) for connection 37e732eb, 1-RTT 2025/04/30 17:41:44 server Short Header{DestConnectionID: 37e732eb, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:44 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:44 server newly acked packets (1): [3] 2025/04/30 17:41:44 server updated RTT: 32.884848ms (σ: 16.442424ms) 2025/04/30 17:41:44 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:45 Tracking 40 connection IDs and 0 reset tokens. 2025/04/30 17:41:45 server <- Reading packet 2 (43 bytes) for connection 37e732eb, 1-RTT 2025/04/30 17:41:45 server Short Header{DestConnectionID: 37e732eb, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:45 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:45 server -> Sending packet 8 (1059 bytes) for connection 84d96b6c86bbd0b2, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 7.19416ms} 2025/04/30 17:41:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:45 server -> Sending packet 9 (1053 bytes) for connection 84d96b6c86bbd0b2, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:45 server <- Reading packet 3 (27 bytes) for connection 37e732eb, 1-RTT 2025/04/30 17:41:45 server Short Header{DestConnectionID: 37e732eb, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:45 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 8, DelayTime: 0s} 2025/04/30 17:41:45 server newly acked packets (1): [9] 2025/04/30 17:41:45 server updated RTT: 32.909ms (σ: 12.381ms) 2025/04/30 17:41:45 server lost packet 4 (time threshold) 2025/04/30 17:41:45 server Canceling loss detection timer. 2025/04/30 17:41:45 server -> Sending packet 10 (30 bytes) for connection 84d96b6c86bbd0b2, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 0b6206dad287eb1a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:45 server <- Received Initial packet. 2025/04/30 17:41:45 Created qlog file: /logs/qlog/67f739d0ec6c212e.sqlog 2025/04/30 17:41:45 server Changing connection ID to b4193c3a. 2025/04/30 17:41:45 Adding connection IDs 67f739d0ec6c212e and b4193c3a for a new connection. 2025/04/30 17:41:45 server <- Reading packet 0 (1200 bytes) for connection 67f739d0ec6c212e, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: 67f739d0ec6c212e, SrcConnectionID: 7610639d15628b41, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7610639d15628b41, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:45 Adding connection ID 5785e399. 2025/04/30 17:41:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 67f739d0ec6c212e 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: 7610639d15628b41, SrcConnectionID: b4193c3a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 461, Version: v1} 2025/04/30 17:41:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:45 server Long Header{Type: Handshake, DestConnectionID: 7610639d15628b41, SrcConnectionID: b4193c3a, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 17:41:45 server Short Header{DestConnectionID: 7610639d15628b41, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5785e399, StatelessResetToken: 0xb1e1e8843e07c798bbdcb68e921e6646} 2025/04/30 17:41:45 server <- Reading packet 5 (31 bytes) for connection 37e732eb, 1-RTT 2025/04/30 17:41:45 server Short Header{DestConnectionID: 37e732eb, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:45 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:45 Replacing connection for connection IDs [37e732eb 644e1213] with a closed connection. 2025/04/30 17:41:45 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:45 server Connection 84d96b6c86bbd0b2 closed. 2025/04/30 17:41:45 server <- Reading packet 1 (1201 bytes) for connection b4193c3a, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: b4193c3a, SrcConnectionID: 7610639d15628b41, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:45 server newly acked packets (1): [0] 2025/04/30 17:41:45 server updated RTT: 35.589012ms (σ: 17.794506ms) 2025/04/30 17:41:45 server <- Reading packet 0 (76 bytes) for connection b4193c3a, Handshake 2025/04/30 17:41:45 server Long Header{Type: Handshake, DestConnectionID: b4193c3a, SrcConnectionID: 7610639d15628b41, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:45 server Dropping Initial keys. 2025/04/30 17:41:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 Retiring connection ID 67f739d0ec6c212e in 5s. 2025/04/30 17:41:45 server Dropping Handshake keys. 2025/04/30 17:41:45 server -> Sending packet 1 (259 bytes) for connection 67f739d0ec6c212e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 7610639d15628b41, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.NewTokenFrame{Token: 0x15f6de1dbf177baa56281e415f7f7e202b5f987b7fabf4fd9ce1313771bcf1789ed738e9820537dde99b46c0608fba24bf4a6a09381561784f6e99d7e8976b5f4d68d1a444e6808b664eabf1e8a95ee6581bcf6ec489} 2025/04/30 17:41:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:45 server <- Reading packet 0 (48 bytes) for connection b4193c3a, 1-RTT 2025/04/30 17:41:45 server Short Header{DestConnectionID: b4193c3a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:45 server newly acked packets (1): [0] 2025/04/30 17:41:45 server updated RTT: 35.953ms (σ: 14.073ms) 2025/04/30 17:41:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:45 server -> Sending packet 2 (32 bytes) for connection 67f739d0ec6c212e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 7610639d15628b41, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.545µs} 2025/04/30 17:41:45 Received request: GET /yvcuexzyns 2025/04/30 17:41:45 server -> Sending packet 3 (1053 bytes) for connection 67f739d0ec6c212e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 7610639d15628b41, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:45 Removing connection IDs [a2b4b69f 0ac72564] for a closed connection after it has been retired. 2025/04/30 17:41:45 server <- Reading packet 1 (27 bytes) for connection b4193c3a, 1-RTT 2025/04/30 17:41:45 server Short Header{DestConnectionID: b4193c3a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:45 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:45 server newly acked packets (2): [1 3] 2025/04/30 17:41:45 server updated RTT: 35.484ms (σ: 11.492ms) 2025/04/30 17:41:45 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:45 server Canceling loss detection timer. 2025/04/30 17:41:45 server -> Sending packet 4 (30 bytes) for connection 67f739d0ec6c212e, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 7610639d15628b41, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:45 server <- Reading packet 2 (31 bytes) for connection b4193c3a, 1-RTT 2025/04/30 17:41:45 server Short Header{DestConnectionID: b4193c3a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:45 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:45 Replacing connection for connection IDs [b4193c3a 5785e399] with a closed connection. 2025/04/30 17:41:45 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:45 server Connection 67f739d0ec6c212e closed. 2025/04/30 17:41:45 server <- Received Initial packet. 2025/04/30 17:41:45 Created qlog file: /logs/qlog/c91e0f7ab4cf5370.sqlog 2025/04/30 17:41:45 server Changing connection ID to 3ad0bd87. 2025/04/30 17:41:45 Adding connection IDs c91e0f7ab4cf5370 and 3ad0bd87 for a new connection. 2025/04/30 17:41:45 server <- Reading packet 1 (1200 bytes) for connection c91e0f7ab4cf5370, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: c91e0f7ab4cf5370, SrcConnectionID: 2fb0ffd4fee1bf96, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2fb0ffd4fee1bf96, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:45 Adding connection ID 29a5ee98. 