2025/04/30 11:11:05 Increased receive buffer size to 14336 kiB 2025/04/30 11:11:05 Increased send buffer size to 14336 kiB 2025/04/30 11:11:05 Setting DF for IPv4 and IPv6. 2025/04/30 11:11:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:11:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:11:05 server Listening for udp connections on [::]:443 2025/04/30 11:11:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:11:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:11:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:11:06 server <- Received Initial packet. 2025/04/30 11:11:06 Created qlog file: /logs/qlog/0e9e4d921d77f8f4.sqlog 2025/04/30 11:11:06 server Changing connection ID to 7a218b44. 2025/04/30 11:11:06 Adding connection IDs 0e9e4d921d77f8f4 and 7a218b44 for a new connection. 2025/04/30 11:11:06 server <- Reading packet 0 (1220 bytes) for connection 0e9e4d921d77f8f4, Initial 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: 0e9e4d921d77f8f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:06 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:06 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:06 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:06 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:06 Adding connection ID 1c48309e. 2025/04/30 11:11:06 Adding connection ID 3845cb28. 2025/04/30 11:11:06 Adding connection ID 46ccd840. 2025/04/30 11:11:06 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0e9e4d921d77f8f4 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a218b44, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 430, Version: v1} 2025/04/30 11:11:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a218b44, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:11:06 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c48309e, StatelessResetToken: 0xd7e730cd40d40f8ab01a396e2c42b5d0} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 46ccd840, StatelessResetToken: 0xc06236d0542c3476d69e070f6fef7319} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3845cb28, StatelessResetToken: 0x39be4779f10c2b9475f6a4e61cd48e86} 2025/04/30 11:11:06 server <- Reading packet 1 (1220 bytes) for connection 0e9e4d921d77f8f4, Initial 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: 0e9e4d921d77f8f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:06 server <- &wire.PingFrame{} 2025/04/30 11:11:06 server -> Sending packet 1 (37 bytes) for connection 0e9e4d921d77f8f4, Initial 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a218b44, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:06 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:06 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:06 server -> Sending packet 2 (1280 bytes) for connection 0e9e4d921d77f8f4, Initial 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a218b44, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:06 server -> Sending packet 3 (1280 bytes) for connection 0e9e4d921d77f8f4, Initial 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7a218b44, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:06 server <- Reading packet 2 (1220 bytes) for connection 7a218b44, Initial 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: 7a218b44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:06 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:06 server newly acked packets (1): [3] 2025/04/30 11:11:06 server updated RTT: 33.848611ms (σ: 16.924305ms) 2025/04/30 11:11:06 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:06 server -> Sending packet 1 (745 bytes) for connection 0e9e4d921d77f8f4, Handshake 2025/04/30 11:11:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a218b44, PacketNumber: 1, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:11:06 server -> Sending packet 2 (745 bytes) for connection 0e9e4d921d77f8f4, Handshake 2025/04/30 11:11:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a218b44, PacketNumber: 2, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:11:06 server <- Reading packet 3 (1220 bytes) for connection 7a218b44, Handshake 2025/04/30 11:11:06 server Long Header{Type: Handshake, DestConnectionID: 7a218b44, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:06 server Dropping Initial keys. 2025/04/30 11:11:06 server <- &wire.PingFrame{} 2025/04/30 11:11:06 server -> Sending packet 3 (36 bytes) for connection 0e9e4d921d77f8f4, Handshake 2025/04/30 11:11:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7a218b44, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:06 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:11:06 server <- Reading packet 4 (77 bytes) for connection 7a218b44, Handshake 2025/04/30 11:11:06 server Long Header{Type: Handshake, DestConnectionID: 7a218b44, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:06 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 16µs} 2025/04/30 11:11:06 server newly acked packets (1): [2] 2025/04/30 11:11:06 server updated RTT: 33.684ms (σ: 13.019ms) 2025/04/30 11:11:06 server Canceling loss detection timer. 2025/04/30 11:11:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:06 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:06 Retiring connection ID 0e9e4d921d77f8f4 in 5s. 2025/04/30 11:11:06 server Dropping Handshake keys. 2025/04/30 11:11:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:06 server -> Sending packet 2 (323 bytes) for connection 0e9e4d921d77f8f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:06 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c48309e, StatelessResetToken: 0xd7e730cd40d40f8ab01a396e2c42b5d0} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3845cb28, StatelessResetToken: 0x39be4779f10c2b9475f6a4e61cd48e86} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:06 server -> &wire.NewTokenFrame{Token: 0x658295829658410cb7a13eb4653c3d5047b9e744d532cfadfeeb1044113b4ab217f683bbcbfd3ab1aee28af3c0c0664a7667a1ccf6a992611b118a57d24e80f84bcebe84eeb25da683248ab1f179b4759d87ba8a055d} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 46ccd840, StatelessResetToken: 0xc06236d0542c3476d69e070f6fef7319} 2025/04/30 11:11:06 server -> Sending packet 3 (323 bytes) for connection 0e9e4d921d77f8f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:06 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:06 server -> &wire.NewTokenFrame{Token: 0x658295829658410cb7a13eb4653c3d5047b9e744d532cfadfeeb1044113b4ab217f683bbcbfd3ab1aee28af3c0c0664a7667a1ccf6a992611b118a57d24e80f84bcebe84eeb25da683248ab1f179b4759d87ba8a055d} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3845cb28, StatelessResetToken: 0x39be4779f10c2b9475f6a4e61cd48e86} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c48309e, StatelessResetToken: 0xd7e730cd40d40f8ab01a396e2c42b5d0} 2025/04/30 11:11:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 46ccd840, StatelessResetToken: 0xc06236d0542c3476d69e070f6fef7319} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:06 server <- Reading packet 5 (1252 bytes) for connection 7a218b44, 1-RTT 2025/04/30 11:11:06 server Short Header{DestConnectionID: 7a218b44, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:06 server <- &wire.PingFrame{} 2025/04/30 11:11:06 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:06 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:06 server -> Sending packet 4 (24 bytes) for connection 0e9e4d921d77f8f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:06 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:06 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 127.386µs} 2025/04/30 11:11:06 Received request: GET /rdsqhgaghs 2025/04/30 11:11:06 server -> Sending packet 5 (1045 bytes) for connection 0e9e4d921d77f8f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:06 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:06 server <- Reading packet 7 (1332 bytes) for connection 7a218b44, 1-RTT 2025/04/30 11:11:06 server Short Header{DestConnectionID: 7a218b44, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:06 server <- &wire.PingFrame{} 2025/04/30 11:11:06 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:06 server -> Sending packet 6 (26 bytes) for connection 0e9e4d921d77f8f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:06 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:06 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 81.611µs} 2025/04/30 11:11:06 server <- Reading packet 8 (36 bytes) for connection 7a218b44, 1-RTT 2025/04/30 11:11:06 server Short Header{DestConnectionID: 7a218b44, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:06 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 256µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:06 server newly acked packets (2): [3 5] 2025/04/30 11:11:06 server updated RTT: 33.432ms (σ: 10.267ms) 2025/04/30 11:11:06 server ECN capability confirmed. 2025/04/30 11:11:06 server Canceling loss detection timer. 2025/04/30 11:11:06 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:06 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:06 Replacing connection for connection IDs [7a218b44 1c48309e 3845cb28 46ccd840] with a closed connection. 2025/04/30 11:11:06 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:06 server Connection 0e9e4d921d77f8f4 closed. 2025/04/30 11:11:06 server <- Received Initial packet. 2025/04/30 11:11:06 Created qlog file: /logs/qlog/f852257c9ce49313.sqlog 2025/04/30 11:11:06 server Changing connection ID to c2bd9b4c. 2025/04/30 11:11:06 Adding connection IDs f852257c9ce49313 and c2bd9b4c for a new connection. 2025/04/30 11:11:06 server <- Reading packet 0 (1220 bytes) for connection f852257c9ce49313, Initial 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: f852257c9ce49313, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:06 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:06 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:06 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:06 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:06 Adding connection ID 60b7cafd. 2025/04/30 11:11:06 Adding connection ID 28114f41. 2025/04/30 11:11:06 Adding connection ID 94918e36. 2025/04/30 11:11:06 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f852257c9ce49313 2025/04/30 11:11:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c2bd9b4c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:11:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c2bd9b4c, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:11:06 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 28114f41, StatelessResetToken: 0xeaa9cc94d53074e0d5a15b6f538571c1} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60b7cafd, StatelessResetToken: 0x1a8865d2fdf6ec02d93dbf6d7d8b1d31} 2025/04/30 11:11:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 94918e36, StatelessResetToken: 0x04419f5554bcac5071de695d8ec0f8b8} 2025/04/30 11:11:06 server <- Reading packet 1 (77 bytes) for connection c2bd9b4c, Handshake 2025/04/30 11:11:06 server Long Header{Type: Handshake, DestConnectionID: c2bd9b4c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:06 server Dropping Initial keys. 2025/04/30 11:11:06 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:11:06 server newly acked packets (1): [0] 2025/04/30 11:11:06 server updated RTT: 32.591415ms (σ: 16.295707ms) 2025/04/30 11:11:06 server Canceling loss detection timer. 2025/04/30 11:11:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:06 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:06 Retiring connection ID f852257c9ce49313 in 5s. 2025/04/30 11:11:06 server Dropping Handshake keys. 2025/04/30 11:11:06 server -> Sending packet 1 (251 bytes) for connection f852257c9ce49313, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:06 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:06 server -> &wire.NewTokenFrame{Token: 0xb1a90f79318a79995fbb6dd546a0ad6beeeb2356c41ca967b4b9b0cd1cbdffb93fd9a2fe4aa0cc671f6fb6c1234ddca15e3d84cdfdaf83a56d7c2915dac759e97a2d89f26ae1bd8800a3d6bf171618e523c5a53780b9} 2025/04/30 11:11:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:07 server -> Sending packet 3 (91 bytes) for connection f852257c9ce49313, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:07 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 94918e36, StatelessResetToken: 0x04419f5554bcac5071de695d8ec0f8b8} 2025/04/30 11:11:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 28114f41, StatelessResetToken: 0xeaa9cc94d53074e0d5a15b6f538571c1} 2025/04/30 11:11:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60b7cafd, StatelessResetToken: 0x1a8865d2fdf6ec02d93dbf6d7d8b1d31} 2025/04/30 11:11:07 server Skipping packet number 2 2025/04/30 11:11:07 server -> Sending packet 4 (251 bytes) for connection f852257c9ce49313, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:07 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:07 server -> &wire.NewTokenFrame{Token: 0xb1a90f79318a79995fbb6dd546a0ad6beeeb2356c41ca967b4b9b0cd1cbdffb93fd9a2fe4aa0cc671f6fb6c1234ddca15e3d84cdfdaf83a56d7c2915dac759e97a2d89f26ae1bd8800a3d6bf171618e523c5a53780b9} 2025/04/30 11:11:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:07 server <- Reading packet 5 (35 bytes) for connection c2bd9b4c, 1-RTT 2025/04/30 11:11:07 server Short Header{DestConnectionID: c2bd9b4c, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:07 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:07 server newly acked packets (1): [3] 2025/04/30 11:11:07 server updated RTT: 32.38ms (σ: 12.642ms) 2025/04/30 11:11:07 server ECN capability confirmed. 2025/04/30 11:11:07 server <- Reading packet 6 (36 bytes) for connection c2bd9b4c, 1-RTT 2025/04/30 11:11:07 server Short Header{DestConnectionID: c2bd9b4c, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:07 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:07 server newly acked packets (1): [4] 2025/04/30 11:11:07 server updated RTT: 32.228ms (σ: 9.785ms) 2025/04/30 11:11:07 server Canceling loss detection timer. 2025/04/30 11:11:07 server -> Sending packet 5 (1366 bytes) for connection f852257c9ce49313, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:07 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:07 server -> &wire.PingFrame{} 2025/04/30 11:11:07 Tracking 10 connection IDs and 0 reset tokens. 2025/04/30 11:11:07 server <- Reading packet 9 (1220 bytes) for connection c2bd9b4c, 1-RTT 2025/04/30 11:11:07 server Short Header{DestConnectionID: c2bd9b4c, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:07 server <- &wire.PingFrame{} 2025/04/30 11:11:07 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:07 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:07 server -> Sending packet 6 (26 bytes) for connection f852257c9ce49313, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:07 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:07 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}}, DelayTime: 157.122µs} 2025/04/30 11:11:07 Received request: GET /cnsjcflvqt 2025/04/30 11:11:07 server -> Sending packet 7 (1045 bytes) for connection f852257c9ce49313, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:07 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:07 server <- Reading packet 11 (36 bytes) for connection c2bd9b4c, 1-RTT 2025/04/30 11:11:07 server Short Header{DestConnectionID: c2bd9b4c, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:07 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:11:07 server newly acked packets (2): [5 7] 2025/04/30 11:11:07 server updated RTT: 32.157ms (σ: 7.48ms) 2025/04/30 11:11:07 server Canceling loss detection timer. 2025/04/30 11:11:07 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:07 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:07 Replacing connection for connection IDs [c2bd9b4c 60b7cafd 28114f41 94918e36] with a closed connection. 2025/04/30 11:11:07 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:07 server Connection f852257c9ce49313 closed. 2025/04/30 11:11:08 server <- Received Initial packet. 2025/04/30 11:11:08 Created qlog file: /logs/qlog/c95c1a2b2e3a39e6.sqlog 2025/04/30 11:11:08 server Changing connection ID to 7065ef63. 2025/04/30 11:11:08 Adding connection IDs c95c1a2b2e3a39e6 and 7065ef63 for a new connection. 2025/04/30 11:11:08 server <- Reading packet 0 (1220 bytes) for connection c95c1a2b2e3a39e6, Initial 2025/04/30 11:11:08 server Long Header{Type: Initial, DestConnectionID: c95c1a2b2e3a39e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:08 Adding connection ID b73f64fb. 2025/04/30 11:11:08 Adding connection ID 3e914fda. 2025/04/30 11:11:08 Adding connection ID c2fcf9d3. 2025/04/30 11:11:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c95c1a2b2e3a39e6 2025/04/30 11:11:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7065ef63, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 442, Version: v1} 2025/04/30 11:11:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7065ef63, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:11:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:11:08 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b73f64fb, StatelessResetToken: 0xc6b38d2cb51bf8161c088f382ed75567} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3e914fda, StatelessResetToken: 0x7309036341ea56a49ddb10b83507ffc1} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c2fcf9d3, StatelessResetToken: 0xc4a98d2df9fefc7b2f45410efcb35060} 2025/04/30 11:11:08 server <- Reading packet 1 (77 bytes) for connection 7065ef63, Handshake 2025/04/30 11:11:08 server Long Header{Type: Handshake, DestConnectionID: 7065ef63, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:08 server Dropping Initial keys. 2025/04/30 11:11:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:08 server newly acked packets (1): [0] 2025/04/30 11:11:08 server updated RTT: 32.475076ms (σ: 16.237538ms) 2025/04/30 11:11:08 server Canceling loss detection timer. 2025/04/30 11:11:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:08 Retiring connection ID c95c1a2b2e3a39e6 in 5s. 2025/04/30 11:11:08 server Dropping Handshake keys. 2025/04/30 11:11:08 server -> Sending packet 1 (251 bytes) for connection c95c1a2b2e3a39e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:08 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:08 server -> &wire.NewTokenFrame{Token: 0xfe9fd550172499e6d917b8fb8ca034e471ddfcf4fec4bf1ec757a288facec610336d21366967d4e91327bd35b34b46c81fe40f13318bb2ab6846502aa7b97a3af14dff6052e35b952bc9a2c894c5762b6f0c3c249a38} 2025/04/30 11:11:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:08 server -> Sending packet 3 (91 bytes) for connection c95c1a2b2e3a39e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:08 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c2fcf9d3, StatelessResetToken: 0xc4a98d2df9fefc7b2f45410efcb35060} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b73f64fb, StatelessResetToken: 0xc6b38d2cb51bf8161c088f382ed75567} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3e914fda, StatelessResetToken: 0x7309036341ea56a49ddb10b83507ffc1} 2025/04/30 11:11:08 server Skipping packet number 2 2025/04/30 11:11:08 server -> Sending packet 4 (251 bytes) for connection c95c1a2b2e3a39e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:08 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:08 server -> &wire.NewTokenFrame{Token: 0xfe9fd550172499e6d917b8fb8ca034e471ddfcf4fec4bf1ec757a288facec610336d21366967d4e91327bd35b34b46c81fe40f13318bb2ab6846502aa7b97a3af14dff6052e35b952bc9a2c894c5762b6f0c3c249a38} 2025/04/30 11:11:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:08 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:08 server Dropping %!s(logging.PacketType=1) packet (72 bytes) because we already dropped the keys. 2025/04/30 11:11:08 server <- Reading packet 4 (1148 bytes) for connection 7065ef63, 1-RTT 2025/04/30 11:11:08 server Short Header{DestConnectionID: 7065ef63, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:08 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:08 server -> Sending packet 5 (24 bytes) for connection c95c1a2b2e3a39e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:08 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:08 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 117.078µs} 2025/04/30 11:11:08 Received request: GET /qpdcokftsb 2025/04/30 11:11:08 server -> Sending packet 6 (1045 bytes) for connection c95c1a2b2e3a39e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:08 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:08 server <- Reading packet 6 (40 bytes) for connection 7065ef63, 1-RTT 2025/04/30 11:11:08 server Short Header{DestConnectionID: 7065ef63, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:08 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:08 server newly acked packets (3): [3 4 6] 2025/04/30 11:11:08 server updated RTT: 32.356ms (σ: 12.414ms) 2025/04/30 11:11:08 server ECN capability confirmed. 2025/04/30 11:11:08 server Canceling loss detection timer. 2025/04/30 11:11:08 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:08 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:08 server <- Reading packet 7 (28 bytes) for connection 7065ef63, 1-RTT 2025/04/30 11:11:08 server Short Header{DestConnectionID: 7065ef63, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:08 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:08 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:08 Replacing connection for connection IDs [c2fcf9d3 7065ef63 b73f64fb 3e914fda] with a closed connection. 2025/04/30 11:11:08 server Connection c95c1a2b2e3a39e6 closed. 2025/04/30 11:11:08 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:08 server <- Received Initial packet. 2025/04/30 11:11:08 Created qlog file: /logs/qlog/669bfbd787c10b39.sqlog 2025/04/30 11:11:08 server Changing connection ID to a7f3372f. 2025/04/30 11:11:08 Adding connection IDs 669bfbd787c10b39 and a7f3372f for a new connection. 2025/04/30 11:11:08 server <- Reading packet 1 (1220 bytes) for connection 669bfbd787c10b39, Initial 2025/04/30 11:11:08 server Long Header{Type: Initial, DestConnectionID: 669bfbd787c10b39, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:08 Adding connection ID 9487a711. 2025/04/30 11:11:08 Adding connection ID b8048962. 2025/04/30 11:11:08 Adding connection ID f978b25d. 2025/04/30 11:11:08 server <- &wire.PingFrame{} 2025/04/30 11:11:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 669bfbd787c10b39 2025/04/30 11:11:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7f3372f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 438, Version: v1} 2025/04/30 11:11:08 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a7f3372f, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:11:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:11:08 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8048962, StatelessResetToken: 0x787b916628ab4a6cd36e8243cadcdb98} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f978b25d, StatelessResetToken: 0x99d4a44c2f3c9213d9b097bdc6953b31} 2025/04/30 11:11:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9487a711, StatelessResetToken: 0x6e63736686a5ac6282270623a0899746} 2025/04/30 11:11:09 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:09 server <- Reading packet 4 (72 bytes) for connection a7f3372f, Handshake 2025/04/30 11:11:09 server Long Header{Type: Handshake, DestConnectionID: a7f3372f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:09 server Dropping Initial keys. 2025/04/30 11:11:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:09 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:09 Retiring connection ID 669bfbd787c10b39 in 5s. 2025/04/30 11:11:09 server Dropping Handshake keys. 2025/04/30 11:11:09 server <- Reading packet 5 (1148 bytes) for connection a7f3372f, 1-RTT 2025/04/30 11:11:09 server Short Header{DestConnectionID: a7f3372f, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:09 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:09 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:09 server -> Sending packet 1 (1366 bytes) for connection 669bfbd787c10b39, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.PingFrame{} 2025/04/30 11:11:09 server -> Sending packet 2 (253 bytes) for connection 669bfbd787c10b39, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 377.651µs} 2025/04/30 11:11:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:09 server -> &wire.NewTokenFrame{Token: 0x009f37c5c32edde33011b7a200357e238b41b097ba47f3525289d383972c6bea2ef5e589e9e692b4e1ef76a0acdf9aa2e9086655af77ff4dc72b1c41a09d84e14fc133f8be9f56792b1c6226fca22df2d18d0a2bac3b} 2025/04/30 11:11:09 Received request: GET /tmxwzfeuyu 2025/04/30 11:11:09 server -> Sending packet 3 (1045 bytes) for connection 669bfbd787c10b39, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:09 server <- Reading packet 6 (35 bytes) for connection a7f3372f, 1-RTT 2025/04/30 11:11:09 server Short Header{DestConnectionID: a7f3372f, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:09 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:09 server newly acked packets (2): [0 2] 2025/04/30 11:11:09 server updated RTT: 32.054214ms (σ: 16.027107ms) 2025/04/30 11:11:09 server ECN capability confirmed. 2025/04/30 11:11:09 server setting loss timer for packet 1 (1-RTT) to 36.06099ms (in 2025-04-30 11:11:09.141857479 +0000 UTC m=+3.894070663) 2025/04/30 11:11:09 server Ignoring all packets below 6. 2025/04/30 11:11:09 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:11:09.141857479 +0000 UTC m=+3.894070663 2025/04/30 11:11:09 server lost packet 1 (time threshold) 2025/04/30 11:11:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:09 server -> Sending packet 5 (1045 bytes) for connection 669bfbd787c10b39, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:09 server -> Sending packet 6 (1045 bytes) for connection 669bfbd787c10b39, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:09 Tracking 20 connection IDs and 0 reset tokens. 