2025/04/30 11:04:19 Increased receive buffer size to 14336 kiB 2025/04/30 11:04:19 Increased send buffer size to 14336 kiB 2025/04/30 11:04:19 Setting DF for IPv4 and IPv6. 2025/04/30 11:04:19 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:04:19 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:04:19 server Listening for udp connections on [::]:443 2025/04/30 11:04:19 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:04:19 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:04:19 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:04:20 server <- Received Initial packet. 2025/04/30 11:04:20 Created qlog file: /logs/qlog/5ccae4378a51134e.sqlog 2025/04/30 11:04:20 server Changing connection ID to e1b59b86. 2025/04/30 11:04:20 Adding connection IDs 5ccae4378a51134e and e1b59b86 for a new connection. 2025/04/30 11:04:20 server <- Reading packet 0 (1220 bytes) for connection 5ccae4378a51134e, Initial 2025/04/30 11:04:20 server Long Header{Type: Initial, DestConnectionID: 5ccae4378a51134e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:04:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 297, Offset + Data length: 297} 2025/04/30 11:04:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 10s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:20 Adding connection ID 1fbc7f3f. 2025/04/30 11:04:20 Adding connection ID b82aff0e. 2025/04/30 11:04:20 Adding connection ID de422381. 2025/04/30 11:04:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5ccae4378a51134e 2025/04/30 11:04:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1b59b86, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:04:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1b59b86, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:04:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:04:20 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: de422381, StatelessResetToken: 0x689dead378f415ce538eeef45cf1921d} 2025/04/30 11:04:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b82aff0e, StatelessResetToken: 0xa6fee4dae0979b0dc08fd43134e59294} 2025/04/30 11:04:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1fbc7f3f, StatelessResetToken: 0x97a79aae61409589018b4592be83206c} 2025/04/30 11:04:20 server <- Reading packet 1 (77 bytes) for connection e1b59b86, Handshake 2025/04/30 11:04:20 server Long Header{Type: Handshake, DestConnectionID: e1b59b86, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:04:20 server Dropping Initial keys. 2025/04/30 11:04:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:04:20 server newly acked packets (1): [0] 2025/04/30 11:04:20 server updated RTT: 32.511993ms (σ: 16.255996ms) 2025/04/30 11:04:20 server Canceling loss detection timer. 2025/04/30 11:04:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:20 Retiring connection ID 5ccae4378a51134e in 5s. 2025/04/30 11:04:20 server Dropping Handshake keys. 2025/04/30 11:04:20 server -> Sending packet 1 (251 bytes) for connection 5ccae4378a51134e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:20 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:20 server -> &wire.NewTokenFrame{Token: 0xd77e766725017cd00e9bd98bb83b78b9d5e88b63ff020dd0a54588e286ae3f2428e62c16dfdd17a494c6e21f03d809f31091431e190b999cc9360fac59806f135179b4236c184447824affb500dc7eca1263e15f8d77} 2025/04/30 11:04:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:20 server <- Reading packet 2 (1252 bytes) for connection e1b59b86, 1-RTT 2025/04/30 11:04:20 server Short Header{DestConnectionID: e1b59b86, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:04:20 server <- &wire.PingFrame{} 2025/04/30 11:04:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:20 server <- Reading packet 3 (34 bytes) for connection e1b59b86, 1-RTT 2025/04/30 11:04:20 server Short Header{DestConnectionID: e1b59b86, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:04:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:20 server newly acked packets (1): [0] 2025/04/30 11:04:20 server updated RTT: 32.634ms (σ: 12.438ms) 2025/04/30 11:04:20 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 11:04:20 server <- Reading packet 4 (46 bytes) for connection e1b59b86, 1-RTT 2025/04/30 11:04:20 server Short Header{DestConnectionID: e1b59b86, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:04:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:20 server -> Sending packet 2 (24 bytes) for connection 5ccae4378a51134e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:20 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 141.342µs} 2025/04/30 11:04:20 Received request: GET /fpvcrsbwms 2025/04/30 11:04:20 server -> Sending packet 3 (1045 bytes) for connection 5ccae4378a51134e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:20 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:20 server <- Reading packet 5 (1332 bytes) for connection e1b59b86, 1-RTT 2025/04/30 11:04:20 server Short Header{DestConnectionID: e1b59b86, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:04:20 server <- &wire.PingFrame{} 2025/04/30 11:04:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:20 server <- Reading packet 6 (38 bytes) for connection e1b59b86, 1-RTT 2025/04/30 11:04:20 server Short Header{DestConnectionID: e1b59b86, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:04:20 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:20 server newly acked packets (2): [1 3] 2025/04/30 11:04:20 server updated RTT: 32.484ms (σ: 9.627ms) 2025/04/30 11:04:20 server ECN capability confirmed. 2025/04/30 11:04:20 server Canceling loss detection timer. 2025/04/30 11:04:20 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:04:20 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:20 server -> Sending packet 4 (27 bytes) for connection 5ccae4378a51134e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:20 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:20 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 141.623µs} 2025/04/30 11:04:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:20 server <- Reading packet 7 (28 bytes) for connection e1b59b86, 1-RTT 2025/04/30 11:04:20 server Short Header{DestConnectionID: e1b59b86, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:04:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:20 Replacing connection for connection IDs [e1b59b86 1fbc7f3f b82aff0e de422381] with a closed connection. 2025/04/30 11:04:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:20 server Connection 5ccae4378a51134e closed. 2025/04/30 11:04:21 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:04:23 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:04:25 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:04:25 Removing connection ID 5ccae4378a51134e after it has been retired. 2025/04/30 11:04:25 Removing connection IDs [e1b59b86 1fbc7f3f b82aff0e de422381] for a closed connection after it has been retired. 2025/04/30 11:04:27 Tracking 0 connection IDs and 0 reset tokens.