2025/04/30 17:41:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c91e0f7ab4cf5370 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: 2fb0ffd4fee1bf96, SrcConnectionID: 3ad0bd87, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 457, Version: v1} 2025/04/30 17:41:45 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:45 server Long Header{Type: Handshake, DestConnectionID: 2fb0ffd4fee1bf96, SrcConnectionID: 3ad0bd87, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 17:41:45 server Short Header{DestConnectionID: 2fb0ffd4fee1bf96, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 29a5ee98, StatelessResetToken: 0x5050d5f60b751e1975b5bb59824e90ba} 2025/04/30 17:41:45 server <- Reading packet 2 (1200 bytes) for connection 3ad0bd87, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: 3ad0bd87, SrcConnectionID: 2fb0ffd4fee1bf96, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 17:41:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:45 server -> Sending packet 1 (45 bytes) for connection c91e0f7ab4cf5370, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: 2fb0ffd4fee1bf96, SrcConnectionID: 3ad0bd87, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:45 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:45 server <- Reading packet 0 (76 bytes) for connection 3ad0bd87, Handshake 2025/04/30 17:41:45 server Long Header{Type: Handshake, DestConnectionID: 3ad0bd87, SrcConnectionID: 2fb0ffd4fee1bf96, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:45 server Dropping Initial keys. 2025/04/30 17:41:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 Retiring connection ID c91e0f7ab4cf5370 in 5s. 2025/04/30 17:41:45 server Dropping Handshake keys. 2025/04/30 17:41:45 server -> Sending packet 1 (1366 bytes) for connection c91e0f7ab4cf5370, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 2fb0ffd4fee1bf96, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.PingFrame{} 2025/04/30 17:41:45 server -> Sending packet 2 (256 bytes) for connection c91e0f7ab4cf5370, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 2fb0ffd4fee1bf96, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:45 server -> &wire.NewTokenFrame{Token: 0x0865effd4330b47438bda0874301dea78a3f3fea13ecb2da749d8708dc8e04f5b0073786009aaa3f84e44dc2afe20d7db20b08cb1461edb7c3ab2b28e9b3feb557592b19fec8fb4b6c96173884e24bf453e54a7e3dba} 2025/04/30 17:41:45 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 48 bytes. 2025/04/30 17:41:45 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:45 server <- Reading packet 0 (48 bytes) for connection 3ad0bd87, 1-RTT 2025/04/30 17:41:45 server Short Header{DestConnectionID: 3ad0bd87, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:45 server newly acked packets (1): [0] 2025/04/30 17:41:45 server updated RTT: 40.371304ms (σ: 20.185652ms) 2025/04/30 17:41:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:45 server -> Sending packet 3 (32 bytes) for connection c91e0f7ab4cf5370, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 2fb0ffd4fee1bf96, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104.796µs} 2025/04/30 17:41:45 Received request: GET /xhsnipdnfx 2025/04/30 17:41:45 server -> Sending packet 4 (1053 bytes) for connection c91e0f7ab4cf5370, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:45 server Short Header{DestConnectionID: 2fb0ffd4fee1bf96, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:45 server <- Reading packet 2 (33 bytes) for connection 3ad0bd87, 1-RTT 2025/04/30 17:41:45 server Short Header{DestConnectionID: 3ad0bd87, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:45 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:45 Replacing connection for connection IDs [3ad0bd87 29a5ee98] with a closed connection. 2025/04/30 17:41:45 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:45 server Connection c91e0f7ab4cf5370 closed. 2025/04/30 17:41:45 Removing connection ID 54466cdbce48cdfc after it has been retired. 2025/04/30 17:41:45 server <- Received Initial packet. 2025/04/30 17:41:45 Created qlog file: /logs/qlog/debde581821ddb9f.sqlog 2025/04/30 17:41:45 server Changing connection ID to a7f24c4b. 2025/04/30 17:41:45 Adding connection IDs debde581821ddb9f and a7f24c4b for a new connection. 2025/04/30 17:41:45 server <- Reading packet 1 (1200 bytes) for connection debde581821ddb9f, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: debde581821ddb9f, SrcConnectionID: 4b6554c747ca3d22, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 4b6554c747ca3d22, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:45 Adding connection ID e14b9840. 2025/04/30 17:41:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection debde581821ddb9f 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: 4b6554c747ca3d22, SrcConnectionID: a7f24c4b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 462, Version: v1} 2025/04/30 17:41:45 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:45 server Long Header{Type: Handshake, DestConnectionID: 4b6554c747ca3d22, SrcConnectionID: a7f24c4b, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 17:41:45 server Short Header{DestConnectionID: 4b6554c747ca3d22, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e14b9840, StatelessResetToken: 0x2210cb7cf8f9255a516cc6b06d4a09b4} 2025/04/30 17:41:45 Removing connection ID 85d24cfe81b3d482 after it has been retired. 2025/04/30 17:41:45 Removing connection ID 659d8f07119901bc after it has been retired. 2025/04/30 17:41:45 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:45 server -> Sending packet 1 (1280 bytes) for connection debde581821ddb9f, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: 4b6554c747ca3d22, SrcConnectionID: a7f24c4b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:45 server -> Sending packet 2 (1280 bytes) for connection debde581821ddb9f, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: 4b6554c747ca3d22, SrcConnectionID: a7f24c4b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:45 server Canceling loss detection timer. 2025/04/30 17:41:45 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 17:41:45 server <- Reading packet 2 (1201 bytes) for connection a7f24c4b, Initial 2025/04/30 17:41:45 server Long Header{Type: Initial, DestConnectionID: a7f24c4b, SrcConnectionID: 4b6554c747ca3d22, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:45 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:46 Removing connection IDs [3b3659c3 c5cf1343] for a closed connection after it has been retired. 2025/04/30 17:41:46 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:46 server -> Sending packet 1 (745 bytes) for connection debde581821ddb9f, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: 4b6554c747ca3d22, SrcConnectionID: a7f24c4b, PacketNumber: 1, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 17:41:46 server -> Sending packet 2 (745 bytes) for connection debde581821ddb9f, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: 4b6554c747ca3d22, SrcConnectionID: a7f24c4b, PacketNumber: 2, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 17:41:46 server <- Reading packet 0 (40 bytes) for connection a7f24c4b, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: a7f24c4b, SrcConnectionID: 4b6554c747ca3d22, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:46 server Dropping Initial keys. 2025/04/30 17:41:46 server <- &wire.PingFrame{} 2025/04/30 17:41:46 server -> Sending packet 3 (44 bytes) for connection debde581821ddb9f, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: 4b6554c747ca3d22, SrcConnectionID: a7f24c4b, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:46 server <- Reading packet 1 (76 bytes) for connection a7f24c4b, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: a7f24c4b, SrcConnectionID: 4b6554c747ca3d22, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 Retiring connection ID debde581821ddb9f in 5s. 2025/04/30 17:41:46 server Dropping Handshake keys. 2025/04/30 17:41:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:46 server -> Sending packet 2 (280 bytes) for connection debde581821ddb9f, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 4b6554c747ca3d22, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.NewTokenFrame{Token: 