2025/04/30 11:11:09 server <- Reading packet 7 (42 bytes) for connection a7f3372f, 1-RTT 2025/04/30 11:11:09 server Short Header{DestConnectionID: a7f3372f, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:09 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:09 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:09 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:09 server <- Reading packet 8 (28 bytes) for connection a7f3372f, 1-RTT 2025/04/30 11:11:09 server Short Header{DestConnectionID: a7f3372f, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:09 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:09 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:09 Replacing connection for connection IDs [a7f3372f 9487a711 b8048962 f978b25d] with a closed connection. 2025/04/30 11:11:09 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:09 server Connection 669bfbd787c10b39 closed. 2025/04/30 11:11:09 server <- Received Initial packet. 2025/04/30 11:11:09 Created qlog file: /logs/qlog/04cf55dbeffa4a14.sqlog 2025/04/30 11:11:09 server Changing connection ID to 24703ef2. 2025/04/30 11:11:09 Adding connection IDs 04cf55dbeffa4a14 and 24703ef2 for a new connection. 2025/04/30 11:11:09 server <- Reading packet 0 (1220 bytes) for connection 04cf55dbeffa4a14, Initial 2025/04/30 11:11:09 server Long Header{Type: Initial, DestConnectionID: 04cf55dbeffa4a14, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:09 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:09 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:09 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:09 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:09 Adding connection ID 1a163569. 2025/04/30 11:11:09 Adding connection ID c91e9c9a. 2025/04/30 11:11:09 Adding connection ID 6f87fc78. 2025/04/30 11:11:09 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 04cf55dbeffa4a14 2025/04/30 11:11:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 24703ef2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 428, Version: v1} 2025/04/30 11:11:09 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24703ef2, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 11:11:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c91e9c9a, StatelessResetToken: 0x466c3d56313ad98e840ecb4404646fb7} 2025/04/30 11:11:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f87fc78, StatelessResetToken: 0x71c21c8df3fc44d238fbff1fd3655d7a} 2025/04/30 11:11:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1a163569, StatelessResetToken: 0x3dce2ddd6f32f55410d27a39ffa2ca5f} 2025/04/30 11:11:09 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:11:09 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:09 server <- Reading packet 3 (72 bytes) for connection 24703ef2, Handshake 2025/04/30 11:11:09 server Long Header{Type: Handshake, DestConnectionID: 24703ef2, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:09 server Dropping Initial keys. 2025/04/30 11:11:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:09 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:09 Retiring connection ID 04cf55dbeffa4a14 in 5s. 2025/04/30 11:11:09 server Dropping Handshake keys. 2025/04/30 11:11:09 server <- Reading packet 4 (1148 bytes) for connection 24703ef2, 1-RTT 2025/04/30 11:11:09 server Short Header{DestConnectionID: 24703ef2, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:09 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:09 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:09 server -> Sending packet 1 (1366 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.PingFrame{} 2025/04/30 11:11:09 server <- Reading packet 2 (1252 bytes) for connection 24703ef2, 1-RTT 2025/04/30 11:11:09 server Short Header{DestConnectionID: 24703ef2, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:09 server <- &wire.PingFrame{} 2025/04/30 11:11:09 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:09 server newly acked packets (1): [0] 2025/04/30 11:11:09 server updated RTT: 33.644049ms (σ: 16.822024ms) 2025/04/30 11:11:09 server Canceling loss detection timer. 2025/04/30 11:11:09 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:09 Received request: GET /gaxpctoaqj 2025/04/30 11:11:09 server -> Sending packet 2 (255 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 510.28µs} 2025/04/30 11:11:09 server -> &wire.NewTokenFrame{Token: 0x358d924156300291cf259a8c6d9543e1ea0de4a6b99279c4218d546b0958356d733e61ccefb3ad56188bee87074f81525ac4e17c5fa2d540063a59488e3cd816e3cbe94a21e5f918fc7bf7cd91995cd568f9f813915a} 2025/04/30 11:11:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:09 server -> Sending packet 3 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:09 server <- Reading packet 6 (1332 bytes) for connection 24703ef2, 1-RTT 2025/04/30 11:11:09 server Short Header{DestConnectionID: 24703ef2, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:09 server <- &wire.PingFrame{} 2025/04/30 11:11:09 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:09 server -> Sending packet 4 (28 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 115.254µs} 2025/04/30 11:11:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:09 server -> Sending packet 6 (248 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:09 server -> &wire.NewTokenFrame{Token: 0x358d924156300291cf259a8c6d9543e1ea0de4a6b99279c4218d546b0958356d733e61ccefb3ad56188bee87074f81525ac4e17c5fa2d540063a59488e3cd816e3cbe94a21e5f918fc7bf7cd91995cd568f9f813915a} 2025/04/30 11:11:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:09 server Skipping packet number 5 2025/04/30 11:11:09 server -> Sending packet 7 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:09 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:09 server <- Reading packet 7 (35 bytes) for connection 24703ef2, 1-RTT 2025/04/30 11:11:09 server Short Header{DestConnectionID: 24703ef2, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:09 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:09 server newly acked packets (2): [1 6] 2025/04/30 11:11:09 server updated RTT: 33.344ms (σ: 13.215ms) 2025/04/30 11:11:09 server ECN capability confirmed. 2025/04/30 11:11:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:10 server -> Sending packet 9 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:10 server -> Sending packet 10 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:10 server -> Sending packet 11 (1409 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.PingFrame{} 2025/04/30 11:11:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:10 server -> Sending packet 13 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:10 server -> Sending packet 14 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:10 server <- Received Initial packet. 2025/04/30 11:11:10 Created qlog file: /logs/qlog/4cb69d95806f0a44.sqlog 2025/04/30 11:11:10 server Changing connection ID to 475d5ed6. 2025/04/30 11:11:10 Adding connection IDs 4cb69d95806f0a44 and 475d5ed6 for a new connection. 2025/04/30 11:11:10 server <- Reading packet 1 (1220 bytes) for connection 4cb69d95806f0a44, Initial 2025/04/30 11:11:10 server Long Header{Type: Initial, DestConnectionID: 4cb69d95806f0a44, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:10 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:10 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:10 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:10 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:10 Adding connection ID 04a087fa. 2025/04/30 11:11:10 Adding connection ID 788186ff. 2025/04/30 11:11:10 Adding connection ID dad2255a. 2025/04/30 11:11:10 server <- &wire.PingFrame{} 2025/04/30 11:11:10 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4cb69d95806f0a44 2025/04/30 11:11:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 475d5ed6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 438, Version: v1} 2025/04/30 11:11:10 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 475d5ed6, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:11:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dad2255a, StatelessResetToken: 0xee2e3190fe6b9e5fcdc70344a8adf805} 2025/04/30 11:11:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 04a087fa, StatelessResetToken: 0xaa5dd20cbce47d63a525047516ae8e3d} 2025/04/30 11:11:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 788186ff, StatelessResetToken: 0xda552784ad6f613d866c305ad075700a} 2025/04/30 11:11:10 server <- Reading packet 2 (77 bytes) for connection 475d5ed6, Handshake 2025/04/30 11:11:10 server Long Header{Type: Handshake, DestConnectionID: 475d5ed6, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:10 server Dropping Initial keys. 2025/04/30 11:11:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:10 server newly acked packets (1): [0] 2025/04/30 11:11:10 server updated RTT: 32.542237ms (σ: 16.271118ms) 2025/04/30 11:11:10 server Canceling loss detection timer. 2025/04/30 11:11:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:10 Retiring connection ID 4cb69d95806f0a44 in 5s. 2025/04/30 11:11:10 server Dropping Handshake keys. 2025/04/30 11:11:10 server -> Sending packet 1 (251 bytes) for connection 4cb69d95806f0a44, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.NewTokenFrame{Token: 0xc878970e737a51f4752a76ff1bb370422ef1c6cc859ec03c383391c3e73427b67dfbf259bfdf7434f041cfc769dd4d387e7c8178bae53d2fc9d6adae097fce0652aaa60325c655d039e3cc7aa300fa845d78a34733e1} 2025/04/30 11:11:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:10 server <- Reading packet 3 (1252 bytes) for connection 475d5ed6, 1-RTT 2025/04/30 11:11:10 server Short Header{DestConnectionID: 475d5ed6, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:10 server <- &wire.PingFrame{} 2025/04/30 11:11:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:10 server newly acked packets (1): [0] 2025/04/30 11:11:10 server updated RTT: 32.666ms (σ: 12.452ms) 2025/04/30 11:11:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:10 server -> Sending packet 2 (24 bytes) for connection 4cb69d95806f0a44, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 100.558µs} 2025/04/30 11:11:10 Received request: GET /eqmybwntao 2025/04/30 11:11:10 server -> Sending packet 3 (1045 bytes) for connection 4cb69d95806f0a44, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:10 server <- Reading packet 4 (1332 bytes) for connection 475d5ed6, 1-RTT 2025/04/30 11:11:10 server Short Header{DestConnectionID: 475d5ed6, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:10 server <- &wire.PingFrame{} 2025/04/30 11:11:10 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:10 server <- Reading packet 5 (38 bytes) for connection 475d5ed6, 1-RTT 2025/04/30 11:11:10 server Short Header{DestConnectionID: 475d5ed6, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:10 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:10 server newly acked packets (2): [1 3] 2025/04/30 11:11:10 server updated RTT: 32.536ms (σ: 9.597ms) 2025/04/30 11:11:10 server ECN capability confirmed. 2025/04/30 11:11:10 server Canceling loss detection timer. 2025/04/30 11:11:10 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:10 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:11:10 server <- Reading packet 6 (28 bytes) for connection 475d5ed6, 1-RTT 2025/04/30 11:11:10 server Short Header{DestConnectionID: 475d5ed6, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:10 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:10 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:10 Replacing connection for connection IDs [788186ff dad2255a 475d5ed6 04a087fa] with a closed connection. 2025/04/30 11:11:10 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:10 server Connection 4cb69d95806f0a44 closed. 2025/04/30 11:11:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:10 server -> Sending packet 16 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:10 server -> Sending packet 17 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:10 server <- Received Initial packet. 2025/04/30 11:11:10 Created qlog file: /logs/qlog/a753baa210f00fa6.sqlog 2025/04/30 11:11:10 server Changing connection ID to f7f0de61. 2025/04/30 11:11:10 Adding connection IDs a753baa210f00fa6 and f7f0de61 for a new connection. 2025/04/30 11:11:10 server <- Reading packet 0 (1220 bytes) for connection a753baa210f00fa6, Initial 2025/04/30 11:11:10 server Long Header{Type: Initial, DestConnectionID: a753baa210f00fa6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:10 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:10 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:10 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:10 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:10 Adding connection ID b7c7bc3f. 2025/04/30 11:11:10 Adding connection ID d6328169. 2025/04/30 11:11:10 Adding connection ID 5379bae5. 2025/04/30 11:11:10 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a753baa210f00fa6 2025/04/30 11:11:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f7f0de61, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 441, Version: v1} 2025/04/30 11:11:10 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f7f0de61, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:11:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b7c7bc3f, StatelessResetToken: 0x6cdabe4301ad5cdafd7a42d75948796f} 2025/04/30 11:11:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d6328169, StatelessResetToken: 0x373a2c736e24b8b995371e421ec21733} 2025/04/30 11:11:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5379bae5, StatelessResetToken: 0x638cbcb2b9d2c55651c72f55a4027fa5} 2025/04/30 11:11:10 server <- Reading packet 1 (77 bytes) for connection f7f0de61, Handshake 2025/04/30 11:11:10 server Long Header{Type: Handshake, DestConnectionID: f7f0de61, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:10 server Dropping Initial keys. 2025/04/30 11:11:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:10 server newly acked packets (1): [0] 2025/04/30 11:11:10 server updated RTT: 32.610093ms (σ: 16.305046ms) 2025/04/30 11:11:10 server Canceling loss detection timer. 2025/04/30 11:11:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:10 Retiring connection ID a753baa210f00fa6 in 5s. 2025/04/30 11:11:10 server Dropping Handshake keys. 2025/04/30 11:11:10 server -> Sending packet 1 (251 bytes) for connection a753baa210f00fa6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:10 server -> &wire.NewTokenFrame{Token: 0x1aa676320de767c17afbe1875200238656b029acbc8af7fd26b6b33923199dcac0045d3c556429398de623ada6becea1a064c7db35e658148831dc525bf638a04ff22ceed095703075bc76b764326d7dc8a5e9c6dcc6} 2025/04/30 11:11:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:10 server <- Reading packet 2 (1252 bytes) for connection f7f0de61, 1-RTT 2025/04/30 11:11:10 server Short Header{DestConnectionID: f7f0de61, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:10 server <- &wire.PingFrame{} 2025/04/30 11:11:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:10 server newly acked packets (1): [0] 2025/04/30 11:11:10 server updated RTT: 32.719ms (σ: 12.447ms) 2025/04/30 11:11:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:10 server -> Sending packet 2 (24 bytes) for connection a753baa210f00fa6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 153.867µs} 2025/04/30 11:11:10 Received request: GET /ivvylhmifn 2025/04/30 11:11:10 server -> Sending packet 3 (1045 bytes) for connection a753baa210f00fa6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:10 server <- Reading packet 3 (40 bytes) for connection f7f0de61, 1-RTT 2025/04/30 11:11:10 server Short Header{DestConnectionID: f7f0de61, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:10 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:10 server newly acked packets (1): [3] 2025/04/30 11:11:10 server updated RTT: 32.589ms (σ: 9.594ms) 2025/04/30 11:11:10 server ECN capability confirmed. 2025/04/30 11:11:10 server setting loss timer for packet 1 (1-RTT) to 36.662625ms (in 2025-04-30 11:11:10.923616729 +0000 UTC m=+5.675829924) 2025/04/30 11:11:10 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:10 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:10 server -> Sending packet 4 (27 bytes) for connection a753baa210f00fa6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 202.988µs} 2025/04/30 11:11:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:10 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:11:10.923616729 +0000 UTC m=+5.675829924 2025/04/30 11:11:10 server lost packet 1 (time threshold) 2025/04/30 11:11:10 server -> Sending packet 5 (251 bytes) for connection a753baa210f00fa6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:10 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:10 server -> &wire.NewTokenFrame{Token: 0x1aa676320de767c17afbe1875200238656b029acbc8af7fd26b6b33923199dcac0045d3c556429398de623ada6becea1a064c7db35e658148831dc525bf638a04ff22ceed095703075bc76b764326d7dc8a5e9c6dcc6} 2025/04/30 11:11:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:10 server <- Reading packet 5 (36 bytes) for connection f7f0de61, 1-RTT 2025/04/30 11:11:10 server Short Header{DestConnectionID: f7f0de61, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:10 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:10 server newly acked packets (1): [4] 2025/04/30 11:11:10 server updated RTT: 32.481ms (σ: 7.41ms) 2025/04/30 11:11:10 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:10 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:10 Replacing connection for connection IDs [f7f0de61 b7c7bc3f d6328169 5379bae5] with a closed connection. 2025/04/30 11:11:10 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:10 server Connection a753baa210f00fa6 closed. 2025/04/30 11:11:11 Tracking 35 connection IDs and 0 reset tokens. 2025/04/30 11:11:11 server <- Received Initial packet. 2025/04/30 11:11:11 Created qlog file: /logs/qlog/e54cb2153a67cbdc.sqlog 2025/04/30 11:11:11 server Changing connection ID to 71e76029. 2025/04/30 11:11:11 Adding connection IDs e54cb2153a67cbdc and 71e76029 for a new connection. 2025/04/30 11:11:11 server <- Reading packet 1 (1220 bytes) for connection e54cb2153a67cbdc, Initial 2025/04/30 11:11:11 server Long Header{Type: Initial, DestConnectionID: e54cb2153a67cbdc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:11 Adding connection ID 5cb91e38. 2025/04/30 11:11:11 Adding connection ID 25d84cb2. 2025/04/30 11:11:11 Adding connection ID fc954371. 2025/04/30 11:11:11 server <- &wire.PingFrame{} 2025/04/30 11:11:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e54cb2153a67cbdc 2025/04/30 11:11:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 71e76029, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 428, Version: v1} 2025/04/30 11:11:11 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 71e76029, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 11:11:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 11:11:11 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fc954371, StatelessResetToken: 0xc1165b4c1ba90089a1a43785a24c9302} 2025/04/30 11:11:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5cb91e38, StatelessResetToken: 0x7e2ced49b0b28ff237e2228691dccf02} 2025/04/30 11:11:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25d84cb2, StatelessResetToken: 0xe76315f8eab2153538ef65ed5014a655} 2025/04/30 11:11:11 server <- Reading packet 2 (77 bytes) for connection 71e76029, Handshake 2025/04/30 11:11:11 server Long Header{Type: Handshake, DestConnectionID: 71e76029, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:11 server Dropping Initial keys. 2025/04/30 11:11:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:11:11 server newly acked packets (1): [0] 2025/04/30 11:11:11 server updated RTT: 32.56134ms (σ: 16.28067ms) 2025/04/30 11:11:11 server Canceling loss detection timer. 2025/04/30 11:11:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:11 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:11 Retiring connection ID e54cb2153a67cbdc in 5s. 2025/04/30 11:11:11 server Dropping Handshake keys. 2025/04/30 11:11:11 server -> Sending packet 1 (251 bytes) for connection e54cb2153a67cbdc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:11 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:11 server -> &wire.NewTokenFrame{Token: 0x2b4a53ce0fbfc74d9ca773593bb95931373429281bbd00a7275ad079994546906bd72f5243d11e8c653fe6fe62f680115a5c7e1c34946310898c31ae3bab751022e2b8f181b25747b63d9435801d39e980a46348c060} 2025/04/30 11:11:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:11 server <- Reading packet 3 (1252 bytes) for connection 71e76029, 1-RTT 2025/04/30 11:11:11 server Short Header{DestConnectionID: 71e76029, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:11 server <- &wire.PingFrame{} 2025/04/30 11:11:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:11 server newly acked packets (1): [0] 2025/04/30 11:11:11 server updated RTT: 32.687ms (σ: 12.462ms) 2025/04/30 11:11:11 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:11 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:11 server -> Sending packet 2 (24 bytes) for connection e54cb2153a67cbdc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:11 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:11 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 101.68µs} 2025/04/30 11:11:11 Received request: GET /uctqvqfdgn 2025/04/30 11:11:11 server -> Sending packet 3 (1045 bytes) for connection e54cb2153a67cbdc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:11 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:11 server <- Reading packet 4 (1332 bytes) for connection 71e76029, 1-RTT 2025/04/30 11:11:11 server Short Header{DestConnectionID: 71e76029, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:11 server <- &wire.PingFrame{} 2025/04/30 11:11:11 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:11 server <- Reading packet 5 (36 bytes) for connection 71e76029, 1-RTT 2025/04/30 11:11:11 server Short Header{DestConnectionID: 71e76029, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:11 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:11 server newly acked packets (1): [3] 2025/04/30 11:11:11 server updated RTT: 32.55ms (σ: 9.619ms) 2025/04/30 11:11:11 server ECN capability confirmed. 2025/04/30 11:11:11 server setting loss timer for packet 1 (1-RTT) to 36.61875ms (in 2025-04-30 11:11:11.524361618 +0000 UTC m=+6.276574812) 2025/04/30 11:11:11 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:11 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:11 Replacing connection for connection IDs [71e76029 5cb91e38 25d84cb2 fc954371] with a closed connection. 2025/04/30 11:11:11 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:11 server Connection e54cb2153a67cbdc closed. 2025/04/30 11:11:11 Removing connection ID 0e9e4d921d77f8f4 after it has been retired. 2025/04/30 11:11:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:11 server -> Sending packet 19 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:11 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:11 server -> Sending packet 20 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:11 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:11 Removing connection IDs [7a218b44 1c48309e 3845cb28 46ccd840] for a closed connection after it has been retired. 2025/04/30 11:11:11 server <- Received Initial packet. 2025/04/30 11:11:11 Created qlog file: /logs/qlog/5e356fadce030edd.sqlog 2025/04/30 11:11:11 server Changing connection ID to 4ce696b3. 2025/04/30 11:11:11 Adding connection IDs 5e356fadce030edd and 4ce696b3 for a new connection. 2025/04/30 11:11:11 server <- Reading packet 0 (1220 bytes) for connection 5e356fadce030edd, Initial 2025/04/30 11:11:11 server Long Header{Type: Initial, DestConnectionID: 5e356fadce030edd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:11 Adding connection ID ec8a2fa5. 2025/04/30 11:11:11 Adding connection ID 6eb3912a. 2025/04/30 11:11:11 Adding connection ID b76a5fba. 2025/04/30 11:11:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5e356fadce030edd 2025/04/30 11:11:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4ce696b3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:11:11 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4ce696b3, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:11:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:11:11 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6eb3912a, StatelessResetToken: 0x4fe022ff2ad6f410cc844fb88a39e50d} 2025/04/30 11:11:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec8a2fa5, StatelessResetToken: 0xbe09ff0e5f4e3a73b27f656a5b1ef26f} 2025/04/30 11:11:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b76a5fba, StatelessResetToken: 0xccf35a07f39c2fad0c91069506f994b3} 2025/04/30 11:11:11 server <- Reading packet 1 (77 bytes) for connection 4ce696b3, Handshake 2025/04/30 11:11:11 server Long Header{Type: Handshake, DestConnectionID: 4ce696b3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:11 server Dropping Initial keys. 2025/04/30 11:11:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:11 server newly acked packets (1): [0] 2025/04/30 11:11:11 server updated RTT: 32.443112ms (σ: 16.221556ms) 2025/04/30 11:11:11 server Canceling loss detection timer. 2025/04/30 11:11:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:11 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:11 Retiring connection ID 5e356fadce030edd in 5s. 2025/04/30 11:11:11 server Dropping Handshake keys. 2025/04/30 11:11:11 server -> Sending packet 1 (251 bytes) for connection 5e356fadce030edd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:11 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:11 server -> &wire.NewTokenFrame{Token: 0x3f570768c0d93eb95f9232c08b63729b6f680a042d7dee54490ea18e3b973c2b6b95a6339556ae684cf520d7f277eeeb8712b5ffdd8fc6f3aa3314edc469050b7e5ae3d9631c2eea57e66cbaf6939c9d2b83127a80f0} 2025/04/30 11:11:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:11 Removing connection ID f852257c9ce49313 after it has been retired. 