2025/04/30 17:38:09 Increased receive buffer size to 14336 kiB 2025/04/30 17:38:09 Increased send buffer size to 14336 kiB 2025/04/30 17:38:09 Setting DF for IPv4 and IPv6. 2025/04/30 17:38:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 17:38:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 17:38:09 server Listening for udp connections on [::]:443 2025/04/30 17:38:10 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:38:10 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:38:10 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 17:38:11 Tracking 0 connection IDs and 0 reset tokens. 2025/04/30 17:38:12 server <- Received Initial packet. 2025/04/30 17:38:12 Created qlog file: /logs/qlog/4c79e241eb7f700e.sqlog 2025/04/30 17:38:12 server Changing connection ID to facf64ee. 2025/04/30 17:38:12 Adding connection IDs 4c79e241eb7f700e and facf64ee for a new connection. 2025/04/30 17:38:12 server <- Reading packet 0 (1200 bytes) for connection 4c79e241eb7f700e, Initial 2025/04/30 17:38:12 server Long Header{Type: Initial, DestConnectionID: 4c79e241eb7f700e, SrcConnectionID: 60622d50bacef627, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:38:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:38:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:38:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:38:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:38:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 60622d50bacef627, InitialMaxStreamDataBidiLocal: 250000, InitialMaxStreamDataBidiRemote: 250000, InitialMaxStreamDataUni: 250000, InitialMaxData: 2500000, MaxBidiStreamNum: 3, MaxUniStreamNum: 3, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 2} 2025/04/30 17:38:12 Adding connection ID d4a971aa. 2025/04/30 17:38:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4c79e241eb7f700e 2025/04/30 17:38:12 server Long Header{Type: Initial, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 465, Version: v1} 2025/04/30 17:38:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:38:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:38:12 server Long Header{Type: Handshake, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 17:38:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 17:38:12 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4a971aa, StatelessResetToken: 0x9a06f157e93544d0da2b2d2103f5f803} 2025/04/30 17:38:12 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 17:38:12 server -> Sending packet 1 (1280 bytes) for connection 4c79e241eb7f700e, Initial 2025/04/30 17:38:12 server Long Header{Type: Initial, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:38:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:38:12 server -> Sending packet 2 (1280 bytes) for connection 4c79e241eb7f700e, Initial 2025/04/30 17:38:12 server Long Header{Type: Initial, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:38:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:38:12 server Canceling loss detection timer. 2025/04/30 17:38:12 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 17:38:13 server <- Reading packet 1 (1200 bytes) for connection 4c79e241eb7f700e, Initial 2025/04/30 17:38:13 server Long Header{Type: Initial, DestConnectionID: 4c79e241eb7f700e, SrcConnectionID: 60622d50bacef627, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1174, Version: v1} 2025/04/30 17:38:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 257, Offset + Data length: 257} 2025/04/30 17:38:13 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 17:38:13 server -> Sending packet 1 (742 bytes) for connection 4c79e241eb7f700e, Handshake 2025/04/30 17:38:13 server Long Header{Type: Handshake, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, PacketNumber: 1, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 17:38:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 17:38:13 server -> Sending packet 2 (742 bytes) for connection 4c79e241eb7f700e, Handshake 2025/04/30 17:38:13 server Long Header{Type: Handshake, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 17:38:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 17:38:13 server -> Sending packet 3 (45 bytes) for connection 4c79e241eb7f700e, Initial 2025/04/30 17:38:13 server Long Header{Type: Initial, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 17:38:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:38:13 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 17:38:13 server -> Sending packet 4 (1280 bytes) for connection 4c79e241eb7f700e, Initial 2025/04/30 17:38:13 server Long Header{Type: Initial, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:38:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:38:13 server -> Sending packet 5 (1280 bytes) for connection 4c79e241eb7f700e, Initial 2025/04/30 17:38:13 server Long Header{Type: Initial, DestConnectionID: 60622d50bacef627, SrcConnectionID: facf64ee, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 17:38:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 17:38:13 server Canceling loss detection timer. 2025/04/30 17:38:13 server Amplification window limited. Received 2400 bytes, already sent out 7929 bytes 2025/04/30 17:38:13 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 17:38:13 server <- Reading packet 2 (1201 bytes) for connection facf64ee, Initial 2025/04/30 17:38:13 server Long Header{Type: Initial, DestConnectionID: facf64ee, SrcConnectionID: 60622d50bacef627, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1179, Version: v1} 2025/04/30 17:38:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 17:38:13 server <- Reading packet 0 (76 bytes) for connection facf64ee, Handshake 2025/04/30 17:38:13 server Long Header{Type: Handshake, DestConnectionID: facf64ee, SrcConnectionID: 60622d50bacef627, PacketNumber: 0, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 17:38:13 server Dropping Initial keys. 2025/04/30 17:38:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 17:38:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 17:38:13 Retiring connection ID 4c79e241eb7f700e in 5s. 2025/04/30 17:38:13 server Dropping Handshake keys. 2025/04/30 17:38:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:38:13 server -> Sending packet 2 (280 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:13 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:38:13 server -> &wire.NewTokenFrame{Token: 0x3a475aa0771a5f20b5e86b35bcfa7464acf223448b43274242e4f8fe614d69cc2fa12f9911f3b13a259028aa113c6daff4f9172755b40f9ac6ab7059626b2c7c0039f4643a25523b1a2c160fca19644e22e94aacc7a7} 2025/04/30 