0x1ff4b02a75c52ee6e53d04ae2e135d5c9b9bad229daae717bc05bcf67468d7427a7a0207d0438ed06238ee3bf3241b8937088e5a1d24991a079c56d5e2fa9557f0ea646abe0a753187a34d03f82f14272686253cdddd} 2025/04/30 17:41:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e14b9840, StatelessResetToken: 0x2210cb7cf8f9255a516cc6b06d4a09b4} 2025/04/30 17:41:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:46 server -> Sending packet 3 (280 bytes) for connection debde581821ddb9f, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 4b6554c747ca3d22, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e14b9840, StatelessResetToken: 0x2210cb7cf8f9255a516cc6b06d4a09b4} 2025/04/30 17:41:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:46 server -> &wire.NewTokenFrame{Token: 0x1ff4b02a75c52ee6e53d04ae2e135d5c9b9bad229daae717bc05bcf67468d7427a7a0207d0438ed06238ee3bf3241b8937088e5a1d24991a079c56d5e2fa9557f0ea646abe0a753187a34d03f82f14272686253cdddd} 2025/04/30 17:41:46 server -> Sending packet 4 (1366 bytes) for connection debde581821ddb9f, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 4b6554c747ca3d22, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.PingFrame{} 2025/04/30 17:41:46 server <- Reading packet 0 (43 bytes) for connection a7f24c4b, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: a7f24c4b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:46 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:46 server -> Sending packet 5 (32 bytes) for connection debde581821ddb9f, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 4b6554c747ca3d22, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 70.501µs} 2025/04/30 17:41:46 Received request: GET /pdcqonukvl 2025/04/30 17:41:46 server -> Sending packet 6 (1053 bytes) for connection debde581821ddb9f, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 4b6554c747ca3d22, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:46 server <- Reading packet 1 (27 bytes) for connection a7f24c4b, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: a7f24c4b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:46 server newly acked packets (1): [3] 2025/04/30 17:41:46 server updated RTT: 33.035699ms (σ: 16.517849ms) 2025/04/30 17:41:46 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:46 server <- Reading packet 2 (28 bytes) for connection a7f24c4b, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: a7f24c4b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 19ms} 2025/04/30 17:41:46 server newly acked packets (1): [4] 2025/04/30 17:41:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:46 server -> Sending packet 8 (1053 bytes) for connection debde581821ddb9f, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 4b6554c747ca3d22, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:46 server -> Sending packet 9 (1053 bytes) for connection debde581821ddb9f, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 4b6554c747ca3d22, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:46 server <- Reading packet 3 (33 bytes) for connection a7f24c4b, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: a7f24c4b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:46 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:46 Replacing connection for connection IDs [a7f24c4b e14b9840] with a closed connection. 2025/04/30 17:41:46 server Connection debde581821ddb9f closed. 2025/04/30 17:41:46 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:46 server <- Received Initial packet. 2025/04/30 17:41:46 Created qlog file: /logs/qlog/ead11a90557ff6a8.sqlog 2025/04/30 17:41:46 server Changing connection ID to 5fb44a13. 2025/04/30 17:41:46 Adding connection IDs ead11a90557ff6a8 and 5fb44a13 for a new connection. 2025/04/30 17:41:46 server <- Reading packet 0 (1200 bytes) for connection ead11a90557ff6a8, Initial 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: ead11a90557ff6a8, SrcConnectionID: 11e3bedb91cde882, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 11e3bedb91cde882, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:46 Adding connection ID 8ba4d77b. 2025/04/30 17:41:46 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ead11a90557ff6a8 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: 11e3bedb91cde882, SrcConnectionID: 5fb44a13, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 455, Version: v1} 2025/04/30 17:41:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: 11e3bedb91cde882, SrcConnectionID: 5fb44a13, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:46 server Short Header{DestConnectionID: 11e3bedb91cde882, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8ba4d77b, StatelessResetToken: 0xf249b0a80acb6d35000ca2eb23fd9b07} 2025/04/30 17:41:46 server <- Reading packet 1 (1201 bytes) for connection 5fb44a13, Initial 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: 5fb44a13, SrcConnectionID: 11e3bedb91cde882, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:46 server newly acked packets (1): [0] 2025/04/30 17:41:46 server updated RTT: 35.947385ms (σ: 17.973692ms) 2025/04/30 17:41:46 server <- Reading packet 0 (76 bytes) for connection 5fb44a13, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: 5fb44a13, SrcConnectionID: 11e3bedb91cde882, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:46 server Dropping Initial keys. 2025/04/30 17:41:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 Retiring connection ID ead11a90557ff6a8 in 5s. 2025/04/30 17:41:46 server Dropping Handshake keys. 2025/04/30 17:41:46 server -> Sending packet 1 (259 bytes) for connection ead11a90557ff6a8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 11e3bedb91cde882, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:46 server -> &wire.NewTokenFrame{Token: 0x040b218ae3ff34076385effce67863a63dbba65d6af2aaa39977d95bbfa12109b5d3663a336bbb6945b2a7b1a46a4c29a167b3e00de95627de4adda76688f1d67792d0de77c8eeefe4553dd178928f1b575565f1f7c3} 2025/04/30 17:41:46 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:46 server <- Reading packet 0 (48 bytes) for connection 5fb44a13, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: 5fb44a13, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:46 server newly acked packets (1): [0] 2025/04/30 17:41:46 server updated RTT: 36.188ms (σ: 13.961ms) 2025/04/30 17:41:46 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:46 server -> Sending packet 2 (32 bytes) for connection ead11a90557ff6a8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 11e3bedb91cde882, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 116.106µs} 2025/04/30 17:41:46 Received request: GET /kugkeewdgm 2025/04/30 17:41:46 server -> Sending packet 3 (1053 bytes) for connection ead11a90557ff6a8, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 11e3bedb91cde882, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:46 server <- Reading packet 1 (29 bytes) for connection 5fb44a13, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: 5fb44a13, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:41:46 server newly acked packets (2): [1 3] 2025/04/30 17:41:46 server updated RTT: 35.688ms (σ: 11.469ms) 2025/04/30 17:41:46 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:46 server Canceling loss detection timer. 2025/04/30 17:41:46 server -> Sending packet 4 (30 bytes) for connection ead11a90557ff6a8, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:46 server Short Header{DestConnectionID: 11e3bedb91cde882, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:46 Removing connection ID c798e85be988532b after it has been retired. 2025/04/30 17:41:46 server <- Received Initial packet. 2025/04/30 17:41:46 Created qlog file: /logs/qlog/68c7f20b504df15d.sqlog 2025/04/30 17:41:46 server Changing connection ID to 9814e27d. 2025/04/30 17:41:46 Adding connection IDs 68c7f20b504df15d and 9814e27d for a new connection. 