2025/04/30 11:11:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:12 server -> Sending packet 3 (91 bytes) for connection 5e356fadce030edd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:12 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6eb3912a, StatelessResetToken: 0x4fe022ff2ad6f410cc844fb88a39e50d} 2025/04/30 11:11:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b76a5fba, StatelessResetToken: 0xccf35a07f39c2fad0c91069506f994b3} 2025/04/30 11:11:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec8a2fa5, StatelessResetToken: 0xbe09ff0e5f4e3a73b27f656a5b1ef26f} 2025/04/30 11:11:12 server Skipping packet number 2 2025/04/30 11:11:12 server -> Sending packet 4 (251 bytes) for connection 5e356fadce030edd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:12 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:12 server -> &wire.NewTokenFrame{Token: 0x3f570768c0d93eb95f9232c08b63729b6f680a042d7dee54490ea18e3b973c2b6b95a6339556ae684cf520d7f277eeeb8712b5ffdd8fc6f3aa3314edc469050b7e5ae3d9631c2eea57e66cbaf6939c9d2b83127a80f0} 2025/04/30 11:11:12 server <- Reading packet 4 (1220 bytes) for connection 4ce696b3, 1-RTT 2025/04/30 11:11:12 server Short Header{DestConnectionID: 4ce696b3, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:12 server <- &wire.PingFrame{} 2025/04/30 11:11:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:12 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:12 server -> Sending packet 5 (24 bytes) for connection 5e356fadce030edd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:12 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:12 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 116.657µs} 2025/04/30 11:11:12 Received request: GET /oivlogzldl 2025/04/30 11:11:12 server -> Sending packet 6 (1045 bytes) for connection 5e356fadce030edd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:12 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:12 server <- Reading packet 5 (35 bytes) for connection 4ce696b3, 1-RTT 2025/04/30 11:11:12 server Short Header{DestConnectionID: 4ce696b3, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:12 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:12 server newly acked packets (1): [3] 2025/04/30 11:11:12 server updated RTT: 32.243ms (σ: 12.565ms) 2025/04/30 11:11:12 server ECN capability confirmed. 2025/04/30 11:11:12 server <- Reading packet 7 (28 bytes) for connection 4ce696b3, 1-RTT 2025/04/30 11:11:12 server Short Header{DestConnectionID: 4ce696b3, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:12 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:12 Replacing connection for connection IDs [b76a5fba 4ce696b3 ec8a2fa5 6eb3912a] with a closed connection. 2025/04/30 11:11:12 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:12 server Connection 5e356fadce030edd closed. 2025/04/30 11:11:12 server <- Received Initial packet. 2025/04/30 11:11:12 Created qlog file: /logs/qlog/a600be663efc8557.sqlog 2025/04/30 11:11:12 server Changing connection ID to 542c4700. 2025/04/30 11:11:12 Adding connection IDs a600be663efc8557 and 542c4700 for a new connection. 2025/04/30 11:11:12 server <- Reading packet 1 (1220 bytes) for connection a600be663efc8557, Initial 2025/04/30 11:11:12 server Long Header{Type: Initial, DestConnectionID: a600be663efc8557, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:12 Adding connection ID 12b3f55c. 2025/04/30 11:11:12 Adding connection ID fe6129d9. 2025/04/30 11:11:12 Adding connection ID 1cdaed02. 2025/04/30 11:11:12 server <- &wire.PingFrame{} 2025/04/30 11:11:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a600be663efc8557 2025/04/30 11:11:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 542c4700, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:11:12 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 542c4700, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:12 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:12 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:12 server -> Sending packet 1 (1280 bytes) for connection a600be663efc8557, Initial 2025/04/30 11:11:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 542c4700, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:12 server -> Sending packet 2 (1280 bytes) for connection a600be663efc8557, Initial 2025/04/30 11:11:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 542c4700, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:12 server Canceling loss detection timer. 2025/04/30 11:11:12 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:12 server <- Reading packet 3 (1220 bytes) for connection 542c4700, Initial 2025/04/30 11:11:12 server Long Header{Type: Initial, DestConnectionID: 542c4700, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:12 server <- &wire.PingFrame{} 2025/04/30 11:11:12 server -> Sending packet 3 (39 bytes) for connection a600be663efc8557, Initial 2025/04/30 11:11:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 542c4700, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:11:12 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:11:12 Removing connection IDs [c2bd9b4c 60b7cafd 28114f41 94918e36] for a closed connection after it has been retired. 2025/04/30 11:11:12 server <- Reading packet 4 (1220 bytes) for connection 542c4700, Handshake 2025/04/30 11:11:12 server Long Header{Type: Handshake, DestConnectionID: 542c4700, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:12 server Dropping Initial keys. 2025/04/30 11:11:12 server <- &wire.PingFrame{} 2025/04/30 11:11:12 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:12 server -> Sending packet 1 (749 bytes) for connection a600be663efc8557, Handshake 2025/04/30 11:11:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 542c4700, PacketNumber: 1, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 11:11:12 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:11:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:12 server -> Sending packet 2 (744 bytes) for connection a600be663efc8557, Handshake 2025/04/30 11:11:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 542c4700, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:13 server <- Reading packet 5 (1220 bytes) for connection 542c4700, Handshake 2025/04/30 11:11:13 server Long Header{Type: Handshake, DestConnectionID: 542c4700, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:13 server <- &wire.PingFrame{} 2025/04/30 11:11:13 server -> Sending packet 3 (36 bytes) for connection a600be663efc8557, Handshake 2025/04/30 11:11:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 542c4700, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:13 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:11:13 Tracking 40 connection IDs and 0 reset tokens. 2025/04/30 11:11:13 Removing connection ID c95c1a2b2e3a39e6 after it has been retired. 2025/04/30 11:11:13 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:11:13 server -> Sending packet 4 (744 bytes) for connection a600be663efc8557, Handshake 2025/04/30 11:11:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 542c4700, PacketNumber: 4, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:13 server -> Sending packet 5 (744 bytes) for connection a600be663efc8557, Handshake 2025/04/30 11:11:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 542c4700, PacketNumber: 5, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:13 server -> Sending packet 22 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:13 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:13 server -> Sending packet 23 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:13 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:13 server <- Reading packet 6 (77 bytes) for connection 542c4700, Handshake 2025/04/30 11:11:13 server Long Header{Type: Handshake, DestConnectionID: 542c4700, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:13 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 24µs} 2025/04/30 11:11:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:13 Retiring connection ID a600be663efc8557 in 5s. 2025/04/30 11:11:13 server Dropping Handshake keys. 2025/04/30 11:11:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:13 server -> Sending packet 2 (320 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:13 server -> &wire.NewTokenFrame{Token: 0x9c0950642384fa552cb3e7e7d0c68e43ab81753741b9e8adba56ef77da30955f5580856046a38856f719c4eb18b2fd2f707dd0b6d352b39ec02ca31c8024e70919b9fa9943caeba855f9f71fde521c78d40c13e2b3f0} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:13 server -> Sending packet 3 (320 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:13 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:13 server -> &wire.NewTokenFrame{Token: 0x9c0950642384fa552cb3e7e7d0c68e43ab81753741b9e8adba56ef77da30955f5580856046a38856f719c4eb18b2fd2f707dd0b6d352b39ec02ca31c8024e70919b9fa9943caeba855f9f71fde521c78d40c13e2b3f0} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:13 server -> Sending packet 4 (1366 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:13 server -> &wire.PingFrame{} 2025/04/30 11:11:13 server Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:11:13 Removing connection IDs [c2fcf9d3 7065ef63 b73f64fb 3e914fda] for a closed connection after it has been retired. 2025/04/30 11:11:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:13 server -> Sending packet 6 (320 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:13 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:13 server -> &wire.NewTokenFrame{Token: 0x9c0950642384fa552cb3e7e7d0c68e43ab81753741b9e8adba56ef77da30955f5580856046a38856f719c4eb18b2fd2f707dd0b6d352b39ec02ca31c8024e70919b9fa9943caeba855f9f71fde521c78d40c13e2b3f0} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:13 server -> Sending packet 7 (320 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:13 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:13 server -> &wire.NewTokenFrame{Token: 0x9c0950642384fa552cb3e7e7d0c68e43ab81753741b9e8adba56ef77da30955f5580856046a38856f719c4eb18b2fd2f707dd0b6d352b39ec02ca31c8024e70919b9fa9943caeba855f9f71fde521c78d40c13e2b3f0} 2025/04/30 11:11:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:13 server <- Reading packet 10 (35 bytes) for connection 542c4700, 1-RTT 2025/04/30 11:11:13 server Short Header{DestConnectionID: 542c4700, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:13 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:14 Removing connection ID 669bfbd787c10b39 after it has been retired. 2025/04/30 11:11:14 Removing connection IDs [a7f3372f 9487a711 b8048962 f978b25d] for a closed connection after it has been retired. 2025/04/30 11:11:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:14 server -> Sending packet 9 (320 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:14 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:14 server -> &wire.NewTokenFrame{Token: 0x9c0950642384fa552cb3e7e7d0c68e43ab81753741b9e8adba56ef77da30955f5580856046a38856f719c4eb18b2fd2f707dd0b6d352b39ec02ca31c8024e70919b9fa9943caeba855f9f71fde521c78d40c13e2b3f0} 2025/04/30 11:11:14 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:14 server -> Sending packet 10 (320 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:14 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:14 server -> &wire.NewTokenFrame{Token: 0x9c0950642384fa552cb3e7e7d0c68e43ab81753741b9e8adba56ef77da30955f5580856046a38856f719c4eb18b2fd2f707dd0b6d352b39ec02ca31c8024e70919b9fa9943caeba855f9f71fde521c78d40c13e2b3f0} 2025/04/30 11:11:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:14 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:14 server <- Reading packet 13 (37 bytes) for connection 542c4700, 1-RTT 2025/04/30 11:11:14 server Short Header{DestConnectionID: 542c4700, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:14 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:14 Removing connection ID 04cf55dbeffa4a14 after it has been retired. 2025/04/30 11:11:15 Tracking 29 connection IDs and 0 reset tokens. 2025/04/30 11:11:15 Removing connection ID 4cb69d95806f0a44 after it has been retired. 2025/04/30 11:11:15 Removing connection IDs [788186ff dad2255a 475d5ed6 04a087fa] for a closed connection after it has been retired. 2025/04/30 11:11:15 Removing connection ID a753baa210f00fa6 after it has been retired. 2025/04/30 11:11:15 Removing connection IDs [f7f0de61 b7c7bc3f d6328169 5379bae5] for a closed connection after it has been retired. 2025/04/30 11:11:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:16 server -> Sending packet 12 (320 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:16 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:16 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:16 server -> &wire.NewTokenFrame{Token: 0x9c0950642384fa552cb3e7e7d0c68e43ab81753741b9e8adba56ef77da30955f5580856046a38856f719c4eb18b2fd2f707dd0b6d352b39ec02ca31c8024e70919b9fa9943caeba855f9f71fde521c78d40c13e2b3f0} 2025/04/30 11:11:16 server -> Sending packet 13 (320 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:16 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:16 server -> &wire.NewTokenFrame{Token: 0x9c0950642384fa552cb3e7e7d0c68e43ab81753741b9e8adba56ef77da30955f5580856046a38856f719c4eb18b2fd2f707dd0b6d352b39ec02ca31c8024e70919b9fa9943caeba855f9f71fde521c78d40c13e2b3f0} 2025/04/30 11:11:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1cdaed02, StatelessResetToken: 0x33fad0596638df98da55bc3e1c9719f8} 2025/04/30 11:11:16 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fe6129d9, StatelessResetToken: 0x06d990c0e226018617ae62054485089b} 2025/04/30 11:11:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12b3f55c, StatelessResetToken: 0x92c1c5722a5e50e35926b4b599a82bc0} 2025/04/30 11:11:16 server <- Reading packet 16 (40 bytes) for connection 542c4700, 1-RTT 2025/04/30 11:11:16 server Short Header{DestConnectionID: 542c4700, PacketNumber: 16, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:16 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 2, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 25.088ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:11:16 server newly acked packets (1): [13] 2025/04/30 11:11:16 server updated RTT: 56.6283ms (σ: 28.31415ms) 2025/04/30 11:11:16 server ECN capability confirmed. 2025/04/30 11:11:16 server lost packet 4 (time threshold) 2025/04/30 11:11:16 server Canceling loss detection timer. 2025/04/30 11:11:16 server -> Sending packet 14 (1323 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:16 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:16 server -> &wire.PingFrame{} 2025/04/30 11:11:16 Removing connection ID e54cb2153a67cbdc after it has been retired. 2025/04/30 11:11:16 Removing connection IDs [71e76029 5cb91e38 25d84cb2 fc954371] for a closed connection after it has been retired. 2025/04/30 11:11:16 server <- Reading packet 18 (1220 bytes) for connection 542c4700, 1-RTT 2025/04/30 11:11:16 server Short Header{DestConnectionID: 542c4700, PacketNumber: 18, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:16 server <- &wire.PingFrame{} 2025/04/30 11:11:16 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:16 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:16 server -> Sending packet 15 (30 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:16 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:16 server -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 10, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 16}, {Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 10}}, DelayTime: 178.021µs} 2025/04/30 11:11:16 Received request: GET /hhvdowjmdi 2025/04/30 11:11:16 server -> Sending packet 16 (1045 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:16 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:16 server <- Reading packet 19 (1220 bytes) for connection 542c4700, 1-RTT 2025/04/30 11:11:16 server Short Header{DestConnectionID: 542c4700, PacketNumber: 19, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:16 server <- &wire.AckFrame{LargestAcked: 15, LowestAcked: 14, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:11:16 server newly acked packets (1): [14] 2025/04/30 11:11:16 server <- &wire.PingFrame{} 2025/04/30 11:11:16 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:16 server -> Sending packet 17 (1387 bytes) for connection a600be663efc8557, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:16 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:16 server -> &wire.PingFrame{} 2025/04/30 11:11:16 server <- Reading packet 20 (36 bytes) for connection 542c4700, 1-RTT 2025/04/30 11:11:16 server Short Header{DestConnectionID: 542c4700, PacketNumber: 20, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:16 server <- &wire.AckFrame{LargestAcked: 16, LowestAcked: 14, DelayTime: 256µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 11:11:16 server newly acked packets (1): [16] 2025/04/30 11:11:16 server updated RTT: 53.521ms (σ: 27.448ms) 2025/04/30 11:11:16 server Canceling loss detection timer. 2025/04/30 11:11:16 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:16 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:16 Replacing connection for connection IDs [542c4700 12b3f55c fe6129d9 1cdaed02] with a closed connection. 2025/04/30 11:11:16 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:16 server Connection a600be663efc8557 closed. 2025/04/30 11:11:16 Removing connection ID 5e356fadce030edd after it has been retired. 2025/04/30 11:11:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:16 server -> Sending packet 25 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:16 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:16 server -> Sending packet 26 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:16 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:17 Removing connection IDs [b76a5fba 4ce696b3 ec8a2fa5 6eb3912a] for a closed connection after it has been retired. 2025/04/30 11:11:17 server <- Received Initial packet. 2025/04/30 11:11:17 Created qlog file: /logs/qlog/24a9a87368457d20.sqlog 2025/04/30 11:11:17 server Changing connection ID to 7fe1b32a. 2025/04/30 11:11:17 Adding connection IDs 24a9a87368457d20 and 7fe1b32a for a new connection. 2025/04/30 11:11:17 server <- Reading packet 0 (1220 bytes) for connection 24a9a87368457d20, Initial 2025/04/30 11:11:17 server Long Header{Type: Initial, DestConnectionID: 24a9a87368457d20, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:17 Adding connection ID 8d0d7fc9. 2025/04/30 11:11:17 Adding connection ID e5405e76. 2025/04/30 11:11:17 Adding connection ID 2b12fbb4. 2025/04/30 11:11:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 24a9a87368457d20 2025/04/30 11:11:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7fe1b32a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 442, Version: v1} 2025/04/30 11:11:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7fe1b32a, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:11:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b12fbb4, StatelessResetToken: 0xbcf2c4ed4afd7006d224436baa4016bf} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d0d7fc9, StatelessResetToken: 0x9a1e99e34c3a1531a0f84f5064b68d8c} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e5405e76, StatelessResetToken: 0x464f8975031d11e959fc2364ad99ebd6} 2025/04/30 11:11:17 Tracking 14 connection IDs and 0 reset tokens. 2025/04/30 11:11:17 server <- Reading packet 1 (1220 bytes) for connection 24a9a87368457d20, Initial 2025/04/30 11:11:17 server Long Header{Type: Initial, DestConnectionID: 24a9a87368457d20, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:17 server <- &wire.PingFrame{} 2025/04/30 11:11:17 server -> Sending packet 1 (37 bytes) for connection 24a9a87368457d20, Initial 2025/04/30 11:11:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7fe1b32a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:17 server -> Sending packet 2 (1280 bytes) for connection 24a9a87368457d20, Initial 2025/04/30 11:11:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7fe1b32a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:17 server -> Sending packet 3 (1280 bytes) for connection 24a9a87368457d20, Initial 2025/04/30 11:11:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7fe1b32a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:17 server <- Reading packet 2 (1220 bytes) for connection 7fe1b32a, Initial 2025/04/30 11:11:17 server Long Header{Type: Initial, DestConnectionID: 7fe1b32a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:17 server newly acked packets (1): [3] 2025/04/30 11:11:17 server updated RTT: 33.575903ms (σ: 16.787951ms) 2025/04/30 11:11:17 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:17 server -> Sending packet 1 (733 bytes) for connection 24a9a87368457d20, Handshake 2025/04/30 11:11:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7fe1b32a, PacketNumber: 1, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:11:17 server -> Sending packet 2 (733 bytes) for connection 24a9a87368457d20, Handshake 2025/04/30 11:11:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7fe1b32a, PacketNumber: 2, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:11:17 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:11:17 server <- Reading packet 6 (39 bytes) for connection 7fe1b32a, Handshake 2025/04/30 11:11:17 server Long Header{Type: Handshake, DestConnectionID: 7fe1b32a, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 26, Version: v1} 2025/04/30 11:11:17 server Dropping Initial keys. 2025/04/30 11:11:17 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 11:11:17 server newly acked packets (1): [2] 2025/04/30 11:11:17 server updated RTT: 36.493ms (σ: 18.426ms) 2025/04/30 11:11:17 server Canceling loss detection timer. 2025/04/30 11:11:17 server Parsed a coalesced packet. Part 1: 73 bytes. Remaining: 1147 bytes. 2025/04/30 11:11:17 server <- Reading packet 7 (73 bytes) for connection 7fe1b32a, Handshake 2025/04/30 11:11:17 server Long Header{Type: Handshake, DestConnectionID: 7fe1b32a, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, Length: 60, Version: v1} 2025/04/30 11:11:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:17 server <- &wire.PingFrame{} 2025/04/30 11:11:17 Retiring connection ID 24a9a87368457d20 in 5s. 2025/04/30 11:11:17 server Dropping Handshake keys. 2025/04/30 11:11:17 server <- Reading packet 8 (1147 bytes) for connection 7fe1b32a, 1-RTT 2025/04/30 11:11:17 server Short Header{DestConnectionID: 7fe1b32a, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:17 server -> Sending packet 2 (328 bytes) for connection 24a9a87368457d20, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:17 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 356.432µs} 2025/04/30 11:11:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:17 Received request: GET /aiqquetauj 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e5405e76, StatelessResetToken: 0x464f8975031d11e959fc2364ad99ebd6} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d0d7fc9, StatelessResetToken: 0x9a1e99e34c3a1531a0f84f5064b68d8c} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:17 server -> &wire.NewTokenFrame{Token: 0xa7d2578b7fd6a4d6ed4d4ff026a1e1b0b7bb7ed9ee313cc14d630e132ba44d20addb0165911f1c2cc2c40e065e0a64b663c64c7093737dd5fcdf912d74a0b74fadd0525c71d245238a054e8f6a6d73900f125d99029a} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b12fbb4, StatelessResetToken: 0xbcf2c4ed4afd7006d224436baa4016bf} 2025/04/30 11:11:17 server -> Sending packet 3 (1280 bytes) for connection 24a9a87368457d20, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:17 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:17 server -> &wire.NewTokenFrame{Token: 0xa7d2578b7fd6a4d6ed4d4ff026a1e1b0b7bb7ed9ee313cc14d630e132ba44d20addb0165911f1c2cc2c40e065e0a64b663c64c7093737dd5fcdf912d74a0b74fadd0525c71d245238a054e8f6a6d73900f125d99029a} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e5405e76, StatelessResetToken: 0x464f8975031d11e959fc2364ad99ebd6} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b12fbb4, StatelessResetToken: 0xbcf2c4ed4afd7006d224436baa4016bf} 2025/04/30 11:11:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d0d7fc9, StatelessResetToken: 0x9a1e99e34c3a1531a0f84f5064b68d8c} 2025/04/30 11:11:17 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 955, Offset + Data length: 955} 2025/04/30 11:11:17 server -> Sending packet 4 (92 bytes) for connection 24a9a87368457d20, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:17 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:11:17 server <- Reading packet 5 (1252 bytes) for connection 7fe1b32a, 1-RTT 2025/04/30 11:11:17 server Short Header{DestConnectionID: 7fe1b32a, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:17 server <- &wire.PingFrame{} 2025/04/30 11:11:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:17 server Queueing ACK because packet 5 was missing before. 