17:38:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:38:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4a971aa, StatelessResetToken: 0x9a06f157e93544d0da2b2d2103f5f803} 2025/04/30 17:38:13 server -> Sending packet 3 (280 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:13 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:13 server -> &wire.NewTokenFrame{Token: 0x3a475aa0771a5f20b5e86b35bcfa7464acf223448b43274242e4f8fe614d69cc2fa12f9911f3b13a259028aa113c6daff4f9172755b40f9ac6ab7059626b2c7c0039f4643a25523b1a2c160fca19644e22e94aacc7a7} 2025/04/30 17:38:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:38:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:38:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4a971aa, StatelessResetToken: 0x9a06f157e93544d0da2b2d2103f5f803} 2025/04/30 17:38:13 server -> Sending packet 4 (1366 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:13 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:13 server -> &wire.PingFrame{} 2025/04/30 17:38:13 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:38:13 server <- Reading packet 0 (49 bytes) for connection facf64ee, 1-RTT 2025/04/30 17:38:13 server Short Header{DestConnectionID: facf64ee, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:38:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 17:38:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8ms} 2025/04/30 17:38:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 17:38:13 server -> Sending packet 5 (32 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:13 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 111.909µs} 2025/04/30 17:38:13 Received request: GET /mmlshbecwp 2025/04/30 17:38:13 server -> Sending packet 6 (1053 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:13 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:38:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 17:38:14 server -> Sending packet 8 (280 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:14 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:38:14 server -> &wire.NewTokenFrame{Token: 0x3a475aa0771a5f20b5e86b35bcfa7464acf223448b43274242e4f8fe614d69cc2fa12f9911f3b13a259028aa113c6daff4f9172755b40f9ac6ab7059626b2c7c0039f4643a25523b1a2c160fca19644e22e94aacc7a7} 2025/04/30 17:38:14 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:38:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4a971aa, StatelessResetToken: 0x9a06f157e93544d0da2b2d2103f5f803} 2025/04/30 17:38:14 server Skipping packet number 7 2025/04/30 17:38:14 server -> Sending packet 9 (1053 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:14 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:38:14 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:38:14 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 17:38:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 17:38:15 server -> Sending packet 11 (280 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:15 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:15 server -> &wire.NewTokenFrame{Token: 0x3a475aa0771a5f20b5e86b35bcfa7464acf223448b43274242e4f8fe614d69cc2fa12f9911f3b13a259028aa113c6daff4f9172755b40f9ac6ab7059626b2c7c0039f4643a25523b1a2c160fca19644e22e94aacc7a7} 2025/04/30 17:38:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4a971aa, StatelessResetToken: 0x9a06f157e93544d0da2b2d2103f5f803} 2025/04/30 17:38:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:38:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:38:15 server Skipping packet number 10 2025/04/30 17:38:15 server -> Sending packet 12 (1053 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: ECT(0)) 2025/04/30 17:38:15 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:38:15 server <- Reading packet 1 (29 bytes) for connection facf64ee, 1-RTT 2025/04/30 17:38:15 server Short Header{DestConnectionID: facf64ee, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:38:15 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 17:38:15 server <- Reading packet 2 (28 bytes) for connection facf64ee, 1-RTT 2025/04/30 17:38:15 server Short Header{DestConnectionID: facf64ee, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:38:15 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 7ms} 2025/04/30 17:38:15 server newly acked packets (1): [4] 2025/04/30 17:38:15 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 17:38:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 17:38:15 server -> Sending packet 14 (280 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: Not-ECT) 2025/04/30 17:38:15 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 17:38:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 17:38:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4a971aa, StatelessResetToken: 0x9a06f157e93544d0da2b2d2103f5f803} 2025/04/30 17:38:15 server -> &wire.NewTokenFrame{Token: 0x3a475aa0771a5f20b5e86b35bcfa7464acf223448b43274242e4f8fe614d69cc2fa12f9911f3b13a259028aa113c6daff4f9172755b40f9ac6ab7059626b2c7c0039f4643a25523b1a2c160fca19644e22e94aacc7a7} 2025/04/30 17:38:15 server Skipping packet number 13 2025/04/30 17:38:15 server -> Sending packet 15 (1053 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: Not-ECT) 2025/04/30 17:38:15 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 17:38:15 server -> Sending packet 16 (1409 bytes) for connection 4c79e241eb7f700e, 1-RTT (ECN: Not-ECT) 2025/04/30 17:38:15 server Short Header{DestConnectionID: 60622d50bacef627, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 17:38:15 server -> &wire.PingFrame{} 2025/04/30 17:38:15 server <- Reading packet 3 (31 bytes) for connection facf64ee, 1-RTT 2025/04/30 17:38:15 server Short Header{DestConnectionID: facf64ee, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 17:38:15 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 17:38:15 server Closing connection with error: NO_ERROR (remote) 2025/04/30 17:38:15 Replacing connection for connection IDs [facf64ee d4a971aa] with a closed connection. 2025/04/30 17:38:15 Error accepting stream: NO_ERROR (remote) 2025/04/30 17:38:15 server Connection 4c79e241eb7f700e closed. 2025/04/30 17:38:15 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 17:38:17 Tracking 3 connection IDs and 0 reset tokens. 2025/04/30 17:38:18 Removing connection ID 4c79e241eb7f700e after it has been retired. 2025/04/30 17:38:19 Tracking 2 connection IDs and 0 reset tokens. 2025/04/30 17:38:20 Removing connection IDs [facf64ee d4a971aa] for a closed connection after it has been retired. 2025/04/30 17:38:21 Tracking 0 connection IDs and 0 reset tokens.