2025/04/30 17:41:46 server <- Reading packet 0 (1200 bytes) for connection 68c7f20b504df15d, Initial 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: 68c7f20b504df15d, SrcConnectionID: aed588aa430dddbb, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: aed588aa430dddbb, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:46 Adding connection ID 3b245aa5. 2025/04/30 17:41:46 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 68c7f20b504df15d 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: aed588aa430dddbb, SrcConnectionID: 9814e27d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 455, Version: v1} 2025/04/30 17:41:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: aed588aa430dddbb, SrcConnectionID: 9814e27d, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:46 server Short Header{DestConnectionID: aed588aa430dddbb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3b245aa5, StatelessResetToken: 0xb0adbfd3a3e9152d24c0d377bdef8ac2} 2025/04/30 17:41:46 server <- Reading packet 3 (33 bytes) for connection 5fb44a13, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: 5fb44a13, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:46 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:46 Replacing connection for connection IDs [5fb44a13 8ba4d77b] with a closed connection. 2025/04/30 17:41:46 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:46 server Connection ead11a90557ff6a8 closed. 2025/04/30 17:41:46 Removing connection IDs [a1df8658 c08a75c0] for a closed connection after it has been retired. 2025/04/30 17:41:46 server <- Reading packet 1 (1200 bytes) for connection 68c7f20b504df15d, Initial 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: 68c7f20b504df15d, SrcConnectionID: aed588aa430dddbb, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:46 server -> Sending packet 1 (45 bytes) for connection 68c7f20b504df15d, Initial 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: aed588aa430dddbb, SrcConnectionID: 9814e27d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:46 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:46 server -> Sending packet 2 (1280 bytes) for connection 68c7f20b504df15d, Initial 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: aed588aa430dddbb, SrcConnectionID: 9814e27d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:46 server -> Sending packet 3 (1280 bytes) for connection 68c7f20b504df15d, Initial 2025/04/30 17:41:46 server Long Header{Type: Initial, DestConnectionID: aed588aa430dddbb, SrcConnectionID: 9814e27d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:46 server <- Reading packet 0 (40 bytes) for connection 9814e27d, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: 9814e27d, SrcConnectionID: aed588aa430dddbb, PacketNumber: 0, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 17:41:46 server Dropping Initial keys. 2025/04/30 17:41:46 server <- &wire.PingFrame{} 2025/04/30 17:41:46 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 17:41:46 server -> Sending packet 1 (757 bytes) for connection 68c7f20b504df15d, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: aed588aa430dddbb, SrcConnectionID: 9814e27d, PacketNumber: 1, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 17:41:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:46 server -> Sending packet 2 (752 bytes) for connection 68c7f20b504df15d, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: aed588aa430dddbb, SrcConnectionID: 9814e27d, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 17:41:46 server <- Reading packet 1 (76 bytes) for connection 9814e27d, Handshake 2025/04/30 17:41:46 server Long Header{Type: Handshake, DestConnectionID: 9814e27d, SrcConnectionID: aed588aa430dddbb, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:46 Retiring connection ID 68c7f20b504df15d in 5s. 2025/04/30 17:41:46 server Dropping Handshake keys. 2025/04/30 17:41:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:46 server -> Sending packet 2 (280 bytes) for connection 68c7f20b504df15d, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: aed588aa430dddbb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3b245aa5, StatelessResetToken: 0xb0adbfd3a3e9152d24c0d377bdef8ac2} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:46 server -> &wire.NewTokenFrame{Token: 0xf23cb815179c2a1e6ff8e2a46921a76dee3dc0db259421e41e4003dacddadc58814c5b31ce387543ccf93728d380eb9ecdfc7c02c67d6f841de96e6c43bc2387555b0ce655547bb5d8d6dd2d46872e4aac6f373b7679} 2025/04/30 17:41:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:46 server -> Sending packet 3 (280 bytes) for connection 68c7f20b504df15d, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: aed588aa430dddbb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:46 server -> &wire.NewTokenFrame{Token: 0xf23cb815179c2a1e6ff8e2a46921a76dee3dc0db259421e41e4003dacddadc58814c5b31ce387543ccf93728d380eb9ecdfc7c02c67d6f841de96e6c43bc2387555b0ce655547bb5d8d6dd2d46872e4aac6f373b7679} 2025/04/30 17:41:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3b245aa5, StatelessResetToken: 0xb0adbfd3a3e9152d24c0d377bdef8ac2} 2025/04/30 17:41:46 server Skipping packet number 4 2025/04/30 17:41:46 server -> Sending packet 5 (1366 bytes) for connection 68c7f20b504df15d, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:46 server Short Header{DestConnectionID: aed588aa430dddbb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.PingFrame{} 2025/04/30 17:41:46 server Skipping packet number 4 2025/04/30 17:41:46 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:46 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:46 server <- Reading packet 1 (27 bytes) for connection 9814e27d, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: 9814e27d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 17:41:46 server newly acked packets (1): [3] 2025/04/30 17:41:46 server updated RTT: 32.51097ms (σ: 16.255485ms) 2025/04/30 17:41:46 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:46 server Canceling loss detection timer. 2025/04/30 17:41:46 Removing connection IDs [4dfdc6f9 0b2c883f] for a closed connection after it has been retired. 2025/04/30 17:41:46 server <- Reading packet 3 (43 bytes) for connection 9814e27d, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: 9814e27d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:46 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:46 server -> Sending packet 6 (34 bytes) for connection 68c7f20b504df15d, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:46 server Short Header{DestConnectionID: aed588aa430dddbb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 139.079µs} 2025/04/30 17:41:46 Received request: GET /fhwdunqdhl 2025/04/30 17:41:46 server -> Sending packet 7 (1053 bytes) for connection 68c7f20b504df15d, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:46 server Short Header{DestConnectionID: aed588aa430dddbb, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:46 server <- Reading packet 4 (48 bytes) for connection 9814e27d, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: 9814e27d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:46 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s} 2025/04/30 17:41:46 server newly acked packets (1): [5] 2025/04/30 17:41:46 server updated RTT: 45.75ms (σ: 38.671ms) 2025/04/30 17:41:46 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:46 server <- Reading packet 5 (31 bytes) for connection 9814e27d, 1-RTT 2025/04/30 17:41:46 server Short Header{DestConnectionID: 9814e27d, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:46 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:46 Replacing connection for connection IDs [9814e27d 3b245aa5] with a closed connection. 2025/04/30 17:41:46 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:46 server Connection 68c7f20b504df15d closed. 2025/04/30 17:41:47 Tracking 43 connection IDs and 0 reset tokens. 2025/04/30 17:41:47 Removing connection ID be19fc14d1ccf153 after it has been retired. 