2025/04/30 11:11:17 server -> Sending packet 5 (27 bytes) for connection 24a9a87368457d20, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:17 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:17 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}}, DelayTime: 657.071µs} 2025/04/30 11:11:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:17 server -> Sending packet 7 (1280 bytes) for connection 24a9a87368457d20, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:17 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:17 server -> &wire.NewTokenFrame{Token: 0xa7d2578b7fd6a4d6ed4d4ff026a1e1b0b7bb7ed9ee313cc14d630e132ba44d20addb0165911f1c2cc2c40e065e0a64b663c64c7093737dd5fcdf912d74a0b74fadd0525c71d245238a054e8f6a6d73900f125d99029a} 2025/04/30 11:11:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e5405e76, StatelessResetToken: 0x464f8975031d11e959fc2364ad99ebd6} 2025/04/30 11:11:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d0d7fc9, StatelessResetToken: 0x9a1e99e34c3a1531a0f84f5064b68d8c} 2025/04/30 11:11:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b12fbb4, StatelessResetToken: 0xbcf2c4ed4afd7006d224436baa4016bf} 2025/04/30 11:11:17 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 955, Offset + Data length: 955} 2025/04/30 11:11:17 server Skipping packet number 6 2025/04/30 11:11:17 server -> Sending packet 8 (92 bytes) for connection 24a9a87368457d20, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:17 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:11:17 server -> Sending packet 9 (1366 bytes) for connection 24a9a87368457d20, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:17 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:17 server -> &wire.PingFrame{} 2025/04/30 11:11:17 server <- Reading packet 10 (42 bytes) for connection 7fe1b32a, 1-RTT 2025/04/30 11:11:17 server Short Header{DestConnectionID: 7fe1b32a, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:17 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:17 server newly acked packets (1): [7] 2025/04/30 11:11:17 server updated RTT: 35.974ms (σ: 14.857ms) 2025/04/30 11:11:17 server ECN capability confirmed. 2025/04/30 11:11:17 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:17 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:17 server <- Reading packet 11 (28 bytes) for connection 7fe1b32a, 1-RTT 2025/04/30 11:11:17 server Short Header{DestConnectionID: 7fe1b32a, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:17 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:17 Replacing connection for connection IDs [7fe1b32a 8d0d7fc9 e5405e76 2b12fbb4] with a closed connection. 2025/04/30 11:11:17 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:17 server Connection 24a9a87368457d20 closed. 2025/04/30 11:11:18 Removing connection ID a600be663efc8557 after it has been retired. 2025/04/30 11:11:18 server <- Received Initial packet. 2025/04/30 11:11:18 Created qlog file: /logs/qlog/a2350097a8db8f38.sqlog 2025/04/30 11:11:18 server Changing connection ID to 6d54be60. 2025/04/30 11:11:18 Adding connection IDs a2350097a8db8f38 and 6d54be60 for a new connection. 2025/04/30 11:11:18 server <- Reading packet 1 (1220 bytes) for connection a2350097a8db8f38, Initial 2025/04/30 11:11:18 server Long Header{Type: Initial, DestConnectionID: a2350097a8db8f38, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:18 Adding connection ID 83a722e3. 2025/04/30 11:11:18 Adding connection ID c28c8b7c. 2025/04/30 11:11:18 Adding connection ID 16447d0d. 2025/04/30 11:11:18 server <- &wire.PingFrame{} 2025/04/30 11:11:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a2350097a8db8f38 2025/04/30 11:11:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d54be60, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 441, Version: v1} 2025/04/30 11:11:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d54be60, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:11:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:11:18 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 83a722e3, StatelessResetToken: 0xf7f3b168fea9cc60f771eb68af5c534d} 2025/04/30 11:11:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 16447d0d, StatelessResetToken: 0x71cbcd3ed592699a7c47a3193314798f} 2025/04/30 11:11:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c28c8b7c, StatelessResetToken: 0xabd7d02e20c76555425c6444ce778790} 2025/04/30 11:11:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:18 server -> Sending packet 1 (1280 bytes) for connection a2350097a8db8f38, Initial 2025/04/30 11:11:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d54be60, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:18 server -> Sending packet 2 (1280 bytes) for connection a2350097a8db8f38, Initial 2025/04/30 11:11:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d54be60, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:18 server Canceling loss detection timer. 2025/04/30 11:11:18 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:18 server <- Reading packet 3 (1220 bytes) for connection 6d54be60, Initial 2025/04/30 11:11:18 server Long Header{Type: Initial, DestConnectionID: 6d54be60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:18 server <- &wire.PingFrame{} 2025/04/30 11:11:18 server -> Sending packet 3 (39 bytes) for connection a2350097a8db8f38, Initial 2025/04/30 11:11:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d54be60, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:11:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:11:18 server <- Reading packet 4 (1220 bytes) for connection 6d54be60, Handshake 2025/04/30 11:11:18 server Long Header{Type: Handshake, DestConnectionID: 6d54be60, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:18 server Dropping Initial keys. 2025/04/30 11:11:18 server <- &wire.PingFrame{} 2025/04/30 11:11:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:18 server -> Sending packet 1 (739 bytes) for connection a2350097a8db8f38, Handshake 2025/04/30 11:11:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d54be60, PacketNumber: 1, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:11:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:11:18 server -> Sending packet 2 (734 bytes) for connection a2350097a8db8f38, Handshake 2025/04/30 11:11:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d54be60, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:11:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:11:18 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:11:18 server <- Reading packet 7 (39 bytes) for connection 6d54be60, Handshake 2025/04/30 11:11:18 server Long Header{Type: Handshake, DestConnectionID: 6d54be60, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, Length: 26, Version: v1} 2025/04/30 11:11:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 11:11:18 server newly acked packets (1): [2] 2025/04/30 11:11:18 server updated RTT: 57.074086ms (σ: 28.537043ms) 2025/04/30 11:11:18 server Canceling loss detection timer. 2025/04/30 11:11:19 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:19 server <- Reading packet 8 (72 bytes) for connection 6d54be60, Handshake 2025/04/30 11:11:19 server Long Header{Type: Handshake, DestConnectionID: 6d54be60, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:19 Retiring connection ID a2350097a8db8f38 in 5s. 2025/04/30 11:11:19 server Dropping Handshake keys. 2025/04/30 11:11:19 server <- Reading packet 9 (1148 bytes) for connection 6d54be60, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 6d54be60, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:19 server -> Sending packet 2 (328 bytes) for connection a2350097a8db8f38, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 404.842µs} 2025/04/30 11:11:19 server -> &wire.NewTokenFrame{Token: 0x45642edb329b10a9f958e4d1a2e3799437be46bb0c28a2f5acb6cbcfa3303564679bbf15e98753e6b29bc2096449fd43dff7d3a1962dbddb75c811e82c39d6191a3fada6fd8cacbc5f66a23cfceae233fcb3e249ffa9} 2025/04/30 11:11:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c28c8b7c, StatelessResetToken: 0xabd7d02e20c76555425c6444ce778790} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 16447d0d, StatelessResetToken: 0x71cbcd3ed592699a7c47a3193314798f} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 83a722e3, StatelessResetToken: 0xf7f3b168fea9cc60f771eb68af5c534d} 2025/04/30 11:11:19 Received request: GET /mbdpkmozci 2025/04/30 11:11:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:19 server -> Sending packet 3 (323 bytes) for connection a2350097a8db8f38, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 83a722e3, StatelessResetToken: 0xf7f3b168fea9cc60f771eb68af5c534d} 2025/04/30 11:11:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c28c8b7c, StatelessResetToken: 0xabd7d02e20c76555425c6444ce778790} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 16447d0d, StatelessResetToken: 0x71cbcd3ed592699a7c47a3193314798f} 2025/04/30 11:11:19 server -> &wire.NewTokenFrame{Token: 0x45642edb329b10a9f958e4d1a2e3799437be46bb0c28a2f5acb6cbcfa3303564679bbf15e98753e6b29bc2096449fd43dff7d3a1962dbddb75c811e82c39d6191a3fada6fd8cacbc5f66a23cfceae233fcb3e249ffa9} 2025/04/30 11:11:19 server -> Sending packet 4 (1045 bytes) for connection a2350097a8db8f38, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:19 server <- Reading packet 6 (1252 bytes) for connection 6d54be60, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 6d54be60, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.PingFrame{} 2025/04/30 11:11:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:19 server Queueing ACK because packet 6 was missing before. 2025/04/30 11:11:19 server -> Sending packet 5 (27 bytes) for connection a2350097a8db8f38, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 740.145µs} 2025/04/30 11:11:19 server <- Reading packet 10 (38 bytes) for connection 6d54be60, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 6d54be60, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:19 server newly acked packets (2): [3 4] 2025/04/30 11:11:19 server updated RTT: 53.972ms (σ: 27.605ms) 2025/04/30 11:11:19 server ECN capability confirmed. 2025/04/30 11:11:19 server Canceling loss detection timer. 2025/04/30 11:11:19 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:19 server -> Sending packet 6 (29 bytes) for connection a2350097a8db8f38, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 98.823µs} 2025/04/30 11:11:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:19 server <- Reading packet 11 (1332 bytes) for connection 6d54be60, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 6d54be60, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.PingFrame{} 2025/04/30 11:11:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:19 server <- Reading packet 12 (36 bytes) for connection 6d54be60, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 6d54be60, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:19 Replacing connection for connection IDs [6d54be60 83a722e3 c28c8b7c 16447d0d] with a closed connection. 2025/04/30 11:11:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:19 server Connection a2350097a8db8f38 closed. 2025/04/30 11:11:19 Tracking 18 connection IDs and 0 reset tokens. 2025/04/30 11:11:19 server <- Received Initial packet. 2025/04/30 11:11:19 Created qlog file: /logs/qlog/72b314c8b1159e8c.sqlog 2025/04/30 11:11:19 server Changing connection ID to 9b8d2790. 2025/04/30 11:11:19 Adding connection IDs 72b314c8b1159e8c and 9b8d2790 for a new connection. 2025/04/30 11:11:19 server <- Reading packet 0 (1220 bytes) for connection 72b314c8b1159e8c, Initial 2025/04/30 11:11:19 server Long Header{Type: Initial, DestConnectionID: 72b314c8b1159e8c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:19 Adding connection ID 424487bd. 2025/04/30 11:11:19 Adding connection ID 4b855c46. 2025/04/30 11:11:19 Adding connection ID 8f5968fd. 2025/04/30 11:11:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 72b314c8b1159e8c 2025/04/30 11:11:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9b8d2790, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 443, Version: v1} 2025/04/30 11:11:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9b8d2790, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:11:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f5968fd, StatelessResetToken: 0x62bb7f2d2124ca79ac95e47e3d5df755} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 424487bd, StatelessResetToken: 0x2ec92cd3bb0a5be5d4eb3e7625e23fc8} 2025/04/30 11:11:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4b855c46, StatelessResetToken: 0x53a5920182467aef8501baf08a7eb04e} 2025/04/30 11:11:19 server <- Reading packet 1 (77 bytes) for connection 9b8d2790, Handshake 2025/04/30 11:11:19 server Long Header{Type: Handshake, DestConnectionID: 9b8d2790, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:19 server Dropping Initial keys. 2025/04/30 11:11:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:19 server newly acked packets (1): [0] 2025/04/30 11:11:19 server updated RTT: 32.464249ms (σ: 16.232124ms) 2025/04/30 11:11:19 server Canceling loss detection timer. 2025/04/30 11:11:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:19 Retiring connection ID 72b314c8b1159e8c in 5s. 2025/04/30 11:11:19 server Dropping Handshake keys. 2025/04/30 11:11:19 server -> Sending packet 1 (251 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:19 server -> &wire.NewTokenFrame{Token: 0x927e7d0c3ea9e3b82de814c71eee458a22655ecd107199ce257074bcc7a3117bf8bb87cca3b6870e3f72f461b1fb84fb9c586644442e278ad5c2e3dd874a19d4cefb5d7fc9f22223b4c8a6e428d2827a778568933469} 2025/04/30 11:11:19 server <- Reading packet 3 (34 bytes) for connection 9b8d2790, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 9b8d2790, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:19 server newly acked packets (2): [0 1] 2025/04/30 11:11:19 server updated RTT: 35.417ms (σ: 18.08ms) 2025/04/30 11:11:19 server ECN capability confirmed. 2025/04/30 11:11:19 server Canceling loss detection timer. 2025/04/30 11:11:19 server <- Reading packet 5 (1220 bytes) for connection 9b8d2790, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 9b8d2790, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.PingFrame{} 2025/04/30 11:11:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:19 server -> Sending packet 2 (1366 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.PingFrame{} 2025/04/30 11:11:19 server -> Sending packet 3 (26 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 206.514µs} 2025/04/30 11:11:19 Received request: GET /lomalafzvt 2025/04/30 11:11:19 server -> Sending packet 4 (1045 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:19 server <- Reading packet 6 (1220 bytes) for connection 9b8d2790, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 9b8d2790, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:19 server newly acked packets (1): [2] 2025/04/30 11:11:19 server <- &wire.PingFrame{} 2025/04/30 11:11:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:19 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:19 server -> Sending packet 5 (27 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.295635ms} 2025/04/30 11:11:19 server <- Reading packet 7 (1252 bytes) for connection 9b8d2790, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 9b8d2790, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.PingFrame{} 2025/04/30 11:11:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:19 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:19 server -> Sending packet 6 (27 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.296833ms} 2025/04/30 11:11:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:19 server -> Sending packet 8 (1045 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:19 server -> Sending packet 9 (1045 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:19 server <- Reading packet 9 (40 bytes) for connection 9b8d2790, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 9b8d2790, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:11:19 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:19 server -> Sending packet 10 (28 bytes) for connection 72b314c8b1159e8c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:19 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:19 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 71.002µs} 2025/04/30 11:11:19 server <- Reading packet 10 (28 bytes) for connection 9b8d2790, 1-RTT 2025/04/30 11:11:19 server Short Header{DestConnectionID: 9b8d2790, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:19 Replacing connection for connection IDs [9b8d2790 424487bd 4b855c46 8f5968fd] with a closed connection. 2025/04/30 11:11:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:19 server Connection 72b314c8b1159e8c closed. 2025/04/30 11:11:20 server <- Received Initial packet. 2025/04/30 11:11:20 Created qlog file: /logs/qlog/0f56e1f45857cf4c.sqlog 2025/04/30 11:11:20 server Changing connection ID to 09cd176a. 2025/04/30 11:11:20 Adding connection IDs 0f56e1f45857cf4c and 09cd176a for a new connection. 2025/04/30 11:11:20 server <- Reading packet 0 (1220 bytes) for connection 0f56e1f45857cf4c, Initial 2025/04/30 11:11:20 server Long Header{Type: Initial, DestConnectionID: 0f56e1f45857cf4c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:20 Adding connection ID e7f505e5. 2025/04/30 11:11:20 Adding connection ID 6bf01bd9. 2025/04/30 11:11:20 Adding connection ID 0015b8f6. 2025/04/30 11:11:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0f56e1f45857cf4c 2025/04/30 11:11:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 09cd176a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:11:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 09cd176a, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:11:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7f505e5, StatelessResetToken: 0xa425d19f8c029c63d91181b3ab759587} 2025/04/30 11:11:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6bf01bd9, StatelessResetToken: 0xebf2419db87bcb380ef86689416870b6} 2025/04/30 11:11:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0015b8f6, StatelessResetToken: 0x28a35c5511681d5c0cc94345270aba48} 2025/04/30 11:11:20 server <- Reading packet 1 (77 bytes) for connection 09cd176a, Handshake 2025/04/30 11:11:20 server Long Header{Type: Handshake, DestConnectionID: 09cd176a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:20 server Dropping Initial keys. 2025/04/30 11:11:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:20 server newly acked packets (1): [0] 2025/04/30 11:11:20 server updated RTT: 32.548594ms (σ: 16.274297ms) 2025/04/30 11:11:20 server Canceling loss detection timer. 2025/04/30 11:11:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:20 Retiring connection ID 0f56e1f45857cf4c in 5s. 2025/04/30 11:11:20 server Dropping Handshake keys. 2025/04/30 11:11:20 server -> Sending packet 1 (251 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:20 server -> &wire.NewTokenFrame{Token: 0x1c849ad9b28de226cf44cce7b58953b3c6c52d97834d51c083c8c3a0a84291253b9031129a0fbd5ecb90ec9410218ad770a96b7e48001bd6125d6e9c3bada2e35670dfadd38fc2791044cbe5ea937cf2e3ebbe30c8d6} 2025/04/30 11:11:20 server <- Reading packet 2 (1252 bytes) for connection 09cd176a, 1-RTT 2025/04/30 11:11:20 server Short Header{DestConnectionID: 09cd176a, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:20 server <- &wire.PingFrame{} 2025/04/30 11:11:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:20 server newly acked packets (1): [0] 2025/04/30 11:11:20 server updated RTT: 32.673ms (σ: 12.456ms) 2025/04/30 11:11:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:20 server -> Sending packet 2 (24 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 105.296µs} 2025/04/30 11:11:20 Received request: GET /batzvfawrf 2025/04/30 11:11:20 server -> Sending packet 3 (1045 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:20 server <- Reading packet 3 (1332 bytes) for connection 09cd176a, 1-RTT 2025/04/30 11:11:20 server Short Header{DestConnectionID: 09cd176a, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:20 server <- &wire.PingFrame{} 2025/04/30 11:11:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:20 server <- Reading packet 4 (38 bytes) for connection 09cd176a, 1-RTT 2025/04/30 11:11:20 server Short Header{DestConnectionID: 09cd176a, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:20 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:20 server newly acked packets (2): [1 3] 2025/04/30 11:11:20 server updated RTT: 32.533ms (σ: 9.621ms) 2025/04/30 11:11:20 server ECN capability confirmed. 2025/04/30 11:11:20 server Canceling loss detection timer. 2025/04/30 11:11:20 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:20 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:11:20 server -> Sending packet 4 (27 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 189.45µs} 2025/04/30 11:11:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:20 server -> Sending packet 6 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:20 server -> Sending packet 7 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:20 server -> Sending packet 9 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:20 server -> Sending packet 10 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:20 server -> Sending packet 11 (1366 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.PingFrame{} 2025/04/30 11:11:20 server <- Received Initial packet. 2025/04/30 11:11:20 Created qlog file: /logs/qlog/615da66b8ac4f14a.sqlog 2025/04/30 11:11:20 server Changing connection ID to f691c2b8. 2025/04/30 11:11:20 Adding connection IDs 615da66b8ac4f14a and f691c2b8 for a new connection. 2025/04/30 11:11:20 server <- Reading packet 0 (1220 bytes) for connection 615da66b8ac4f14a, Initial 2025/04/30 11:11:20 server Long Header{Type: Initial, DestConnectionID: 615da66b8ac4f14a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:20 Adding connection ID 773e4dc7. 2025/04/30 11:11:20 Adding connection ID 8fe497da. 2025/04/30 11:11:20 Adding connection ID e2d3f135. 2025/04/30 11:11:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 615da66b8ac4f14a 2025/04/30 11:11:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f691c2b8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:11:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f691c2b8, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:11:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e2d3f135, StatelessResetToken: 0xb2b80127c627c03ac130a8e6f1b76420} 2025/04/30 11:11:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 773e4dc7, StatelessResetToken: 0xf27e745d2e4f2ab5859d01a048e2f3ce} 2025/04/30 11:11:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fe497da, StatelessResetToken: 0xdd412cfa31ee9961e55b2f94f1ea8ab5} 2025/04/30 11:11:20 server <- Reading packet 1 (1220 bytes) for connection 615da66b8ac4f14a, Initial 2025/04/30 11:11:20 server Long Header{Type: Initial, DestConnectionID: 615da66b8ac4f14a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:20 server <- &wire.PingFrame{} 2025/04/30 11:11:20 server -> Sending packet 1 (37 bytes) for connection 615da66b8ac4f14a, Initial 2025/04/30 11:11:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f691c2b8, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:20 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:20 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:20 server -> Sending packet 2 (1280 bytes) for connection 615da66b8ac4f14a, Initial 2025/04/30 11:11:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f691c2b8, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:20 server -> Sending packet 3 (1280 bytes) for connection 615da66b8ac4f14a, Initial 2025/04/30 11:11:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f691c2b8, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:20 server -> Sending packet 13 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:20 server -> Sending packet 14 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:20 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:11:21 server -> Sending packet 1 (740 bytes) for connection 615da66b8ac4f14a, Handshake 2025/04/30 11:11:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f691c2b8, PacketNumber: 1, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:11:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:11:21 server -> Sending packet 2 (740 bytes) for connection 615da66b8ac4f14a, Handshake 2025/04/30 11:11:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f691c2b8, PacketNumber: 2, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:11:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:11:21 server <- Reading packet 3 (77 bytes) for connection f691c2b8, Handshake 2025/04/30 11:11:21 server Long Header{Type: Handshake, DestConnectionID: f691c2b8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:21 server Dropping Initial keys. 2025/04/30 11:11:21 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 24µs} 2025/04/30 11:11:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:21 Retiring connection ID 615da66b8ac4f14a in 5s. 2025/04/30 11:11:21 server Dropping Handshake keys. 2025/04/30 11:11:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:21 server -> Sending packet 2 (320 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:21 server -> &wire.NewTokenFrame{Token: 0x2ad54308a032ff50e72ddd72002f9940fb032ade7162d4bae0c05ce0cc78255e1b90c5d2250c252b2c7e68ce8e54f0146c59ed859f14f30b2e0ab3f7bd5769bd4a85c38167d5684880e056afe427221ffa835a95e407} 2025/04/30 11:11:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 773e4dc7, StatelessResetToken: 0xf27e745d2e4f2ab5859d01a048e2f3ce} 2025/04/30 11:11:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e2d3f135, StatelessResetToken: 0xb2b80127c627c03ac130a8e6f1b76420} 2025/04/30 11:11:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fe497da, StatelessResetToken: 0xdd412cfa31ee9961e55b2f94f1ea8ab5} 2025/04/30 11:11:21 server -> Sending packet 3 (320 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e2d3f135, StatelessResetToken: 0xb2b80127c627c03ac130a8e6f1b76420} 2025/04/30 11:11:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fe497da, StatelessResetToken: 0xdd412cfa31ee9961e55b2f94f1ea8ab5} 2025/04/30 11:11:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 773e4dc7, StatelessResetToken: 0xf27e745d2e4f2ab5859d01a048e2f3ce} 2025/04/30 11:11:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:21 server -> &wire.NewTokenFrame{Token: 0x2ad54308a032ff50e72ddd72002f9940fb032ade7162d4bae0c05ce0cc78255e1b90c5d2250c252b2c7e68ce8e54f0146c59ed859f14f30b2e0ab3f7bd5769bd4a85c38167d5684880e056afe427221ffa835a95e407} 2025/04/30 11:11:21 server -> Sending packet 4 (1366 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.PingFrame{} 2025/04/30 11:11:21 server <- Reading packet 6 (33 bytes) for connection f691c2b8, 1-RTT 2025/04/30 11:11:21 server Short Header{DestConnectionID: f691c2b8, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:21 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:21 server newly acked packets (1): [3] 2025/04/30 11:11:21 server updated RTT: 31.231118ms (σ: 15.615559ms) 2025/04/30 11:11:21 server ECN capability confirmed. 