2025/04/30 17:41:47 Removing connection IDs [a747e376 da0c82da] for a closed connection after it has been retired. 2025/04/30 17:41:47 server <- Received Initial packet. 2025/04/30 17:41:47 Created qlog file: /logs/qlog/897e9c3b3a573826.sqlog 2025/04/30 17:41:47 server Changing connection ID to 421c3f42. 2025/04/30 17:41:47 Adding connection IDs 897e9c3b3a573826 and 421c3f42 for a new connection. 2025/04/30 17:41:47 server <- Reading packet 3 (1200 bytes) for connection 897e9c3b3a573826, Initial 2025/04/30 17:41:47 server Long Header{Type: Initial, DestConnectionID: 897e9c3b3a573826, SrcConnectionID: 4d07e43eec27d527, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:47 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:47 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:47 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:47 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 4d07e43eec27d527, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:47 Adding connection ID b122ad55. 2025/04/30 17:41:47 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 897e9c3b3a573826 2025/04/30 17:41:47 server Long Header{Type: Initial, DestConnectionID: 4d07e43eec27d527, SrcConnectionID: 421c3f42, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 460, Version: v1} 2025/04/30 17:41:47 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:47 server Long Header{Type: Handshake, DestConnectionID: 4d07e43eec27d527, SrcConnectionID: 421c3f42, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:47 server Short Header{DestConnectionID: 4d07e43eec27d527, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b122ad55, StatelessResetToken: 0x8315f37cec39d9d80446556fb3abcdf8} 2025/04/30 17:41:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 17:41:47 server -> Sending packet 23 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:47 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:47 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:47 server -> Sending packet 24 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:47 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:47 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:47 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:47 server -> Sending packet 1 (1280 bytes) for connection 897e9c3b3a573826, Initial 2025/04/30 17:41:47 server Long Header{Type: Initial, DestConnectionID: 4d07e43eec27d527, SrcConnectionID: 421c3f42, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:47 server -> Sending packet 2 (1280 bytes) for connection 897e9c3b3a573826, Initial 2025/04/30 17:41:47 server Long Header{Type: Initial, DestConnectionID: 4d07e43eec27d527, SrcConnectionID: 421c3f42, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:47 server Canceling loss detection timer. 2025/04/30 17:41:47 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 17:41:47 server <- Reading packet 4 (1201 bytes) for connection 421c3f42, Initial 2025/04/30 17:41:47 server Long Header{Type: Initial, DestConnectionID: 421c3f42, SrcConnectionID: 4d07e43eec27d527, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:47 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 17:41:47 Removing connection ID bd61e4880f87fe17 after it has been retired. 2025/04/30 17:41:47 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:47 server -> Sending packet 1 (747 bytes) for connection 897e9c3b3a573826, Handshake 2025/04/30 17:41:47 server Long Header{Type: Handshake, DestConnectionID: 4d07e43eec27d527, SrcConnectionID: 421c3f42, PacketNumber: 1, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:47 server -> Sending packet 2 (747 bytes) for connection 897e9c3b3a573826, Handshake 2025/04/30 17:41:47 server Long Header{Type: Handshake, DestConnectionID: 4d07e43eec27d527, SrcConnectionID: 421c3f42, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 17:41:47 server <- Reading packet 0 (76 bytes) for connection 421c3f42, Handshake 2025/04/30 17:41:47 server Long Header{Type: Handshake, DestConnectionID: 421c3f42, SrcConnectionID: 4d07e43eec27d527, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:47 server Dropping Initial keys. 2025/04/30 17:41:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:47 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:47 Retiring connection ID 897e9c3b3a573826 in 5s. 2025/04/30 17:41:47 server Dropping Handshake keys. 2025/04/30 17:41:47 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 17:41:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:47 server -> Sending packet 2 (280 bytes) for connection 897e9c3b3a573826, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:47 server Short Header{DestConnectionID: 4d07e43eec27d527, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b122ad55, StatelessResetToken: 0x8315f37cec39d9d80446556fb3abcdf8} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:47 server -> &wire.NewTokenFrame{Token: 0x954f95c54f86254518b7a693b2bd909170127319328dab4facac098c3d4b1e8fa5c67495dcad6c0d761e7e8c7845cd6daaf1517edae7843045aa49a398587fae1f2f77507c5f2c300f4e778b5290c4776fc5310963ca} 2025/04/30 17:41:47 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:47 server -> Sending packet 3 (280 bytes) for connection 897e9c3b3a573826, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:47 server Short Header{DestConnectionID: 4d07e43eec27d527, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:47 server -> &wire.NewTokenFrame{Token: 0x954f95c54f86254518b7a693b2bd909170127319328dab4facac098c3d4b1e8fa5c67495dcad6c0d761e7e8c7845cd6daaf1517edae7843045aa49a398587fae1f2f77507c5f2c300f4e778b5290c4776fc5310963ca} 2025/04/30 17:41:47 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b122ad55, StatelessResetToken: 0x8315f37cec39d9d80446556fb3abcdf8} 2025/04/30 17:41:47 server -> Sending packet 4 (1366 bytes) for connection 897e9c3b3a573826, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:47 server Short Header{DestConnectionID: 4d07e43eec27d527, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:47 server -> &wire.PingFrame{} 2025/04/30 17:41:47 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:47 server <- Reading packet 1 (28 bytes) for connection 421c3f42, 1-RTT 2025/04/30 17:41:47 server Short Header{DestConnectionID: 421c3f42, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:47 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 19ms} 2025/04/30 17:41:47 server newly acked packets (1): [4] 2025/04/30 17:41:47 server updated RTT: 52.356402ms (σ: 26.178201ms) 2025/04/30 17:41:47 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:47 server setting loss timer for packet 3 (1-RTT) to 58.900952ms (in 2025-04-30 17:41:47.943904429 +0000 UTC m=+24.944378485) 2025/04/30 17:41:47 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 17:41:47.943904429 +0000 UTC m=+24.944378485 2025/04/30 17:41:47 server lost packet 3 (time threshold) 2025/04/30 17:41:47 server Canceling loss detection timer. 2025/04/30 17:41:47 server -> Sending packet 5 (280 bytes) for connection 897e9c3b3a573826, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:47 server Short Header{DestConnectionID: 4d07e43eec27d527, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b122ad55, StatelessResetToken: 0x8315f37cec39d9d80446556fb3abcdf8} 2025/04/30 17:41:47 server -> &wire.NewTokenFrame{Token: 0x954f95c54f86254518b7a693b2bd909170127319328dab4facac098c3d4b1e8fa5c67495dcad6c0d761e7e8c7845cd6daaf1517edae7843045aa49a398587fae1f2f77507c5f2c300f4e778b5290c4776fc5310963ca} 2025/04/30 17:41:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:47 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:47 server <- Reading packet 2 (28 bytes) for connection 421c3f42, 1-RTT 2025/04/30 17:41:47 server Short Header{DestConnectionID: 421c3f42, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:47 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 19ms} 2025/04/30 17:41:47 server newly acked packets (1): [5] 2025/04/30 17:41:47 server updated RTT: 52.209ms (σ: 19.927ms) 2025/04/30 17:41:47 server Canceling loss detection timer. 2025/04/30 17:41:48 Removing connection IDs [f3666213 6e2e5cfb] for a closed connection after it has been retired. 2025/04/30 17:41:48 Removing connection ID 782e08ec5ce30a71 after it has been retired. 2025/04/30 17:41:48 server <- Reading packet 3 (43 bytes) for connection 421c3f42, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: 421c3f42, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:48 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:48 server -> Sending packet 6 (32 bytes) for connection 897e9c3b3a573826, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 4d07e43eec27d527, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 Received request: GET /cjjhzlyund 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 148.096µs} 2025/04/30 17:41:48 server -> Sending packet 7 (1053 bytes) for connection 897e9c3b3a573826, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 4d07e43eec27d527, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:48 server <- Reading packet 4 (33 bytes) for connection 421c3f42, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: 421c3f42, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:48 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:48 Replacing connection for connection IDs [421c3f42 b122ad55] with a closed connection. 2025/04/30 17:41:48 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:48 server Connection 897e9c3b3a573826 closed. 2025/04/30 17:41:48 server <- Received Initial packet. 2025/04/30 17:41:48 Created qlog file: /logs/qlog/1d6cfce9402cafe3.sqlog 2025/04/30 17:41:48 server Changing connection ID to 8752049f. 2025/04/30 17:41:48 Adding connection IDs 1d6cfce9402cafe3 and 8752049f for a new connection. 2025/04/30 17:41:48 server <- Reading packet 0 (1200 bytes) for connection 1d6cfce9402cafe3, Initial 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: 1d6cfce9402cafe3, SrcConnectionID: 67caa0d4b43b65b4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:48 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 67caa0d4b43b65b4, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:48 Adding connection ID 4c7ed00a. 2025/04/30 17:41:48 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1d6cfce9402cafe3 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: 67caa0d4b43b65b4, SrcConnectionID: 8752049f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 466, Version: v1} 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: 67caa0d4b43b65b4, SrcConnectionID: 8752049f, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 17:41:48 server Short Header{DestConnectionID: 67caa0d4b43b65b4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c7ed00a, StatelessResetToken: 0x95bc5977284abf87fe9bb2547b4f3c4b} 2025/04/30 17:41:48 server <- Reading packet 1 (1201 bytes) for connection 8752049f, Initial 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: 8752049f, SrcConnectionID: 67caa0d4b43b65b4, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:41:48 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:48 server newly acked packets (1): [0] 2025/04/30 17:41:48 server updated RTT: 35.932338ms (σ: 17.966169ms) 2025/04/30 17:41:48 server <- Reading packet 1 (42 bytes) for connection 8752049f, Handshake 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: 8752049f, SrcConnectionID: 67caa0d4b43b65b4, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 17:41:48 server Dropping Initial keys. 2025/04/30 17:41:48 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:48 server newly acked packets (1): [0] 2025/04/30 17:41:48 server updated RTT: 36.146ms (σ: 13.903ms) 2025/04/30 17:41:48 server Canceling loss detection timer. 2025/04/30 17:41:48 server Queueing packet (48 bytes) for later decryption 2025/04/30 17:41:48 server <- Reading packet 2 (76 bytes) for connection 8752049f, Handshake 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: 8752049f, SrcConnectionID: 67caa0d4b43b65b4, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:48 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 Retiring connection ID 1d6cfce9402cafe3 in 5s. 2025/04/30 17:41:48 server Dropping Handshake keys. 2025/04/30 17:41:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:48 server -> Sending packet 2 (283 bytes) for connection 1d6cfce9402cafe3, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 67caa0d4b43b65b4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.NewTokenFrame{Token: 0x977a1310d3abe855e75b56d152e5a006527f3f16586bf56ba207d0841b3b02dfd5ac4c7ac8e28a02de1aabc4159693b60c1684fae6237538b96e91b27351fae24523398f5e26061e0d4ad575b52c6fba10150dd9de81} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c7ed00a, StatelessResetToken: 0x95bc5977284abf87fe9bb2547b4f3c4b} 2025/04/30 17:41:48 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:48 server -> Sending packet 3 (283 bytes) for connection 1d6cfce9402cafe3, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 67caa0d4b43b65b4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.NewTokenFrame{Token: 0x977a1310d3abe855e75b56d152e5a006527f3f16586bf56ba207d0841b3b02dfd5ac4c7ac8e28a02de1aabc4159693b60c1684fae6237538b96e91b27351fae24523398f5e26061e0d4ad575b52c6fba10150dd9de81} 2025/04/30 17:41:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c7ed00a, StatelessResetToken: 0x95bc5977284abf87fe9bb2547b4f3c4b} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 17:41:48 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:48 server <- Reading packet 0 (48 bytes) for connection 8752049f, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: 8752049f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:48 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:48 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:48 server -> Sending packet 4 (33 bytes) for connection 1d6cfce9402cafe3, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 67caa0d4b43b65b4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.404065ms} 2025/04/30 17:41:48 Received request: GET /vyyiebvucf 2025/04/30 17:41:48 server -> Sending packet 5 (1053 bytes) for connection 1d6cfce9402cafe3, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 67caa0d4b43b65b4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:48 server <- Reading packet 1 (43 bytes) for connection 8752049f, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: 8752049f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:48 server Setting ACK timer to max ack delay: 25ms 2025/04/30 17:41:48 server <- Reading packet 2 (30 bytes) for connection 8752049f, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: 8752049f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 19ms} 2025/04/30 17:41:48 server newly acked packets (1): [3] 2025/04/30 17:41:48 server updated RTT: 38.129ms (σ: 14.395ms) 2025/04/30 17:41:48 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:48 server Sending ACK because the ACK timer expired. 2025/04/30 17:41:48 server -> Sending packet 6 (33 bytes) for connection 1d6cfce9402cafe3, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 67caa0d4b43b65b4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 6.217699ms} 2025/04/30 17:41:48 Removing connection IDs [490fd802 b0fe2785] for a closed connection after it has been retired. 2025/04/30 17:41:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:48 server -> Sending packet 8 (1053 bytes) for connection 1d6cfce9402cafe3, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 67caa0d4b43b65b4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:48 server -> Sending packet 9 (1053 bytes) for connection 1d6cfce9402cafe3, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 67caa0d4b43b65b4, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:48 server <- Reading packet 3 (33 bytes) for connection 8752049f, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: 8752049f, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:48 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:48 Replacing connection for connection IDs [8752049f 4c7ed00a] with a closed connection. 