2025/04/30 11:11:21 server Canceling loss detection timer. 2025/04/30 11:11:21 Tracking 33 connection IDs and 0 reset tokens. 2025/04/30 11:11:21 server <- Reading packet 8 (1220 bytes) for connection f691c2b8, 1-RTT 2025/04/30 11:11:21 server Short Header{DestConnectionID: f691c2b8, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:21 server <- &wire.PingFrame{} 2025/04/30 11:11:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:21 server -> Sending packet 5 (26 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 181.938µs} 2025/04/30 11:11:21 Received request: GET /sfrxdxpueq 2025/04/30 11:11:21 server -> Sending packet 6 (1045 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:21 server <- Reading packet 9 (40 bytes) for connection f691c2b8, 1-RTT 2025/04/30 11:11:21 server Short Header{DestConnectionID: f691c2b8, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:21 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:21 server newly acked packets (2): [4 6] 2025/04/30 11:11:21 server updated RTT: 31.275ms (σ: 11.8ms) 2025/04/30 11:11:21 server Canceling loss detection timer. 2025/04/30 11:11:21 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:21 server -> Sending packet 7 (1409 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.PingFrame{} 2025/04/30 11:11:21 server -> Sending packet 8 (29 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 179.423µs} 2025/04/30 11:11:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:21 server -> Sending packet 10 (22 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:21 server -> Sending packet 11 (22 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:21 server <- Reading packet 10 (37 bytes) for connection f691c2b8, 1-RTT 2025/04/30 11:11:21 server Short Header{DestConnectionID: f691c2b8, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:21 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:11:21 server <- Reading packet 11 (38 bytes) for connection f691c2b8, 1-RTT 2025/04/30 11:11:21 server Short Header{DestConnectionID: f691c2b8, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:21 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 25.088ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:11:21 server newly acked packets (1): [11] 2025/04/30 11:11:21 server updated RTT: 34.372ms (σ: 15.045ms) 2025/04/30 11:11:21 server lost packet 7 (time threshold) 2025/04/30 11:11:21 server Canceling loss detection timer. 2025/04/30 11:11:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:21 server -> Sending packet 16 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:21 server -> Sending packet 17 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:21 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:21 Removing connection IDs [542c4700 12b3f55c fe6129d9 1cdaed02] for a closed connection after it has been retired. 2025/04/30 11:11:22 server <- Reading packet 12 (1220 bytes) for connection f691c2b8, 1-RTT 2025/04/30 11:11:22 server Short Header{DestConnectionID: f691c2b8, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:22 server <- &wire.PingFrame{} 2025/04/30 11:11:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:22 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:22 server -> Sending packet 12 (1387 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:22 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:22 server -> &wire.PingFrame{} 2025/04/30 11:11:22 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:22 server -> Sending packet 13 (27 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:22 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:22 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 25.411805ms} 2025/04/30 11:11:22 Removing connection ID 24a9a87368457d20 after it has been retired. 2025/04/30 11:11:22 Removing connection IDs [7fe1b32a 8d0d7fc9 e5405e76 2b12fbb4] for a closed connection after it has been retired. 2025/04/30 11:11:23 Tracking 24 connection IDs and 0 reset tokens. 2025/04/30 11:11:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:23 server -> Sending packet 19 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:23 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:23 server -> Sending packet 20 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:23 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:24 Removing connection ID a2350097a8db8f38 after it has been retired. 2025/04/30 11:11:24 Removing connection IDs [6d54be60 83a722e3 c28c8b7c 16447d0d] for a closed connection after it has been retired. 2025/04/30 11:11:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:24 server -> Sending packet 28 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:24 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:24 server -> Sending packet 29 (1045 bytes) for connection 04cf55dbeffa4a14, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:24 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:24 Removing connection ID 72b314c8b1159e8c after it has been retired. 2025/04/30 11:11:24 Removing connection IDs [9b8d2790 424487bd 4b855c46 8f5968fd] for a closed connection after it has been retired. 2025/04/30 11:11:25 Tracking 14 connection IDs and 0 reset tokens. 2025/04/30 11:11:25 Removing connection ID 0f56e1f45857cf4c after it has been retired. 2025/04/30 11:11:25 server <- Reading packet 15 (1220 bytes) for connection f691c2b8, 1-RTT 2025/04/30 11:11:25 server Short Header{DestConnectionID: f691c2b8, PacketNumber: 15, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:25 server <- &wire.PingFrame{} 2025/04/30 11:11:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:25 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:25 server -> Sending packet 14 (28 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:25 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:25 server -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 6, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 152.162µs} 2025/04/30 11:11:25 server <- Reading packet 16 (1220 bytes) for connection f691c2b8, 1-RTT 2025/04/30 11:11:25 server Short Header{DestConnectionID: f691c2b8, PacketNumber: 16, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:25 server <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 12, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}}, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:11:25 server newly acked packets (1): [12] 2025/04/30 11:11:25 server <- &wire.PingFrame{} 2025/04/30 11:11:25 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:25 server -> Sending packet 15 (1419 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:25 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:25 server -> &wire.PingFrame{} 2025/04/30 11:11:25 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:25 server -> Sending packet 16 (29 bytes) for connection 615da66b8ac4f14a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:25 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:25 server -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 6, AckRanges: {{Largest: 16, Smallest: 15}, {Largest: 12, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 25.478832ms} 2025/04/30 11:11:26 server <- Received Initial packet. 2025/04/30 11:11:26 Created qlog file: /logs/qlog/96eaaf0fd7235f3b.sqlog 2025/04/30 11:11:26 server Changing connection ID to df469498. 2025/04/30 11:11:26 Adding connection IDs 96eaaf0fd7235f3b and df469498 for a new connection. 2025/04/30 11:11:26 server <- Reading packet 0 (1220 bytes) for connection 96eaaf0fd7235f3b, Initial 2025/04/30 11:11:26 server Long Header{Type: Initial, DestConnectionID: 96eaaf0fd7235f3b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:26 Adding connection ID 52dc274a. 2025/04/30 11:11:26 Adding connection ID 865604e4. 2025/04/30 11:11:26 Adding connection ID ff005574. 2025/04/30 11:11:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 96eaaf0fd7235f3b 2025/04/30 11:11:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: df469498, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:11:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: df469498, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:11:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:11:26 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ff005574, StatelessResetToken: 0x3aef5eeb7e5c322f2ddc5cc1aa98bd90} 2025/04/30 11:11:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 865604e4, StatelessResetToken: 0x58b5ae447f82b17c7b5465d1e7ba72db} 2025/04/30 11:11:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 52dc274a, StatelessResetToken: 0x2bf8e3f557fca8a5ece95fda2aa458bc} 2025/04/30 11:11:26 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:11:26 Removing connection ID 615da66b8ac4f14a after it has been retired. 2025/04/30 11:11:26 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:26 server <- Reading packet 3 (72 bytes) for connection df469498, Handshake 2025/04/30 11:11:26 server Long Header{Type: Handshake, DestConnectionID: df469498, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:26 server Dropping Initial keys. 2025/04/30 11:11:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:26 Retiring connection ID 96eaaf0fd7235f3b in 5s. 2025/04/30 11:11:26 server Dropping Handshake keys. 2025/04/30 11:11:26 server <- Reading packet 4 (1148 bytes) for connection df469498, 1-RTT 2025/04/30 11:11:26 server Short Header{DestConnectionID: df469498, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:26 server -> Sending packet 1 (1366 bytes) for connection 96eaaf0fd7235f3b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:26 Received request: GET /jkgshukbjr 2025/04/30 11:11:26 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:26 server -> &wire.PingFrame{} 2025/04/30 11:11:26 server <- Reading packet 2 (1252 bytes) for connection df469498, 1-RTT 2025/04/30 11:11:26 server Short Header{DestConnectionID: df469498, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:26 server <- &wire.PingFrame{} 2025/04/30 11:11:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:26 server newly acked packets (1): [0] 2025/04/30 11:11:26 server updated RTT: 33.697902ms (σ: 16.848951ms) 2025/04/30 11:11:26 server Canceling loss detection timer. 2025/04/30 11:11:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:26 server -> Sending packet 2 (1280 bytes) for connection 96eaaf0fd7235f3b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:26 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:26 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 600.855µs} 2025/04/30 11:11:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:26 server -> &wire.NewTokenFrame{Token: 0x89a58875442a296ac8ce6082eddfb3d93d0202e5783deb77d012644b4f3b87bf0286ad052e3619dbdb6041b4a2bdc65140d2ae8332df569affcb656c601966f6bb893aa8d8a62467cef37b2489507d61230c41bd5c9d} 2025/04/30 11:11:26 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 11:11:26 server -> Sending packet 3 (25 bytes) for connection 96eaaf0fd7235f3b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:26 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1022, Data length: 2, Offset + Data length: 1024} 2025/04/30 11:11:26 server <- Reading packet 5 (1332 bytes) for connection df469498, 1-RTT 2025/04/30 11:11:26 server Short Header{DestConnectionID: df469498, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:26 server <- &wire.PingFrame{} 2025/04/30 11:11:26 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:26 server <- Reading packet 6 (38 bytes) for connection df469498, 1-RTT 2025/04/30 11:11:26 server Short Header{DestConnectionID: df469498, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:26 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:26 server newly acked packets (2): [2 3] 2025/04/30 11:11:26 server updated RTT: 33.75ms (σ: 12.742ms) 2025/04/30 11:11:26 server ECN capability confirmed. 2025/04/30 11:11:26 server setting loss timer for packet 1 (1-RTT) to 38.390033ms (in 2025-04-30 11:11:26.246382321 +0000 UTC m=+20.998595505) 2025/04/30 11:11:26 server Canceling loss detection timer. 2025/04/30 11:11:26 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:26 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:11:26 server Ignoring all packets below 5. 2025/04/30 11:11:26 server -> Sending packet 4 (27 bytes) for connection 96eaaf0fd7235f3b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:26 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:26 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 209.197µs} 2025/04/30 11:11:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:26 server <- Reading packet 7 (28 bytes) for connection df469498, 1-RTT 2025/04/30 11:11:26 server Short Header{DestConnectionID: df469498, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:26 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:26 Replacing connection for connection IDs [df469498 52dc274a 865604e4 ff005574] with a closed connection. 2025/04/30 11:11:26 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:26 server Connection 96eaaf0fd7235f3b closed. 2025/04/30 11:11:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:26 server -> Sending packet 22 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:26 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:26 server -> Sending packet 23 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:26 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:26 server <- Received Initial packet. 2025/04/30 11:11:26 Created qlog file: /logs/qlog/a1b2d9d7ad7705ba.sqlog 2025/04/30 11:11:26 server Changing connection ID to 5306ea53. 2025/04/30 11:11:26 Adding connection IDs a1b2d9d7ad7705ba and 5306ea53 for a new connection. 2025/04/30 11:11:26 server <- Reading packet 1 (1220 bytes) for connection a1b2d9d7ad7705ba, Initial 2025/04/30 11:11:26 server Long Header{Type: Initial, DestConnectionID: a1b2d9d7ad7705ba, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:26 Adding connection ID f430a64f. 2025/04/30 11:11:26 Adding connection ID 927bd646. 2025/04/30 11:11:26 Adding connection ID 9600445f. 2025/04/30 11:11:26 server <- &wire.PingFrame{} 2025/04/30 11:11:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a1b2d9d7ad7705ba 2025/04/30 11:11:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5306ea53, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:11:26 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:26 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9600445f, StatelessResetToken: 0x306798062c774a6b853f1b793087eb19} 2025/04/30 11:11:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 927bd646, StatelessResetToken: 0x6a626ca8cc2b7f3fec9f35431593134a} 2025/04/30 11:11:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f430a64f, StatelessResetToken: 0x84b9a074e57b436300dbbecbf9b53d4d} 2025/04/30 11:11:26 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:26 server -> Sending packet 1 (1280 bytes) for connection a1b2d9d7ad7705ba, Initial 2025/04/30 11:11:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5306ea53, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:26 server -> Sending packet 2 (1280 bytes) for connection a1b2d9d7ad7705ba, Initial 2025/04/30 11:11:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5306ea53, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:26 server Canceling loss detection timer. 2025/04/30 11:11:26 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:27 server <- Reading packet 3 (1220 bytes) for connection 5306ea53, Initial 2025/04/30 11:11:27 server Long Header{Type: Initial, DestConnectionID: 5306ea53, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server -> Sending packet 3 (39 bytes) for connection a1b2d9d7ad7705ba, Initial 2025/04/30 11:11:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5306ea53, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:11:27 server <- Reading packet 4 (1220 bytes) for connection 5306ea53, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: 5306ea53, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:27 server Dropping Initial keys. 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:27 server -> Sending packet 1 (744 bytes) for connection a1b2d9d7ad7705ba, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:11:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:27 server -> Sending packet 2 (739 bytes) for connection a1b2d9d7ad7705ba, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:27 Tracking 22 connection IDs and 0 reset tokens. 2025/04/30 11:11:27 server <- Reading packet 5 (1220 bytes) for connection 5306ea53, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: 5306ea53, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server -> Sending packet 3 (36 bytes) for connection a1b2d9d7ad7705ba, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:11:27 server <- Reading packet 6 (1220 bytes) for connection 5306ea53, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: 5306ea53, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:27 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 1.536ms} 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server -> Sending packet 4 (36 bytes) for connection a1b2d9d7ad7705ba, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:11:27 server <- Reading packet 7 (1220 bytes) for connection 5306ea53, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: 5306ea53, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:27 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 1.16ms} 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server -> Sending packet 5 (36 bytes) for connection a1b2d9d7ad7705ba, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 5, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:11:27 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:11:27 server -> Sending packet 6 (739 bytes) for connection a1b2d9d7ad7705ba, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 6, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:27 server -> Sending packet 7 (739 bytes) for connection a1b2d9d7ad7705ba, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 7, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:27 server <- Reading packet 8 (1220 bytes) for connection 5306ea53, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: 5306ea53, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:27 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 880µs} 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server -> Sending packet 8 (36 bytes) for connection a1b2d9d7ad7705ba, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5306ea53, PacketNumber: 8, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, DelayTime: 0s} 2025/04/30 11:11:27 server <- Reading packet 9 (77 bytes) for connection 5306ea53, Handshake 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: 5306ea53, SrcConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:27 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 16µs} 2025/04/30 11:11:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:27 Retiring connection ID a1b2d9d7ad7705ba in 5s. 2025/04/30 11:11:27 server Dropping Handshake keys. 2025/04/30 11:11:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:27 server -> Sending packet 2 (320 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.NewTokenFrame{Token: 0xf8e145e1d2a5b46098f18e8a442c0fd99df15be03c4d9c508646ebc25706d8c6d603e34b520fd27c264d4314172ee00703349565111cd8c4d854093b1729121745fb18f93bffa43172841cae25ca4999304318363d63} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9600445f, StatelessResetToken: 0x306798062c774a6b853f1b793087eb19} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f430a64f, StatelessResetToken: 0x84b9a074e57b436300dbbecbf9b53d4d} 2025/04/30 11:11:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 927bd646, StatelessResetToken: 0x6a626ca8cc2b7f3fec9f35431593134a} 2025/04/30 11:11:27 server -> Sending packet 3 (320 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f430a64f, StatelessResetToken: 0x84b9a074e57b436300dbbecbf9b53d4d} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9600445f, StatelessResetToken: 0x306798062c774a6b853f1b793087eb19} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 927bd646, StatelessResetToken: 0x6a626ca8cc2b7f3fec9f35431593134a} 2025/04/30 11:11:27 server -> &wire.NewTokenFrame{Token: 0xf8e145e1d2a5b46098f18e8a442c0fd99df15be03c4d9c508646ebc25706d8c6d603e34b520fd27c264d4314172ee00703349565111cd8c4d854093b1729121745fb18f93bffa43172841cae25ca4999304318363d63} 2025/04/30 11:11:27 server -> Sending packet 4 (1366 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.PingFrame{} 2025/04/30 11:11:27 server <- Reading packet 10 (1252 bytes) for connection 5306ea53, 1-RTT 2025/04/30 11:11:27 server Short Header{DestConnectionID: 5306ea53, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:27 server -> Sending packet 5 (24 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 Received request: GET /jsjcfsjkbs 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 101.408µs} 2025/04/30 11:11:27 server -> Sending packet 6 (1045 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:27 server <- Reading packet 11 (33 bytes) for connection 5306ea53, 1-RTT 2025/04/30 11:11:27 server Short Header{DestConnectionID: 5306ea53, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:27 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:27 server newly acked packets (1): [3] 2025/04/30 11:11:27 server updated RTT: 31.320344ms (σ: 15.660172ms) 2025/04/30 11:11:27 server ECN capability confirmed. 2025/04/30 11:11:27 server <- Reading packet 12 (1332 bytes) for connection 5306ea53, 1-RTT 2025/04/30 11:11:27 server Short Header{DestConnectionID: 5306ea53, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:27 server <- Reading packet 13 (34 bytes) for connection 5306ea53, 1-RTT 2025/04/30 11:11:27 server Short Header{DestConnectionID: 5306ea53, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:27 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 25.088ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:27 server newly acked packets (1): [4] 2025/04/30 11:11:27 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:27 server -> Sending packet 7 (25 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 10, DelayTime: 1.09395ms} 2025/04/30 11:11:27 server <- Reading packet 14 (1412 bytes) for connection 5306ea53, 1-RTT 2025/04/30 11:11:27 server Short Header{DestConnectionID: 5306ea53, PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:27 server <- &wire.PingFrame{} 2025/04/30 11:11:27 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:27 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:27 server -> Sending packet 8 (25 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 10, DelayTime: 25.363358ms} 2025/04/30 11:11:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:27 server -> Sending packet 10 (1045 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:27 server -> Sending packet 11 (1045 bytes) for connection a1b2d9d7ad7705ba, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:27 server <- Reading packet 15 (40 bytes) for connection 5306ea53, 1-RTT 2025/04/30 11:11:27 server Short Header{DestConnectionID: 5306ea53, PacketNumber: 15, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:27 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:11:27 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:27 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:27 server <- Reading packet 16 (28 bytes) for connection 5306ea53, 1-RTT 2025/04/30 11:11:27 server Short Header{DestConnectionID: 5306ea53, PacketNumber: 16, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:27 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:27 Replacing connection for connection IDs [927bd646 9600445f 5306ea53 f430a64f] with a closed connection. 2025/04/30 11:11:27 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:27 server Connection a1b2d9d7ad7705ba closed. 2025/04/30 11:11:27 server <- Received Initial packet. 2025/04/30 11:11:27 Created qlog file: /logs/qlog/131dac628364b1b3.sqlog 2025/04/30 11:11:27 server Changing connection ID to e944f4fe. 2025/04/30 11:11:27 Adding connection IDs 131dac628364b1b3 and e944f4fe for a new connection. 