2025/04/30 17:41:48 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:48 server Connection 1d6cfce9402cafe3 closed. 2025/04/30 17:41:48 server <- Received Initial packet. 2025/04/30 17:41:48 Created qlog file: /logs/qlog/68ccf038c0d50aec.sqlog 2025/04/30 17:41:48 server Changing connection ID to 8b79e13a. 2025/04/30 17:41:48 Adding connection IDs 68ccf038c0d50aec and 8b79e13a for a new connection. 2025/04/30 17:41:48 server <- Reading packet 0 (1200 bytes) for connection 68ccf038c0d50aec, Initial 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: 68ccf038c0d50aec, SrcConnectionID: 0fa2a0caf50f95ca, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:48 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0fa2a0caf50f95ca, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:48 Adding connection ID f75d2330. 2025/04/30 17:41:48 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 68ccf038c0d50aec 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: 0fa2a0caf50f95ca, SrcConnectionID: 8b79e13a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 469, Version: v1} 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: 0fa2a0caf50f95ca, SrcConnectionID: 8b79e13a, PacketNumber: 0, PacketNumberLen: 2, Length: 717, Version: v1} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 17:41:48 server Short Header{DestConnectionID: 0fa2a0caf50f95ca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f75d2330, StatelessResetToken: 0x4e9daba7c07221ccf5c26863f53db761} 2025/04/30 17:41:48 server <- Reading packet 0 (76 bytes) for connection 8b79e13a, Handshake 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: 8b79e13a, SrcConnectionID: 0fa2a0caf50f95ca, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:48 server Dropping Initial keys. 2025/04/30 17:41:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:48 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 Retiring connection ID 68ccf038c0d50aec in 5s. 2025/04/30 17:41:48 server Dropping Handshake keys. 2025/04/30 17:41:48 server -> Sending packet 1 (1366 bytes) for connection 68ccf038c0d50aec, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 0fa2a0caf50f95ca, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.PingFrame{} 2025/04/30 17:41:48 server -> Sending packet 2 (256 bytes) for connection 68ccf038c0d50aec, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 0fa2a0caf50f95ca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:48 server -> &wire.NewTokenFrame{Token: 0x00a7b74a7047d2a62d068e11e6d1c03d4c90f40c8504ee92b96ebbe128da8595a7182dba59d4090394af6e8e0b16d6703131c66873e058bc0f39866f1e529320634915c59c47d97ee0ac614ad7ce90d675e82d822acd} 2025/04/30 17:41:48 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:48 server <- Reading packet 0 (48 bytes) for connection 8b79e13a, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: 8b79e13a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:48 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:48 server newly acked packets (1): [0] 2025/04/30 17:41:48 server updated RTT: 37.241322ms (σ: 18.620661ms) 2025/04/30 17:41:48 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:48 server -> Sending packet 3 (32 bytes) for connection 68ccf038c0d50aec, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 0fa2a0caf50f95ca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.341µs} 2025/04/30 17:41:48 Received request: GET /wyefkiswny 2025/04/30 17:41:48 server -> Sending packet 4 (1053 bytes) for connection 68ccf038c0d50aec, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: 0fa2a0caf50f95ca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:48 server <- Reading packet 2 (33 bytes) for connection 8b79e13a, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: 8b79e13a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:48 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:48 Replacing connection for connection IDs [8b79e13a f75d2330] with a closed connection. 2025/04/30 17:41:48 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:48 server Connection 68ccf038c0d50aec closed. 2025/04/30 17:41:48 server <- Received Initial packet. 2025/04/30 17:41:48 Created qlog file: /logs/qlog/5579b3dd8a375957.sqlog 2025/04/30 17:41:48 server Changing connection ID to d790d256. 2025/04/30 17:41:48 Adding connection IDs 5579b3dd8a375957 and d790d256 for a new connection. 2025/04/30 17:41:48 server <- Reading packet 0 (1200 bytes) for connection 5579b3dd8a375957, Initial 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: 5579b3dd8a375957, SrcConnectionID: cae8decb637e6cd8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:48 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: cae8decb637e6cd8, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:41:48 Adding connection ID 8c04eb55. 2025/04/30 17:41:48 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5579b3dd8a375957 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: cae8decb637e6cd8, SrcConnectionID: d790d256, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 456, Version: v1} 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: cae8decb637e6cd8, SrcConnectionID: d790d256, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 17:41:48 server Short Header{DestConnectionID: cae8decb637e6cd8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c04eb55, StatelessResetToken: 0x7b0698f896f2d9c2cc1b4e31f7451616} 2025/04/30 17:41:48 server <- Reading packet 1 (1200 bytes) for connection 5579b3dd8a375957, Initial 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: 5579b3dd8a375957, SrcConnectionID: cae8decb637e6cd8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:41:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:41:48 server -> Sending packet 1 (45 bytes) for connection 5579b3dd8a375957, Initial 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: cae8decb637e6cd8, SrcConnectionID: d790d256, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:41:48 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:41:48 server -> Sending packet 2 (1280 bytes) for connection 5579b3dd8a375957, Initial 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: cae8decb637e6cd8, SrcConnectionID: d790d256, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:48 server -> Sending packet 3 (1280 bytes) for connection 5579b3dd8a375957, Initial 2025/04/30 17:41:48 server Long Header{Type: Initial, DestConnectionID: cae8decb637e6cd8, SrcConnectionID: d790d256, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:41:48 Removing connection ID 72f115143fa52a69 after it has been retired. 2025/04/30 17:41:48 Removing connection IDs [f9daa609 9299145b] for a closed connection after it has been retired. 2025/04/30 17:41:48 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:41:48 server -> Sending packet 1 (751 bytes) for connection 5579b3dd8a375957, Handshake 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: cae8decb637e6cd8, SrcConnectionID: d790d256, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 17:41:48 server -> Sending packet 2 (751 bytes) for connection 5579b3dd8a375957, Handshake 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: cae8decb637e6cd8, SrcConnectionID: d790d256, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 17:41:48 Removing connection ID 16883d37bb221435 after it has been retired. 