2025/04/30 11:11:27 server <- Reading packet 0 (1220 bytes) for connection 131dac628364b1b3, Initial 2025/04/30 11:11:27 server Long Header{Type: Initial, DestConnectionID: 131dac628364b1b3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:27 Adding connection ID 7d2cb74e. 2025/04/30 11:11:27 Adding connection ID 40e7ebba. 2025/04/30 11:11:27 Adding connection ID 7da9289a. 2025/04/30 11:11:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 131dac628364b1b3 2025/04/30 11:11:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e944f4fe, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:11:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e944f4fe, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:11:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:11:27 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40e7ebba, StatelessResetToken: 0xb27fed17a3799d984992db3029bb03b4} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7da9289a, StatelessResetToken: 0xfd51ead3aeaebc999b4abca35a83a082} 2025/04/30 11:11:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d2cb74e, StatelessResetToken: 0x8d2931e27fe7b45ef167cc89f0673d6a} 2025/04/30 11:11:28 server <- Reading packet 1 (1220 bytes) for connection 131dac628364b1b3, Initial 2025/04/30 11:11:28 server Long Header{Type: Initial, DestConnectionID: 131dac628364b1b3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:28 server <- &wire.PingFrame{} 2025/04/30 11:11:28 server -> Sending packet 1 (37 bytes) for connection 131dac628364b1b3, Initial 2025/04/30 11:11:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e944f4fe, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:28 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:28 server -> Sending packet 2 (1280 bytes) for connection 131dac628364b1b3, Initial 2025/04/30 11:11:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e944f4fe, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:28 server -> Sending packet 3 (1280 bytes) for connection 131dac628364b1b3, Initial 2025/04/30 11:11:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e944f4fe, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:28 server <- Reading packet 2 (1220 bytes) for connection e944f4fe, Initial 2025/04/30 11:11:28 server Long Header{Type: Initial, DestConnectionID: e944f4fe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:11:28 server newly acked packets (1): [3] 2025/04/30 11:11:28 server updated RTT: 33.795497ms (σ: 16.897748ms) 2025/04/30 11:11:28 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:28 server -> Sending packet 1 (741 bytes) for connection 131dac628364b1b3, Handshake 2025/04/30 11:11:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e944f4fe, PacketNumber: 1, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:11:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:11:28 server -> Sending packet 2 (741 bytes) for connection 131dac628364b1b3, Handshake 2025/04/30 11:11:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e944f4fe, PacketNumber: 2, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:11:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:11:28 server <- Reading packet 3 (77 bytes) for connection e944f4fe, Handshake 2025/04/30 11:11:28 server Long Header{Type: Handshake, DestConnectionID: e944f4fe, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:28 server Dropping Initial keys. 2025/04/30 11:11:28 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:11:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:28 Retiring connection ID 131dac628364b1b3 in 5s. 2025/04/30 11:11:28 server Dropping Handshake keys. 2025/04/30 11:11:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:28 server -> Sending packet 2 (323 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7da9289a, StatelessResetToken: 0xfd51ead3aeaebc999b4abca35a83a082} 2025/04/30 11:11:28 server -> &wire.NewTokenFrame{Token: 0xdb13a6f1b79859b2a5b3434eb46d07b5dc02a5d12c0740b2671aa82235d95ac81ea5946df61fc65dec72de5d5a2e27f31397ead1538dbaabf5eaace0284f201661132d6bb478a4896bccaee4f12a78b86a14d4f2f810} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40e7ebba, StatelessResetToken: 0xb27fed17a3799d984992db3029bb03b4} 2025/04/30 11:11:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d2cb74e, StatelessResetToken: 0x8d2931e27fe7b45ef167cc89f0673d6a} 2025/04/30 11:11:28 server -> Sending packet 3 (323 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7da9289a, StatelessResetToken: 0xfd51ead3aeaebc999b4abca35a83a082} 2025/04/30 11:11:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:28 server -> &wire.NewTokenFrame{Token: 0xdb13a6f1b79859b2a5b3434eb46d07b5dc02a5d12c0740b2671aa82235d95ac81ea5946df61fc65dec72de5d5a2e27f31397ead1538dbaabf5eaace0284f201661132d6bb478a4896bccaee4f12a78b86a14d4f2f810} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40e7ebba, StatelessResetToken: 0xb27fed17a3799d984992db3029bb03b4} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d2cb74e, StatelessResetToken: 0x8d2931e27fe7b45ef167cc89f0673d6a} 2025/04/30 11:11:28 server <- Reading packet 4 (1220 bytes) for connection e944f4fe, 1-RTT 2025/04/30 11:11:28 server Short Header{DestConnectionID: e944f4fe, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:28 server <- &wire.PingFrame{} 2025/04/30 11:11:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:28 server -> Sending packet 4 (24 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 94.175µs} 2025/04/30 11:11:28 Received request: GET /ygfjayyfne 2025/04/30 11:11:28 server -> Sending packet 5 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:28 server Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:11:28 server <- Reading packet 7 (1252 bytes) for connection e944f4fe, 1-RTT 2025/04/30 11:11:28 server Short Header{DestConnectionID: e944f4fe, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:28 server <- &wire.PingFrame{} 2025/04/30 11:11:28 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:28 server -> Sending packet 6 (26 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 72.725µs} 2025/04/30 11:11:28 server <- Reading packet 8 (1332 bytes) for connection e944f4fe, 1-RTT 2025/04/30 11:11:28 server Short Header{DestConnectionID: e944f4fe, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:28 server <- &wire.PingFrame{} 2025/04/30 11:11:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:28 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:28 server -> Sending packet 7 (27 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 25.26735ms} 2025/04/30 11:11:28 server <- Reading packet 9 (1412 bytes) for connection e944f4fe, 1-RTT 2025/04/30 11:11:28 server Short Header{DestConnectionID: e944f4fe, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:28 server <- &wire.PingFrame{} 2025/04/30 11:11:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:28 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:28 server -> Sending packet 8 (27 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 25.280363ms} 2025/04/30 11:11:28 server <- Reading packet 10 (1452 bytes) for connection e944f4fe, 1-RTT 2025/04/30 11:11:28 server Short Header{DestConnectionID: e944f4fe, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:28 server <- &wire.PingFrame{} 2025/04/30 11:11:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:28 server -> Sending packet 9 (1366 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.PingFrame{} 2025/04/30 11:11:28 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:28 server -> Sending packet 10 (27 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 25.392701ms} 2025/04/30 11:11:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:28 server -> Sending packet 12 (323 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40e7ebba, StatelessResetToken: 0xb27fed17a3799d984992db3029bb03b4} 2025/04/30 11:11:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:28 server -> &wire.NewTokenFrame{Token: 0xdb13a6f1b79859b2a5b3434eb46d07b5dc02a5d12c0740b2671aa82235d95ac81ea5946df61fc65dec72de5d5a2e27f31397ead1538dbaabf5eaace0284f201661132d6bb478a4896bccaee4f12a78b86a14d4f2f810} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7da9289a, StatelessResetToken: 0xfd51ead3aeaebc999b4abca35a83a082} 2025/04/30 11:11:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d2cb74e, StatelessResetToken: 0x8d2931e27fe7b45ef167cc89f0673d6a} 2025/04/30 11:11:28 server Skipping packet number 11 2025/04/30 11:11:28 server -> Sending packet 13 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:28 server <- Reading packet 12 (37 bytes) for connection e944f4fe, 1-RTT 2025/04/30 11:11:28 server Short Header{DestConnectionID: e944f4fe, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:28 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 0s, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 11:11:28 server newly acked packets (2): [9 12] 2025/04/30 11:11:28 server updated RTT: 33.46ms (σ: 13.342ms) 2025/04/30 11:11:28 server ECN capability confirmed. 2025/04/30 11:11:28 server -> Sending packet 14 (1409 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.PingFrame{} 2025/04/30 11:11:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:28 server -> Sending packet 16 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:28 server -> Sending packet 17 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:28 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:29 server -> Sending packet 19 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:29 server -> Sending packet 20 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:29 server <- Received Initial packet. 2025/04/30 11:11:29 Created qlog file: /logs/qlog/8e73b4a5c4a266ca.sqlog 2025/04/30 11:11:29 server Changing connection ID to 140e7c55. 2025/04/30 11:11:29 Adding connection IDs 8e73b4a5c4a266ca and 140e7c55 for a new connection. 2025/04/30 11:11:29 server <- Reading packet 1 (1220 bytes) for connection 8e73b4a5c4a266ca, Initial 2025/04/30 11:11:29 server Long Header{Type: Initial, DestConnectionID: 8e73b4a5c4a266ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:29 Adding connection ID bf77acc4. 2025/04/30 11:11:29 Adding connection ID 5f0681ec. 2025/04/30 11:11:29 Adding connection ID c525d432. 2025/04/30 11:11:29 server <- &wire.PingFrame{} 2025/04/30 11:11:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8e73b4a5c4a266ca 2025/04/30 11:11:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 140e7c55, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:11:29 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 140e7c55, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bf77acc4, StatelessResetToken: 0xdfebe4299425d5e20c5c1ec3c72db1f9} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f0681ec, StatelessResetToken: 0x342f5797d0945f37261b5e1ed5fde479} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c525d432, StatelessResetToken: 0x099b66b7fab5adb54e624e388a2309ef} 2025/04/30 11:11:29 Tracking 32 connection IDs and 0 reset tokens. 2025/04/30 11:11:29 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:29 server -> Sending packet 1 (1280 bytes) for connection 8e73b4a5c4a266ca, Initial 2025/04/30 11:11:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 140e7c55, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:29 server -> Sending packet 2 (1280 bytes) for connection 8e73b4a5c4a266ca, Initial 2025/04/30 11:11:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 140e7c55, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:29 server Canceling loss detection timer. 2025/04/30 11:11:29 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:29 server <- Reading packet 2 (1220 bytes) for connection 140e7c55, Initial 2025/04/30 11:11:29 server Long Header{Type: Initial, DestConnectionID: 140e7c55, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:29 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 792µs} 2025/04/30 11:11:29 server newly acked packets (1): [2] 2025/04/30 11:11:29 server updated RTT: 59.338797ms (σ: 29.669398ms) 2025/04/30 11:11:29 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:29 server -> Sending packet 1 (744 bytes) for connection 8e73b4a5c4a266ca, Handshake 2025/04/30 11:11:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 140e7c55, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:29 server -> Sending packet 2 (744 bytes) for connection 8e73b4a5c4a266ca, Handshake 2025/04/30 11:11:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 140e7c55, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:29 server -> Sending packet 22 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:29 server -> Sending packet 23 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:29 server <- Reading packet 3 (77 bytes) for connection 140e7c55, Handshake 2025/04/30 11:11:29 server Long Header{Type: Handshake, DestConnectionID: 140e7c55, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:29 server Dropping Initial keys. 2025/04/30 11:11:29 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:11:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:29 Retiring connection ID 8e73b4a5c4a266ca in 5s. 2025/04/30 11:11:29 server Dropping Handshake keys. 2025/04/30 11:11:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:29 server -> Sending packet 2 (323 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bf77acc4, StatelessResetToken: 0xdfebe4299425d5e20c5c1ec3c72db1f9} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f0681ec, StatelessResetToken: 0x342f5797d0945f37261b5e1ed5fde479} 2025/04/30 11:11:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:29 server -> &wire.NewTokenFrame{Token: 0x2b783a1743d66e38ab815a146dccb7dc0754ce2710357f5c75c631c95be0d53823b8011348f0ae8588d953f8d06241dec4cd79ce81e4fa88fac87094d4b1a042e98839a05449765daf75dc8909b2579c43b3d0004d9d} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c525d432, StatelessResetToken: 0x099b66b7fab5adb54e624e388a2309ef} 2025/04/30 11:11:29 server -> Sending packet 3 (323 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c525d432, StatelessResetToken: 0x099b66b7fab5adb54e624e388a2309ef} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f0681ec, StatelessResetToken: 0x342f5797d0945f37261b5e1ed5fde479} 2025/04/30 11:11:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bf77acc4, StatelessResetToken: 0xdfebe4299425d5e20c5c1ec3c72db1f9} 2025/04/30 11:11:29 server -> &wire.NewTokenFrame{Token: 0x2b783a1743d66e38ab815a146dccb7dc0754ce2710357f5c75c631c95be0d53823b8011348f0ae8588d953f8d06241dec4cd79ce81e4fa88fac87094d4b1a042e98839a05449765daf75dc8909b2579c43b3d0004d9d} 2025/04/30 11:11:29 server <- Reading packet 4 (1220 bytes) for connection 140e7c55, 1-RTT 2025/04/30 11:11:29 server Short Header{DestConnectionID: 140e7c55, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:29 server <- &wire.PingFrame{} 2025/04/30 11:11:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:29 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:29 server -> Sending packet 4 (24 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 103.152µs} 2025/04/30 11:11:29 Received request: GET /ijmumgqtbw 2025/04/30 11:11:29 server -> Sending packet 5 (1045 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:29 server Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:11:29 server <- Reading packet 6 (1252 bytes) for connection 140e7c55, 1-RTT 2025/04/30 11:11:29 server Short Header{DestConnectionID: 140e7c55, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:29 server <- &wire.PingFrame{} 2025/04/30 11:11:29 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:29 server -> Sending packet 6 (26 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 79.618µs} 2025/04/30 11:11:29 server <- Reading packet 7 (38 bytes) for connection 140e7c55, 1-RTT 2025/04/30 11:11:29 server Short Header{DestConnectionID: 140e7c55, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:29 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:29 server newly acked packets (2): [3 5] 2025/04/30 11:11:29 server updated RTT: 55.864ms (σ: 29.199ms) 2025/04/30 11:11:29 server ECN capability confirmed. 2025/04/30 11:11:29 server Canceling loss detection timer. 2025/04/30 11:11:29 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:29 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:29 server -> Sending packet 7 (29 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 110.174µs} 2025/04/30 11:11:29 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:29 server -> Sending packet 9 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:29 server -> Sending packet 10 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:29 server <- Received Initial packet. 2025/04/30 11:11:29 Created qlog file: /logs/qlog/56539ea53e05d6c7.sqlog 2025/04/30 11:11:29 server Changing connection ID to b4d137e2. 2025/04/30 11:11:29 Adding connection IDs 56539ea53e05d6c7 and b4d137e2 for a new connection. 2025/04/30 11:11:29 server <- Reading packet 0 (1220 bytes) for connection 56539ea53e05d6c7, Initial 2025/04/30 11:11:29 server Long Header{Type: Initial, DestConnectionID: 56539ea53e05d6c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:29 Adding connection ID 542a1b15. 2025/04/30 11:11:29 Adding connection ID 3c64ffde. 2025/04/30 11:11:29 Adding connection ID 709d87cc. 2025/04/30 11:11:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 56539ea53e05d6c7 2025/04/30 11:11:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b4d137e2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 437, Version: v1} 2025/04/30 11:11:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b4d137e2, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 709d87cc, StatelessResetToken: 0xad4a8fa60b32ef6fb0eea793daaaae53} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3c64ffde, StatelessResetToken: 0x285646269c3e73ac5a0677d82ffce647} 2025/04/30 11:11:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 542a1b15, StatelessResetToken: 0x0ec6e2c4e313558230bf79b33f4f5fed} 2025/04/30 11:11:29 server <- Reading packet 1 (77 bytes) for connection b4d137e2, Handshake 2025/04/30 11:11:29 server Long Header{Type: Handshake, DestConnectionID: b4d137e2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:29 server Dropping Initial keys. 2025/04/30 11:11:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:29 server newly acked packets (1): [0] 2025/04/30 11:11:29 server updated RTT: 32.451294ms (σ: 16.225647ms) 2025/04/30 11:11:29 server Canceling loss detection timer. 2025/04/30 11:11:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:29 Retiring connection ID 56539ea53e05d6c7 in 5s. 2025/04/30 11:11:29 server Dropping Handshake keys. 2025/04/30 11:11:29 server -> Sending packet 1 (251 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:29 server -> &wire.NewTokenFrame{Token: 0x4e29eb24c79432374678f8d32b9816f8c9c94a00b9e5e7e0cf8f3f302c93b78cf24fd7b4bd3d61db1d76ef8fead36bbeff00ccc1e7791572d5db7b57506cb69d5fb2bc15f684294c2be38912bb4d98543bca11636d8e} 2025/04/30 11:11:29 server <- Reading packet 2 (1252 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:29 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:29 server <- &wire.PingFrame{} 2025/04/30 11:11:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:29 server newly acked packets (1): [0] 2025/04/30 11:11:29 server updated RTT: 32.571ms (σ: 12.409ms) 2025/04/30 11:11:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:29 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:29 server -> Sending packet 2 (24 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 132.165µs} 2025/04/30 11:11:29 Received request: GET /ohbifzninx 2025/04/30 11:11:29 server -> Sending packet 3 (1045 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:29 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:30 server -> Sending packet 5 (251 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:30 server -> &wire.NewTokenFrame{Token: 0x4e29eb24c79432374678f8d32b9816f8c9c94a00b9e5e7e0cf8f3f302c93b78cf24fd7b4bd3d61db1d76ef8fead36bbeff00ccc1e7791572d5db7b57506cb69d5fb2bc15f684294c2be38912bb4d98543bca11636d8e} 2025/04/30 11:11:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:30 server Skipping packet number 4 2025/04/30 11:11:30 server -> Sending packet 6 (1045 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:30 server <- Reading packet 4 (37 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:30 server newly acked packets (1): [5] 2025/04/30 11:11:30 server updated RTT: 32.372ms (σ: 9.704ms) 2025/04/30 11:11:30 server ECN capability confirmed. 2025/04/30 11:11:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:30 server -> Sending packet 12 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:30 server -> Sending packet 13 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:30 server -> Sending packet 14 (1366 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.PingFrame{} 2025/04/30 11:11:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:30 server -> Sending packet 8 (1045 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:30 server -> Sending packet 9 (1045 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:30 server -> Sending packet 10 (1366 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.PingFrame{} 2025/04/30 11:11:30 server <- Reading packet 6 (39 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:11:30 server <- Reading packet 7 (39 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:11:30 server newly acked packets (2): [9 10] 2025/04/30 11:11:30 server updated RTT: 32.504ms (σ: 7.542ms) 2025/04/30 11:11:30 server Canceling loss detection timer. 2025/04/30 11:11:30 server -> Sending packet 11 (22 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:30 server <- Reading packet 8 (40 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:11:30 server newly acked packets (1): [11] 2025/04/30 11:11:30 server updated RTT: 35.406ms (σ: 11.46ms) 2025/04/30 11:11:30 server Canceling loss detection timer. 2025/04/30 11:11:30 server <- Reading packet 9 (51 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:30 server -> Sending packet 12 (1409 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.PingFrame{} 2025/04/30 11:11:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:30 server -> Sending packet 25 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:30 server -> Sending packet 26 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:30 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:30 server -> Sending packet 13 (29 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25.7881ms} 2025/04/30 11:11:30 server <- Reading packet 10 (40 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 11:11:30 server newly acked packets (1): [12] 2025/04/30 11:11:30 server updated RTT: 34.948ms (σ: 9.509ms) 2025/04/30 11:11:30 server <- Reading packet 11 (51 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:30 server -> Sending packet 14 (1430 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.PingFrame{} 2025/04/30 11:11:30 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:30 server -> Sending packet 15 (29 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25.404481ms} 2025/04/30 11:11:30 server <- Reading packet 12 (41 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 11:11:30 server newly acked packets (1): [14] 2025/04/30 11:11:30 server updated RTT: 34.55ms (σ: 7.927ms) 2025/04/30 11:11:30 server <- Reading packet 13 (38 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.AckFrame{LargestAcked: 15, LowestAcked: 14, DelayTime: 0s, ECT0: 11, ECT1: 0, CE: 0} 2025/04/30 11:11:30 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:30 server -> Sending packet 16 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:30 server -> Sending packet 17 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:30 server <- Reading packet 14 (1332 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.PingFrame{} 2025/04/30 11:11:30 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:11:30 server -> Sending packet 16 (28 bytes) for connection 56539ea53e05d6c7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:30 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:30 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 2, AckRanges: {{Largest: 14, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 66.373µs} 2025/04/30 11:11:30 server <- Reading packet 15 (28 bytes) for connection b4d137e2, 1-RTT 2025/04/30 11:11:30 server Short Header{DestConnectionID: b4d137e2, PacketNumber: 15, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:30 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:30 Replacing connection for connection IDs [b4d137e2 542a1b15 3c64ffde 709d87cc] with a closed connection. 2025/04/30 11:11:30 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:30 server Connection 56539ea53e05d6c7 closed. 2025/04/30 11:11:31 Removing connection ID 96eaaf0fd7235f3b after it has been retired. 2025/04/30 11:11:31 Removing connection IDs [df469498 52dc274a 865604e4 ff005574] for a closed connection after it has been retired. 2025/04/30 11:11:31 Tracking 32 connection IDs and 0 reset tokens. 2025/04/30 11:11:31 server <- Received Initial packet. 2025/04/30 11:11:31 Created qlog file: /logs/qlog/7013b7122b3a5c5e.sqlog 2025/04/30 11:11:31 server Changing connection ID to 432f111c. 2025/04/30 11:11:31 Adding connection IDs 7013b7122b3a5c5e and 432f111c for a new connection. 2025/04/30 11:11:31 server <- Reading packet 0 (1220 bytes) for connection 7013b7122b3a5c5e, Initial 2025/04/30 11:11:31 server Long Header{Type: Initial, DestConnectionID: 7013b7122b3a5c5e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:31 Adding connection ID 18210272. 2025/04/30 11:11:31 Adding connection ID 9880bc01. 2025/04/30 11:11:31 Adding connection ID 13f49bce. 2025/04/30 11:11:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7013b7122b3a5c5e 2025/04/30 11:11:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 432f111c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:11:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 432f111c, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:31 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 18210272, StatelessResetToken: 0xe92d03fb9948bef7837d80bbf7044697} 2025/04/30 11:11:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9880bc01, StatelessResetToken: 0x66d5538a3113f002c369fa90a200f601} 2025/04/30 11:11:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 13f49bce, StatelessResetToken: 0x461a6470122ce322bed5cddf25a82c36} 2025/04/30 11:11:31 server <- Reading packet 1 (77 bytes) for connection 432f111c, Handshake 2025/04/30 11:11:31 server Long Header{Type: Handshake, DestConnectionID: 432f111c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:31 server Dropping Initial keys. 2025/04/30 11:11:31 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:31 server newly acked packets (1): [0] 2025/04/30 11:11:31 server updated RTT: 32.282863ms (σ: 16.141431ms) 2025/04/30 11:11:31 server Canceling loss detection timer. 