2025/04/30 17:41:48 server <- Reading packet 0 (76 bytes) for connection d790d256, Handshake 2025/04/30 17:41:48 server Long Header{Type: Handshake, DestConnectionID: d790d256, SrcConnectionID: cae8decb637e6cd8, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:41:48 server Dropping Initial keys. 2025/04/30 17:41:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:41:48 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:41:48 Retiring connection ID 5579b3dd8a375957 in 5s. 2025/04/30 17:41:48 server Dropping Handshake keys. 2025/04/30 17:41:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:41:48 server -> Sending packet 2 (280 bytes) for connection 5579b3dd8a375957, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: cae8decb637e6cd8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.NewTokenFrame{Token: 0xd4bb862d6a0197a301bb9d6976e8637704f09f5d88297f285a4ebc28b95a36204b24fec4c7faa65c5dab96baf388eb4523c0122f6755b8a6daa331c971ce0645b6a05ae1fa45d3d09010f6b8542b7fea6d9d94685de4} 2025/04/30 17:41:48 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c04eb55, StatelessResetToken: 0x7b0698f896f2d9c2cc1b4e31f7451616} 2025/04/30 17:41:48 server -> Sending packet 3 (280 bytes) for connection 5579b3dd8a375957, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: cae8decb637e6cd8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c04eb55, StatelessResetToken: 0x7b0698f896f2d9c2cc1b4e31f7451616} 2025/04/30 17:41:48 server -> &wire.NewTokenFrame{Token: 0xd4bb862d6a0197a301bb9d6976e8637704f09f5d88297f285a4ebc28b95a36204b24fec4c7faa65c5dab96baf388eb4523c0122f6755b8a6daa331c971ce0645b6a05ae1fa45d3d09010f6b8542b7fea6d9d94685de4} 2025/04/30 17:41:48 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:41:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:41:48 server -> Sending packet 4 (1366 bytes) for connection 5579b3dd8a375957, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: cae8decb637e6cd8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.PingFrame{} 2025/04/30 17:41:48 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 17:41:48 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:48 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 17:41:48 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:41:48 server <- Reading packet 0 (43 bytes) for connection d790d256, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: d790d256, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:41:48 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:41:48 server -> Sending packet 5 (32 bytes) for connection 5579b3dd8a375957, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: cae8decb637e6cd8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 122.789µs} 2025/04/30 17:41:48 Received request: GET /lvysepkubr 2025/04/30 17:41:48 server -> Sending packet 6 (1053 bytes) for connection 5579b3dd8a375957, 1-RTT (ECN: ECT(0)) 2025/04/30 17:41:48 server Short Header{DestConnectionID: cae8decb637e6cd8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:48 server <- Reading packet 1 (30 bytes) for connection d790d256, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: d790d256, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 1ms} 2025/04/30 17:41:48 server newly acked packets (2): [3 6] 2025/04/30 17:41:48 server updated RTT: 32.915977ms (σ: 16.457988ms) 2025/04/30 17:41:48 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:41:48 server setting loss timer for packet 4 (1-RTT) to 37.030474ms (in 2025-04-30 17:41:48.988493354 +0000 UTC m=+25.988967410) 2025/04/30 17:41:48 server Canceling loss detection timer. 2025/04/30 17:41:48 server -> Sending packet 7 (30 bytes) for connection 5579b3dd8a375957, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:48 server Short Header{DestConnectionID: cae8decb637e6cd8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:48 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:48 server <- Reading packet 2 (33 bytes) for connection d790d256, 1-RTT 2025/04/30 17:41:48 server Short Header{DestConnectionID: d790d256, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:41:48 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:41:48 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:41:48 Replacing connection for connection IDs [d790d256 8c04eb55] with a closed connection. 2025/04/30 17:41:48 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:41:48 server Connection 5579b3dd8a375957 closed. 2025/04/30 17:41:48 Removing connection ID 792e08afbadf6e22 after it has been retired. 2025/04/30 17:41:49 Tracking 41 connection IDs and 0 reset tokens. 2025/04/30 17:41:49 Removing connection IDs [e4893745 7f76091a] for a closed connection after it has been retired. 2025/04/30 17:41:49 Removing connection IDs [ed6d2b84 bb77c542] for a closed connection after it has been retired. 2025/04/30 17:41:49 Removing connection ID cd85e08948d2d868 after it has been retired. 2025/04/30 17:41:49 Removing connection IDs [8d7a81ba 85d2a648] for a closed connection after it has been retired. 2025/04/30 17:41:49 Removing connection ID 84d96b6c86bbd0b2 after it has been retired. 2025/04/30 17:41:50 Removing connection IDs [37e732eb 644e1213] for a closed connection after it has been retired. 2025/04/30 17:41:50 Removing connection ID 67f739d0ec6c212e after it has been retired. 2025/04/30 17:41:50 Removing connection IDs [b4193c3a 5785e399] for a closed connection after it has been retired. 2025/04/30 17:41:50 Removing connection ID c91e0f7ab4cf5370 after it has been retired. 2025/04/30 17:41:50 Removing connection IDs [3ad0bd87 29a5ee98] for a closed connection after it has been retired. 2025/04/30 17:41:51 Tracking 25 connection IDs and 0 reset tokens. 2025/04/30 17:41:51 Removing connection ID debde581821ddb9f after it has been retired. 2025/04/30 17:41:51 Removing connection IDs [a7f24c4b e14b9840] for a closed connection after it has been retired. 2025/04/30 17:41:51 Removing connection ID ead11a90557ff6a8 after it has been retired. 2025/04/30 17:41:51 Removing connection IDs [5fb44a13 8ba4d77b] for a closed connection after it has been retired. 2025/04/30 17:41:51 Removing connection ID 68c7f20b504df15d after it has been retired. 2025/04/30 17:41:51 Removing connection IDs [9814e27d 3b245aa5] for a closed connection after it has been retired. 2025/04/30 17:41:52 Removing connection ID 897e9c3b3a573826 after it has been retired. 2025/04/30 17:41:53 Tracking 15 connection IDs and 0 reset tokens. 2025/04/30 17:41:53 Removing connection IDs [421c3f42 b122ad55] for a closed connection after it has been retired. 2025/04/30 17:41:53 Removing connection ID 1d6cfce9402cafe3 after it has been retired. 2025/04/30 17:41:53 Removing connection IDs [8752049f 4c7ed00a] for a closed connection after it has been retired. 2025/04/30 17:41:53 Removing connection ID 68ccf038c0d50aec after it has been retired. 2025/04/30 17:41:53 Removing connection IDs [8b79e13a f75d2330] for a closed connection after it has been retired. 2025/04/30 17:41:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 17:41:53 server -> Sending packet 32 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:53 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:53 server -> Sending packet 33 (1053 bytes) for connection 4f6e0806cd51be2a, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:53 server Short Header{DestConnectionID: 16449b307d5a2bc3, PacketNumber: 33, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:41:53 Removing connection ID 5579b3dd8a375957 after it has been retired. 2025/04/30 17:41:53 Removing connection IDs [d790d256 8c04eb55] for a closed connection after it has been retired. 2025/04/30 17:41:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 17:41:54 server -> Sending packet 26 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:54 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:54 server -> Sending packet 27 (30 bytes) for connection 85d24cfe81b3d482, 1-RTT (ECN: Not-ECT) 2025/04/30 17:41:54 server Short Header{DestConnectionID: 0639d186e68bc6f7, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:41:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 17:41:55 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 17:41:57 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 17:41:59 Tracking 4 connection IDs and 0 reset tokens.