2025/04/30 11:11:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:31 Retiring connection ID 7013b7122b3a5c5e in 5s. 2025/04/30 11:11:31 server Dropping Handshake keys. 2025/04/30 11:11:31 server -> Sending packet 1 (251 bytes) for connection 7013b7122b3a5c5e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:31 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:31 server -> &wire.NewTokenFrame{Token: 0x7eac8c4bb73adba0cfb8d69ac357cca74b5d9ed2bf63b9ef6c1799d8ea441df9b67467eb9b4721e8624e82ae58de3804bbc4ebfc1a243a82fbfbe9897f7e38d51e9e73e25c5821b9c73917c1acb3a96488f59fdd7b4a} 2025/04/30 11:11:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:31 server <- Reading packet 3 (34 bytes) for connection 432f111c, 1-RTT 2025/04/30 11:11:31 server Short Header{DestConnectionID: 432f111c, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:31 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:31 server newly acked packets (2): [0 1] 2025/04/30 11:11:31 server updated RTT: 35.257ms (σ: 18.056ms) 2025/04/30 11:11:31 server ECN capability confirmed. 2025/04/30 11:11:31 server Canceling loss detection timer. 2025/04/30 11:11:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:32 server -> Sending packet 28 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:32 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:32 server -> Sending packet 29 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:32 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:32 server -> Sending packet 19 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:32 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:32 server -> Sending packet 20 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:32 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:32 Removing connection ID a1b2d9d7ad7705ba after it has been retired. 2025/04/30 11:11:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:32 server -> Sending packet 25 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:32 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:32 server -> Sending packet 26 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:32 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:32 Removing connection IDs [927bd646 9600445f 5306ea53 f430a64f] for a closed connection after it has been retired. 2025/04/30 11:11:33 Removing connection ID 131dac628364b1b3 after it has been retired. 2025/04/30 11:11:33 server <- Reading packet 7 (1220 bytes) for connection 432f111c, 1-RTT 2025/04/30 11:11:33 server Short Header{DestConnectionID: 432f111c, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:33 server <- &wire.PingFrame{} 2025/04/30 11:11:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:33 server -> Sending packet 2 (1366 bytes) for connection 7013b7122b3a5c5e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.PingFrame{} 2025/04/30 11:11:33 server -> Sending packet 3 (26 bytes) for connection 7013b7122b3a5c5e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 189.922µs} 2025/04/30 11:11:33 Received request: GET /ojpzywzhgo 2025/04/30 11:11:33 server -> Sending packet 4 (1045 bytes) for connection 7013b7122b3a5c5e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:33 Tracking 31 connection IDs and 0 reset tokens. 2025/04/30 11:11:33 server <- Reading packet 8 (40 bytes) for connection 432f111c, 1-RTT 2025/04/30 11:11:33 server Short Header{DestConnectionID: 432f111c, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:33 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:33 server newly acked packets (2): [2 4] 2025/04/30 11:11:33 server updated RTT: 34.923ms (σ: 14.208ms) 2025/04/30 11:11:33 server Canceling loss detection timer. 2025/04/30 11:11:33 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:33 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:33 server -> Sending packet 5 (29 bytes) for connection 7013b7122b3a5c5e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 93.423µs} 2025/04/30 11:11:33 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:33 server <- Reading packet 10 (28 bytes) for connection 432f111c, 1-RTT 2025/04/30 11:11:33 server Short Header{DestConnectionID: 432f111c, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:33 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:33 Replacing connection for connection IDs [13f49bce 432f111c 18210272 9880bc01] with a closed connection. 2025/04/30 11:11:33 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:33 server Connection 7013b7122b3a5c5e closed. 2025/04/30 11:11:33 server <- Received Initial packet. 2025/04/30 11:11:33 Created qlog file: /logs/qlog/6795ba8f754955b8.sqlog 2025/04/30 11:11:33 server Changing connection ID to cf5ff60a. 2025/04/30 11:11:33 Adding connection IDs 6795ba8f754955b8 and cf5ff60a for a new connection. 2025/04/30 11:11:33 server <- Reading packet 0 (1220 bytes) for connection 6795ba8f754955b8, Initial 2025/04/30 11:11:33 server Long Header{Type: Initial, DestConnectionID: 6795ba8f754955b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:33 Adding connection ID 08ebac40. 2025/04/30 11:11:33 Adding connection ID 49e23f40. 2025/04/30 11:11:33 Adding connection ID c778402a. 2025/04/30 11:11:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6795ba8f754955b8 2025/04/30 11:11:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cf5ff60a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:11:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cf5ff60a, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:11:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 49e23f40, StatelessResetToken: 0xf4bb3156dd21adfd5805c4f5e3e8f725} 2025/04/30 11:11:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08ebac40, StatelessResetToken: 0x2c1b62d0326c8786537c0a3407cf4993} 2025/04/30 11:11:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c778402a, StatelessResetToken: 0x277a82a976522096f9477e9aeaa6d8f0} 2025/04/30 11:11:33 server <- Reading packet 1 (77 bytes) for connection cf5ff60a, Handshake 2025/04/30 11:11:33 server Long Header{Type: Handshake, DestConnectionID: cf5ff60a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:33 server Dropping Initial keys. 2025/04/30 11:11:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:33 server newly acked packets (1): [0] 2025/04/30 11:11:33 server updated RTT: 32.467001ms (σ: 16.2335ms) 2025/04/30 11:11:33 server Canceling loss detection timer. 2025/04/30 11:11:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:33 Retiring connection ID 6795ba8f754955b8 in 5s. 2025/04/30 11:11:33 server Dropping Handshake keys. 2025/04/30 11:11:33 server -> Sending packet 1 (251 bytes) for connection 6795ba8f754955b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:33 server -> &wire.NewTokenFrame{Token: 0xea02de94e5c8883866bd750210320d4cce587b459e9626fe46fb158898ab88b1545c745342176ee25dc82184105f0b90493f3c13cd74bea8ceda6abb45d34b625caef10529a618d213ee0cf89f3745303e9bb1e44967} 2025/04/30 11:11:33 server <- Reading packet 2 (1252 bytes) for connection cf5ff60a, 1-RTT 2025/04/30 11:11:33 server Short Header{DestConnectionID: cf5ff60a, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:33 server <- &wire.PingFrame{} 2025/04/30 11:11:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:33 server newly acked packets (1): [0] 2025/04/30 11:11:33 server updated RTT: 32.586ms (σ: 12.414ms) 2025/04/30 11:11:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:33 server -> Sending packet 2 (24 bytes) for connection 6795ba8f754955b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 105.065µs} 2025/04/30 11:11:33 Received request: GET /qavxywfuvy 2025/04/30 11:11:33 server -> Sending packet 3 (1045 bytes) for connection 6795ba8f754955b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:33 server <- Reading packet 3 (34 bytes) for connection cf5ff60a, 1-RTT 2025/04/30 11:11:33 server Short Header{DestConnectionID: cf5ff60a, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:33 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:33 server newly acked packets (1): [1] 2025/04/30 11:11:33 server updated RTT: 35.519ms (σ: 15.177ms) 2025/04/30 11:11:33 server ECN capability confirmed. 2025/04/30 11:11:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:33 server -> Sending packet 5 (1045 bytes) for connection 6795ba8f754955b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:33 server -> Sending packet 6 (1045 bytes) for connection 6795ba8f754955b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:33 server <- Reading packet 5 (40 bytes) for connection cf5ff60a, 1-RTT 2025/04/30 11:11:33 server Short Header{DestConnectionID: cf5ff60a, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:33 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:33 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:33 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:33 server -> Sending packet 7 (26 bytes) for connection 6795ba8f754955b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:33 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:33 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 77.724µs} 2025/04/30 11:11:33 server <- Reading packet 7 (1332 bytes) for connection cf5ff60a, 1-RTT 2025/04/30 11:11:33 server Short Header{DestConnectionID: cf5ff60a, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:33 server <- &wire.PingFrame{} 2025/04/30 11:11:33 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:33 server <- Reading packet 8 (28 bytes) for connection cf5ff60a, 1-RTT 2025/04/30 11:11:33 server Short Header{DestConnectionID: cf5ff60a, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:33 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:33 Replacing connection for connection IDs [08ebac40 49e23f40 c778402a cf5ff60a] with a closed connection. 2025/04/30 11:11:33 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:33 server Connection 6795ba8f754955b8 closed. 2025/04/30 11:11:34 server <- Received Initial packet. 2025/04/30 11:11:34 Created qlog file: /logs/qlog/19802d619642251f.sqlog 2025/04/30 11:11:34 server Changing connection ID to 89de9b2a. 2025/04/30 11:11:34 Adding connection IDs 19802d619642251f and 89de9b2a for a new connection. 2025/04/30 11:11:34 server <- Reading packet 0 (1220 bytes) for connection 19802d619642251f, Initial 2025/04/30 11:11:34 server Long Header{Type: Initial, DestConnectionID: 19802d619642251f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:34 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:34 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:34 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:34 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:34 Adding connection ID b9c65b78. 2025/04/30 11:11:34 Adding connection ID 2774ccb8. 2025/04/30 11:11:34 Adding connection ID 3af78838. 2025/04/30 11:11:34 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 19802d619642251f 2025/04/30 11:11:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 89de9b2a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:11:34 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:34 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 89de9b2a, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:11:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b9c65b78, StatelessResetToken: 0x4fd54b8e9e0b919ae0811e3e24c5efa6} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2774ccb8, StatelessResetToken: 0x21549d03294136f5c24e70c1d5bd34dc} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3af78838, StatelessResetToken: 0x75d75e066a7c44d2a976e75cfa291ac5} 2025/04/30 11:11:34 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:34 server -> Sending packet 1 (1280 bytes) for connection 19802d619642251f, Initial 2025/04/30 11:11:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 89de9b2a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:34 server -> Sending packet 2 (1280 bytes) for connection 19802d619642251f, Initial 2025/04/30 11:11:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 89de9b2a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:34 server Canceling loss detection timer. 2025/04/30 11:11:34 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:34 Removing connection ID 8e73b4a5c4a266ca after it has been retired. 2025/04/30 11:11:34 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:34 server <- Reading packet 5 (72 bytes) for connection 89de9b2a, Handshake 2025/04/30 11:11:34 server Long Header{Type: Handshake, DestConnectionID: 89de9b2a, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:34 server Dropping Initial keys. 2025/04/30 11:11:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:34 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:34 Retiring connection ID 19802d619642251f in 5s. 2025/04/30 11:11:34 server Dropping Handshake keys. 2025/04/30 11:11:34 server <- Reading packet 6 (1148 bytes) for connection 89de9b2a, 1-RTT 2025/04/30 11:11:34 server Short Header{DestConnectionID: 89de9b2a, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:34 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:34 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:34 server -> Sending packet 2 (325 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 361.191µs} 2025/04/30 11:11:34 server -> &wire.NewTokenFrame{Token: 0x974ebb7a678f8e1dc88b32660ad7c89f87c2f24a858fb293c2be3ad7c8a94b232d9e93cb29ff1f87181b6c833930dfafcd674af9396fde113183bc944e77b31fed8aa33e85e1ac8b32ce4d2096c40432b21375406a0c} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b9c65b78, StatelessResetToken: 0x4fd54b8e9e0b919ae0811e3e24c5efa6} 2025/04/30 11:11:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2774ccb8, StatelessResetToken: 0x21549d03294136f5c24e70c1d5bd34dc} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3af78838, StatelessResetToken: 0x75d75e066a7c44d2a976e75cfa291ac5} 2025/04/30 11:11:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:34 server -> Sending packet 3 (320 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.NewTokenFrame{Token: 0x974ebb7a678f8e1dc88b32660ad7c89f87c2f24a858fb293c2be3ad7c8a94b232d9e93cb29ff1f87181b6c833930dfafcd674af9396fde113183bc944e77b31fed8aa33e85e1ac8b32ce4d2096c40432b21375406a0c} 2025/04/30 11:11:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3af78838, StatelessResetToken: 0x75d75e066a7c44d2a976e75cfa291ac5} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2774ccb8, StatelessResetToken: 0x21549d03294136f5c24e70c1d5bd34dc} 2025/04/30 11:11:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b9c65b78, StatelessResetToken: 0x4fd54b8e9e0b919ae0811e3e24c5efa6} 2025/04/30 11:11:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:34 server -> Sending packet 4 (1366 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 Received request: GET /dcyzqnnoey 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.PingFrame{} 2025/04/30 11:11:34 server -> Sending packet 5 (1045 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:34 server <- Reading packet 7 (35 bytes) for connection 89de9b2a, 1-RTT 2025/04/30 11:11:34 server Short Header{DestConnectionID: 89de9b2a, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:34 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:34 server newly acked packets (1): [3] 2025/04/30 11:11:34 server updated RTT: 31.476443ms (σ: 15.738221ms) 2025/04/30 11:11:34 server ECN capability confirmed. 2025/04/30 11:11:34 server <- Reading packet 8 (42 bytes) for connection 89de9b2a, 1-RTT 2025/04/30 11:11:34 server Short Header{DestConnectionID: 89de9b2a, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:34 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:34 server newly acked packets (1): [5] 2025/04/30 11:11:34 server updated RTT: 31.674ms (σ: 12.201ms) 2025/04/30 11:11:34 server setting loss timer for packet 4 (1-RTT) to 37.200067ms (in 2025-04-30 11:11:34.674029966 +0000 UTC m=+29.426243159) 2025/04/30 11:11:34 server Canceling loss detection timer. 2025/04/30 11:11:34 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:34 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:34 server -> Sending packet 6 (27 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 99.946µs} 2025/04/30 11:11:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:34 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:11:34.674029966 +0000 UTC m=+29.426243159 2025/04/30 11:11:34 server lost packet 4 (time threshold) 2025/04/30 11:11:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:34 server -> Sending packet 8 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:34 server -> Sending packet 9 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:34 Removing connection ID 56539ea53e05d6c7 after it has been retired. 2025/04/30 11:11:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:34 server -> Sending packet 11 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:34 server -> Sending packet 12 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:34 server -> Sending packet 13 (1323 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:34 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:34 server -> &wire.PingFrame{} 2025/04/30 11:11:35 server Destroying connection: timeout: no recent network activity 2025/04/30 11:11:35 Removing connection ID 24703ef2. 2025/04/30 11:11:35 Removing connection ID 1a163569. 2025/04/30 11:11:35 Removing connection ID c91e9c9a. 2025/04/30 11:11:35 Removing connection ID 6f87fc78. 2025/04/30 11:11:35 Error accepting stream: timeout: no recent network activity 2025/04/30 11:11:35 server Connection 04cf55dbeffa4a14 closed. 2025/04/30 11:11:35 server <- Received Initial packet. 2025/04/30 11:11:35 Created qlog file: /logs/qlog/32fc7b1881048ae1.sqlog 2025/04/30 11:11:35 server Changing connection ID to 6574a15d. 2025/04/30 11:11:35 Adding connection IDs 32fc7b1881048ae1 and 6574a15d for a new connection. 2025/04/30 11:11:35 server <- Reading packet 0 (1220 bytes) for connection 32fc7b1881048ae1, Initial 2025/04/30 11:11:35 server Long Header{Type: Initial, DestConnectionID: 32fc7b1881048ae1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:35 Adding connection ID 2cdfdb06. 2025/04/30 11:11:35 Adding connection ID cd44df6c. 2025/04/30 11:11:35 Adding connection ID 8e421af0. 2025/04/30 11:11:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 32fc7b1881048ae1 2025/04/30 11:11:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6574a15d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:11:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6574a15d, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:11:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8e421af0, StatelessResetToken: 0xf10edae7d34c31939c1017b2fc63b933} 2025/04/30 11:11:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2cdfdb06, StatelessResetToken: 0x23f743554d5e46ccf2abe85328d9401f} 2025/04/30 11:11:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cd44df6c, StatelessResetToken: 0x6f195d55941937b2c196f5511fc76a10} 2025/04/30 11:11:35 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:35 server <- Reading packet 3 (72 bytes) for connection 6574a15d, Handshake 2025/04/30 11:11:35 server Long Header{Type: Handshake, DestConnectionID: 6574a15d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:35 server Dropping Initial keys. 2025/04/30 11:11:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:35 Retiring connection ID 32fc7b1881048ae1 in 5s. 2025/04/30 11:11:35 server Dropping Handshake keys. 2025/04/30 11:11:35 server <- Reading packet 4 (1148 bytes) for connection 6574a15d, 1-RTT 2025/04/30 11:11:35 server Short Header{DestConnectionID: 6574a15d, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:35 server -> Sending packet 1 (1366 bytes) for connection 32fc7b1881048ae1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.PingFrame{} 2025/04/30 11:11:35 server -> Sending packet 2 (253 bytes) for connection 32fc7b1881048ae1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 Received request: GET /dvbgjtwrxj 2025/04/30 11:11:35 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 368.276µs} 2025/04/30 11:11:35 server -> &wire.NewTokenFrame{Token: 0x6c8d86bcb1953768415b630ffb8e0363077f40809517b9c89cc16e6223eec64c5994ac053d3fbbf884bb4510e359ca968abfd4688e9f6d9a76023740d86a5d3c90ca8f406e4abde418181db59384726ed2a2035e6331} 2025/04/30 11:11:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:35 server -> Sending packet 3 (1045 bytes) for connection 32fc7b1881048ae1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:35 Tracking 40 connection IDs and 0 reset tokens. 2025/04/30 11:11:35 server <- Reading packet 6 (36 bytes) for connection 6574a15d, 1-RTT 2025/04/30 11:11:35 server Short Header{DestConnectionID: 6574a15d, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:35 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 256µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:35 server newly acked packets (4): [0 1 2 3] 2025/04/30 11:11:35 server updated RTT: 33.046708ms (σ: 16.523354ms) 2025/04/30 11:11:35 server ECN capability confirmed. 2025/04/30 11:11:35 server Canceling loss detection timer. 2025/04/30 11:11:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:35 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:35 Replacing connection for connection IDs [6574a15d 2cdfdb06 cd44df6c 8e421af0] with a closed connection. 2025/04/30 11:11:35 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:35 server Connection 32fc7b1881048ae1 closed. 2025/04/30 11:11:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:35 server -> Sending packet 15 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:35 server -> Sending packet 16 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:35 server Skipping packet number 22 2025/04/30 11:11:35 server -> Sending packet 23 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:35 server -> Sending packet 24 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:35 server <- Received Initial packet. 2025/04/30 11:11:35 Created qlog file: /logs/qlog/f8f6dc75fd1873b9.sqlog 2025/04/30 11:11:35 server Changing connection ID to 6277ee25. 2025/04/30 11:11:35 Adding connection IDs f8f6dc75fd1873b9 and 6277ee25 for a new connection. 2025/04/30 11:11:35 server <- Reading packet 1 (1220 bytes) for connection f8f6dc75fd1873b9, Initial 2025/04/30 11:11:35 server Long Header{Type: Initial, DestConnectionID: f8f6dc75fd1873b9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:35 Adding connection ID 23a0824a. 2025/04/30 11:11:35 Adding connection ID 9b17eca6. 2025/04/30 11:11:35 Adding connection ID c294fcc8. 2025/04/30 11:11:35 server <- &wire.PingFrame{} 2025/04/30 11:11:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f8f6dc75fd1873b9 2025/04/30 11:11:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6277ee25, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 428, Version: v1} 2025/04/30 11:11:35 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6277ee25, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 11:11:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23a0824a, StatelessResetToken: 0xeb365efe659ff354a9f4bc95ab1f2830} 2025/04/30 11:11:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c294fcc8, StatelessResetToken: 0x3d575b65e5fea6a68e18a9f72a18509c} 2025/04/30 11:11:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b17eca6, StatelessResetToken: 0xf87ecc2b9bda9a070c60705700ef6dbd} 2025/04/30 11:11:35 server <- Reading packet 2 (77 bytes) for connection 6277ee25, Handshake 2025/04/30 11:11:35 server Long Header{Type: Handshake, DestConnectionID: 6277ee25, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:35 server Dropping Initial keys. 2025/04/30 11:11:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:35 server newly acked packets (1): [0] 2025/04/30 11:11:35 server updated RTT: 32.50876ms (σ: 16.25438ms) 2025/04/30 11:11:35 server Canceling loss detection timer. 2025/04/30 11:11:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:35 Retiring connection ID f8f6dc75fd1873b9 in 5s. 2025/04/30 11:11:35 server Dropping Handshake keys. 2025/04/30 11:11:35 server -> Sending packet 1 (251 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:35 server -> &wire.NewTokenFrame{Token: 0xa7d95433372225d056b684dd4c1776c1375cfe19b36f0d6b1c5e235c10272f78d461c7f41eee2d32094b4a47b25e5dfc1f795c40117d4db456d6b41fddc8cad393e4b0691fb1d2045a32e3cd701a81e35e29f394ebbc} 2025/04/30 11:11:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:35 server <- Reading packet 3 (1252 bytes) for connection 6277ee25, 1-RTT 2025/04/30 11:11:35 server Short Header{DestConnectionID: 6277ee25, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:35 server <- &wire.PingFrame{} 2025/04/30 11:11:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:35 server newly acked packets (1): [0] 2025/04/30 11:11:35 server updated RTT: 32.632ms (σ: 12.439ms) 2025/04/30 11:11:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:35 server -> Sending packet 2 (24 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 100.186µs} 2025/04/30 11:11:35 Received request: GET /mccdrlooth 2025/04/30 11:11:35 server -> Sending packet 3 (1045 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:35 server -> Sending packet 31 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:35 server -> Sending packet 32 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:35 server <- Reading packet 4 (1332 bytes) for connection 6277ee25, 1-RTT 2025/04/30 11:11:35 server Short Header{DestConnectionID: 6277ee25, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:35 server <- &wire.PingFrame{} 2025/04/30 11:11:35 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:35 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:35 server -> Sending packet 4 (25 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.287874ms} 2025/04/30 11:11:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:35 server -> Sending packet 6 (251 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:35 server -> &wire.NewTokenFrame{Token: 0xa7d95433372225d056b684dd4c1776c1375cfe19b36f0d6b1c5e235c10272f78d461c7f41eee2d32094b4a47b25e5dfc1f795c40117d4db456d6b41fddc8cad393e4b0691fb1d2045a32e3cd701a81e35e29f394ebbc} 2025/04/30 11:11:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:35 server Skipping packet number 5 2025/04/30 11:11:35 server -> Sending packet 7 (1045 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:35 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:35 Removing connection IDs [b4d137e2 542a1b15 3c64ffde 709d87cc] for a closed connection after it has been retired. 2025/04/30 11:11:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:36 server -> Sending packet 9 (251 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:36 server -> &wire.NewTokenFrame{Token: 0xa7d95433372225d056b684dd4c1776c1375cfe19b36f0d6b1c5e235c10272f78d461c7f41eee2d32094b4a47b25e5dfc1f795c40117d4db456d6b41fddc8cad393e4b0691fb1d2045a32e3cd701a81e35e29f394ebbc} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:36 server Skipping packet number 8 2025/04/30 11:11:36 server -> Sending packet 10 (1045 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:36 server -> Sending packet 11 (1366 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.PingFrame{} 2025/04/30 11:11:36 server <- Received Initial packet. 2025/04/30 11:11:36 Created qlog file: /logs/qlog/4c416c748fbb55a5.sqlog 2025/04/30 11:11:36 server Changing connection ID to 071da340. 2025/04/30 11:11:36 Adding connection IDs 4c416c748fbb55a5 and 071da340 for a new connection. 2025/04/30 11:11:36 server <- Reading packet 0 (1220 bytes) for connection 4c416c748fbb55a5, Initial 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: 4c416c748fbb55a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:36 Adding connection ID fe60e8c7. 2025/04/30 11:11:36 Adding connection ID f47c6d8e. 2025/04/30 11:11:36 Adding connection ID d0ad685c. 2025/04/30 11:11:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4c416c748fbb55a5 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 071da340, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 440, Version: v1} 2025/04/30 11:11:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 071da340, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f47c6d8e, StatelessResetToken: 0x2af2c85bf630b389e35dd4b7e2906362} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fe60e8c7, StatelessResetToken: 0x93fd23e1fc6c1adf49d0ecf05b610991} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d0ad685c, StatelessResetToken: 0xd42f55ac578d424b052861d2d669aefe} 2025/04/30 11:11:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:36 server -> Sending packet 18 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:36 server -> Sending packet 19 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:36 server <- Reading packet 1 (1220 bytes) for connection 4c416c748fbb55a5, Initial 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: 4c416c748fbb55a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:36 server <- &wire.PingFrame{} 2025/04/30 11:11:36 server -> Sending packet 1 (37 bytes) for connection 4c416c748fbb55a5, Initial 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 071da340, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:36 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:36 Removing connection ID 7013b7122b3a5c5e after it has been retired. 2025/04/30 11:11:36 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:36 server -> Sending packet 2 (1280 bytes) for connection 4c416c748fbb55a5, Initial 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 071da340, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:36 server -> Sending packet 3 (1280 bytes) for connection 4c416c748fbb55a5, Initial 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 071da340, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:36 server <- Reading packet 2 (1220 bytes) for connection 071da340, Initial 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: 071da340, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:36 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:36 server newly acked packets (1): [3] 2025/04/30 11:11:36 server updated RTT: 33.657313ms (σ: 16.828656ms) 2025/04/30 11:11:36 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:36 server -> Sending packet 1 (735 bytes) for connection 4c416c748fbb55a5, Handshake 2025/04/30 11:11:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 071da340, PacketNumber: 1, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:11:36 server -> Sending packet 2 (735 bytes) for connection 4c416c748fbb55a5, Handshake 2025/04/30 11:11:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 071da340, PacketNumber: 2, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:11:36 server <- Reading packet 3 (1220 bytes) for connection 071da340, Handshake 2025/04/30 11:11:36 server Long Header{Type: Handshake, DestConnectionID: 071da340, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:36 server Dropping Initial keys. 2025/04/30 11:11:36 server <- &wire.PingFrame{} 2025/04/30 11:11:36 server -> Sending packet 3 (36 bytes) for connection 4c416c748fbb55a5, Handshake 2025/04/30 11:11:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 071da340, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:36 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:11:36 server <- Reading packet 4 (77 bytes) for connection 071da340, Handshake 2025/04/30 11:11:36 server Long Header{Type: Handshake, DestConnectionID: 071da340, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:36 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 16µs} 2025/04/30 11:11:36 server newly acked packets (1): [2] 2025/04/30 11:11:36 server updated RTT: 33.501ms (σ: 12.931ms) 2025/04/30 11:11:36 server Canceling loss detection timer. 2025/04/30 11:11:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:36 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:36 Retiring connection ID 4c416c748fbb55a5 in 5s. 2025/04/30 11:11:36 server Dropping Handshake keys. 2025/04/30 11:11:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:36 server -> Sending packet 2 (323 bytes) for connection 4c416c748fbb55a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f47c6d8e, StatelessResetToken: 0x2af2c85bf630b389e35dd4b7e2906362} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d0ad685c, StatelessResetToken: 0xd42f55ac578d424b052861d2d669aefe} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fe60e8c7, StatelessResetToken: 0x93fd23e1fc6c1adf49d0ecf05b610991} 2025/04/30 11:11:36 server -> &wire.NewTokenFrame{Token: 0x660dcd244cd642ce45d254fe0b53ff31d7fe8ef79ed6b1bb30775e61678db1e57b7e0e1f3f3f078f85bbc123e560fffd955fed7d95124f769fb05f289ba612a04cf4e9cd939659f30be92d124c87e98f8891c2c71573} 2025/04/30 11:11:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:36 server -> Sending packet 3 (323 bytes) for connection 4c416c748fbb55a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fe60e8c7, StatelessResetToken: 0x93fd23e1fc6c1adf49d0ecf05b610991} 2025/04/30 11:11:36 server -> &wire.NewTokenFrame{Token: 0x660dcd244cd642ce45d254fe0b53ff31d7fe8ef79ed6b1bb30775e61678db1e57b7e0e1f3f3f078f85bbc123e560fffd955fed7d95124f769fb05f289ba612a04cf4e9cd939659f30be92d124c87e98f8891c2c71573} 2025/04/30 11:11:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d0ad685c, StatelessResetToken: 0xd42f55ac578d424b052861d2d669aefe} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f47c6d8e, StatelessResetToken: 0x2af2c85bf630b389e35dd4b7e2906362} 2025/04/30 11:11:36 server <- Reading packet 5 (1252 bytes) for connection 071da340, 1-RTT 2025/04/30 11:11:36 server Short Header{DestConnectionID: 071da340, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:36 server <- &wire.PingFrame{} 2025/04/30 11:11:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:36 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:36 server -> Sending packet 4 (24 bytes) for connection 4c416c748fbb55a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 90.919µs} 2025/04/30 11:11:36 Received request: GET /pxayrwdead 2025/04/30 11:11:36 server -> Sending packet 5 (1045 bytes) for connection 4c416c748fbb55a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:36 server <- Reading packet 7 (40 bytes) for connection 071da340, 1-RTT 2025/04/30 11:11:36 server Short Header{DestConnectionID: 071da340, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:36 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:36 server newly acked packets (2): [3 5] 2025/04/30 11:11:36 server updated RTT: 33.256ms (σ: 10.186ms) 2025/04/30 11:11:36 server ECN capability confirmed. 2025/04/30 11:11:36 server Canceling loss detection timer. 2025/04/30 11:11:36 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:36 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:36 server -> Sending packet 6 (29 bytes) for connection 4c416c748fbb55a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 151.051µs} 2025/04/30 11:11:36 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:36 server <- Reading packet 8 (1332 bytes) for connection 071da340, 1-RTT 2025/04/30 11:11:36 server Short Header{DestConnectionID: 071da340, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:36 server <- &wire.PingFrame{} 2025/04/30 11:11:36 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:36 server <- Reading packet 9 (36 bytes) for connection 071da340, 1-RTT 2025/04/30 11:11:36 server Short Header{DestConnectionID: 071da340, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:36 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:36 server newly acked packets (1): [6] 2025/04/30 11:11:36 server updated RTT: 33.066ms (σ: 8.018ms) 2025/04/30 11:11:36 server Canceling loss detection timer. 2025/04/30 11:11:36 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:36 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:36 Replacing connection for connection IDs [071da340 fe60e8c7 f47c6d8e d0ad685c] with a closed connection. 2025/04/30 11:11:36 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:36 server Connection 4c416c748fbb55a5 closed. 2025/04/30 11:11:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:36 server -> Sending packet 13 (251 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:36 server -> &wire.NewTokenFrame{Token: 0xa7d95433372225d056b684dd4c1776c1375cfe19b36f0d6b1c5e235c10272f78d461c7f41eee2d32094b4a47b25e5dfc1f795c40117d4db456d6b41fddc8cad393e4b0691fb1d2045a32e3cd701a81e35e29f394ebbc} 2025/04/30 11:11:36 server Skipping packet number 12 2025/04/30 11:11:36 server -> Sending packet 14 (1045 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:36 server <- Received Initial packet. 2025/04/30 11:11:36 Created qlog file: /logs/qlog/520482229c69dff6.sqlog 2025/04/30 11:11:36 server Changing connection ID to f097710c. 2025/04/30 11:11:36 Adding connection IDs 520482229c69dff6 and f097710c for a new connection. 2025/04/30 11:11:36 server <- Reading packet 0 (1220 bytes) for connection 520482229c69dff6, Initial 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: 520482229c69dff6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:36 Adding connection ID 5c79c965. 2025/04/30 11:11:36 Adding connection ID faed28c1. 2025/04/30 11:11:36 Adding connection ID d7dae2f2. 2025/04/30 11:11:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 520482229c69dff6 2025/04/30 11:11:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f097710c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 441, Version: v1} 2025/04/30 11:11:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f097710c, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:11:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:11:36 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5c79c965, StatelessResetToken: 0x929327ddecfbf28b47e7ce9283198f8c} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d7dae2f2, StatelessResetToken: 0x4a10caceed84919fe8a2bd0fa35588ce} 2025/04/30 11:11:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: faed28c1, StatelessResetToken: 0x5042e9191d664dc70f49728fbc655efd} 2025/04/30 11:11:36 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:11:37 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:37 server -> Sending packet 1 (1280 bytes) for connection 520482229c69dff6, Initial 2025/04/30 11:11:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f097710c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:37 server -> Sending packet 2 (1280 bytes) for connection 520482229c69dff6, Initial 2025/04/30 11:11:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f097710c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:11:37 server -> Sending packet 1 (734 bytes) for connection 520482229c69dff6, Handshake 2025/04/30 11:11:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f097710c, PacketNumber: 1, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:11:37 server -> Sending packet 2 (734 bytes) for connection 520482229c69dff6, Handshake 2025/04/30 11:11:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f097710c, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:11:37 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:37 server <- Reading packet 5 (72 bytes) for connection f097710c, Handshake 2025/04/30 11:11:37 server Long Header{Type: Handshake, DestConnectionID: f097710c, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:37 server Dropping Initial keys. 2025/04/30 11:11:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:37 Retiring connection ID 520482229c69dff6 in 5s. 2025/04/30 11:11:37 server Dropping Handshake keys. 2025/04/30 11:11:37 server <- Reading packet 6 (1148 bytes) for connection f097710c, 1-RTT 2025/04/30 11:11:37 server Short Header{DestConnectionID: f097710c, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:37 server -> Sending packet 2 (325 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 303.894µs} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: faed28c1, StatelessResetToken: 0x5042e9191d664dc70f49728fbc655efd} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d7dae2f2, StatelessResetToken: 0x4a10caceed84919fe8a2bd0fa35588ce} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5c79c965, StatelessResetToken: 0x929327ddecfbf28b47e7ce9283198f8c} 2025/04/30 11:11:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:37 server -> &wire.NewTokenFrame{Token: 0xb6b82140da808437c339f7100b12ebf9b013c37af12cba3fb8a9414b1c523ea60a1a44b59f6ef6af2371a56f7d77b62201020ec9c7a1d2ee30e052bf46be82f962fb190ef031455c8cedb8311fe263650ae342bd9ed1} 2025/04/30 11:11:37 server -> Sending packet 3 (320 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 Received request: GET /zfckccjbcd 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d7dae2f2, StatelessResetToken: 0x4a10caceed84919fe8a2bd0fa35588ce} 2025/04/30 11:11:37 server -> &wire.NewTokenFrame{Token: 0xb6b82140da808437c339f7100b12ebf9b013c37af12cba3fb8a9414b1c523ea60a1a44b59f6ef6af2371a56f7d77b62201020ec9c7a1d2ee30e052bf46be82f962fb190ef031455c8cedb8311fe263650ae342bd9ed1} 2025/04/30 11:11:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5c79c965, StatelessResetToken: 0x929327ddecfbf28b47e7ce9283198f8c} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: faed28c1, StatelessResetToken: 0x5042e9191d664dc70f49728fbc655efd} 2025/04/30 11:11:37 server -> Sending packet 4 (1366 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.PingFrame{} 2025/04/30 11:11:37 server <- Reading packet 2 (1252 bytes) for connection f097710c, 1-RTT 2025/04/30 11:11:37 server Short Header{DestConnectionID: f097710c, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:37 server <- &wire.PingFrame{} 2025/04/30 11:11:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:37 server Queueing ACK because packet 2 was missing before. 2025/04/30 11:11:37 server -> Sending packet 5 (1053 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 574.978µs} 2025/04/30 11:11:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:37 Tracking 50 connection IDs and 0 reset tokens. 2025/04/30 11:11:37 server <- Reading packet 9 (35 bytes) for connection f097710c, 1-RTT 2025/04/30 11:11:37 server Short Header{DestConnectionID: f097710c, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:37 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:37 server newly acked packets (2): [3 5] 2025/04/30 11:11:37 server updated RTT: 32.871804ms (σ: 16.435902ms) 2025/04/30 11:11:37 server ECN capability confirmed. 2025/04/30 11:11:37 server setting loss timer for packet 4 (1-RTT) to 36.980779ms (in 2025-04-30 11:11:37.267149019 +0000 UTC m=+32.019362213) 2025/04/30 11:11:37 server Canceling loss detection timer. 2025/04/30 11:11:37 server Ignoring all packets below 7. 2025/04/30 11:11:37 server -> Sending packet 6 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:37 server <- Reading packet 10 (1332 bytes) for connection f097710c, 1-RTT 2025/04/30 11:11:37 server Short Header{DestConnectionID: f097710c, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:37 server <- &wire.PingFrame{} 2025/04/30 11:11:37 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:37 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:11:37.267149019 +0000 UTC m=+32.019362213 2025/04/30 11:11:37 server lost packet 4 (time threshold) 2025/04/30 11:11:37 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:37 server -> Sending packet 7 (25 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 25.440293ms} 2025/04/30 11:11:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:37 server -> Sending packet 9 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:37 server -> Sending packet 10 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:37 server -> Sending packet 16 (251 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:37 server -> &wire.NewTokenFrame{Token: 0xa7d95433372225d056b684dd4c1776c1375cfe19b36f0d6b1c5e235c10272f78d461c7f41eee2d32094b4a47b25e5dfc1f795c40117d4db456d6b41fddc8cad393e4b0691fb1d2045a32e3cd701a81e35e29f394ebbc} 2025/04/30 11:11:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:37 server Skipping packet number 15 2025/04/30 11:11:37 server -> Sending packet 17 (1045 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:37 server -> Sending packet 12 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:37 server -> Sending packet 13 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:37 server -> Sending packet 14 (1323 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.PingFrame{} 2025/04/30 11:11:37 server <- Received Initial packet. 2025/04/30 11:11:37 Created qlog file: /logs/qlog/fcbaf1f7436c0988.sqlog 2025/04/30 11:11:37 server Changing connection ID to e9aa5d16. 2025/04/30 11:11:37 Adding connection IDs fcbaf1f7436c0988 and e9aa5d16 for a new connection. 2025/04/30 11:11:37 server <- Reading packet 1 (1220 bytes) for connection fcbaf1f7436c0988, Initial 2025/04/30 11:11:37 server Long Header{Type: Initial, DestConnectionID: fcbaf1f7436c0988, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:37 Adding connection ID 2f1e89ff. 2025/04/30 11:11:37 Adding connection ID b6775423. 2025/04/30 11:11:37 Adding connection ID c8d78925. 2025/04/30 11:11:37 server <- &wire.PingFrame{} 2025/04/30 11:11:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fcbaf1f7436c0988 2025/04/30 11:11:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e9aa5d16, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 443, Version: v1} 2025/04/30 11:11:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e9aa5d16, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c8d78925, StatelessResetToken: 0x8c6ebc9db62abc60145f1ddd2971243c} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6775423, StatelessResetToken: 0x08cd34fb83a454d1450d02aece4e1958} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2f1e89ff, StatelessResetToken: 0x929b1532d850b9773f0a193152955f10} 2025/04/30 11:11:37 server <- Reading packet 2 (77 bytes) for connection e9aa5d16, Handshake 2025/04/30 11:11:37 server Long Header{Type: Handshake, DestConnectionID: e9aa5d16, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:37 server Dropping Initial keys. 2025/04/30 11:11:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:11:37 server newly acked packets (1): [0] 2025/04/30 11:11:37 server updated RTT: 32.580391ms (σ: 16.290195ms) 2025/04/30 11:11:37 server Canceling loss detection timer. 2025/04/30 11:11:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:37 Retiring connection ID fcbaf1f7436c0988 in 5s. 2025/04/30 11:11:37 server Dropping Handshake keys. 2025/04/30 11:11:37 server -> Sending packet 1 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:37 server -> Sending packet 3 (91 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6775423, StatelessResetToken: 0x08cd34fb83a454d1450d02aece4e1958} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2f1e89ff, StatelessResetToken: 0x929b1532d850b9773f0a193152955f10} 2025/04/30 11:11:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c8d78925, StatelessResetToken: 0x8c6ebc9db62abc60145f1ddd2971243c} 2025/04/30 11:11:37 server Skipping packet number 2 2025/04/30 11:11:37 server -> Sending packet 4 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:37 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:37 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:37 server Dropping %!s(logging.PacketType=1) packet (72 bytes) because we already dropped the keys. 2025/04/30 11:11:37 server <- Reading packet 5 (1148 bytes) for connection e9aa5d16, 1-RTT 2025/04/30 11:11:37 server Short Header{DestConnectionID: e9aa5d16, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:37 server -> Sending packet 5 (24 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 140.602µs} 2025/04/30 11:11:37 Received request: GET /erasmtchnv 2025/04/30 11:11:37 server -> Sending packet 6 (1045 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:37 server <- Reading packet 6 (35 bytes) for connection e9aa5d16, 1-RTT 2025/04/30 11:11:37 server Short Header{DestConnectionID: e9aa5d16, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:37 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:37 server newly acked packets (1): [3] 2025/04/30 11:11:37 server updated RTT: 32.355ms (σ: 12.666ms) 2025/04/30 11:11:37 server ECN capability confirmed. 2025/04/30 11:11:37 server <- Reading packet 7 (42 bytes) for connection e9aa5d16, 1-RTT 2025/04/30 11:11:37 server Short Header{DestConnectionID: e9aa5d16, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:37 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:37 server newly acked packets (1): [6] 2025/04/30 11:11:37 server updated RTT: 32.25ms (σ: 9.707ms) 2025/04/30 11:11:37 server setting loss timer for packet 4 (1-RTT) to 36.28125ms (in 2025-04-30 11:11:37.965418776 +0000 UTC m=+32.717631971) 2025/04/30 11:11:37 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:37 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:37 server -> Sending packet 7 (27 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 89.155µs} 2025/04/30 11:11:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:37 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:11:37.965418776 +0000 UTC m=+32.717631971 2025/04/30 11:11:37 server lost packet 4 (time threshold) 2025/04/30 11:11:37 server -> Sending packet 8 (1366 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.PingFrame{} 2025/04/30 11:11:37 server -> Sending packet 9 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:37 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:37 server -> Sending packet 21 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:37 server -> Sending packet 22 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:37 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:38 server -> Sending packet 11 (22 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:38 server Skipping packet number 10 2025/04/30 11:11:38 server -> Sending packet 12 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:38 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:38 server -> Sending packet 16 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:38 server -> Sending packet 17 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:38 server -> Sending packet 14 (22 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:38 server Skipping packet number 13 2025/04/30 11:11:38 server -> Sending packet 15 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:38 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:38 Removing connection IDs [13f49bce 432f111c 18210272 9880bc01] for a closed connection after it has been retired. 2025/04/30 11:11:38 server <- Received Initial packet. 2025/04/30 11:11:38 Created qlog file: /logs/qlog/eec6d1e2053f098d.sqlog 2025/04/30 11:11:38 server Changing connection ID to 1b87c2c7. 2025/04/30 11:11:38 Adding connection IDs eec6d1e2053f098d and 1b87c2c7 for a new connection. 2025/04/30 11:11:38 server <- Reading packet 1 (1220 bytes) for connection eec6d1e2053f098d, Initial 2025/04/30 11:11:38 server Long Header{Type: Initial, DestConnectionID: eec6d1e2053f098d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:38 Adding connection ID e2c06d20. 2025/04/30 11:11:38 Adding connection ID b05064e5. 2025/04/30 11:11:38 Adding connection ID 17482502. 2025/04/30 11:11:38 server <- &wire.PingFrame{} 2025/04/30 11:11:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection eec6d1e2053f098d 2025/04/30 11:11:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1b87c2c7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:11:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1b87c2c7, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b05064e5, StatelessResetToken: 0x4ddf44c5479bb826424a5993b10a37c2} 2025/04/30 11:11:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e2c06d20, StatelessResetToken: 0x034a3e77f672f345a1310ccf846e50b3} 2025/04/30 11:11:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 17482502, StatelessResetToken: 0xe665b6cfad7038b51b054eaf111553c6} 2025/04/30 11:11:38 server <- Reading packet 2 (77 bytes) for connection 1b87c2c7, Handshake 2025/04/30 11:11:38 server Long Header{Type: Handshake, DestConnectionID: 1b87c2c7, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:38 server Dropping Initial keys. 2025/04/30 11:11:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:38 server newly acked packets (1): [0] 2025/04/30 11:11:38 server updated RTT: 32.550465ms (σ: 16.275232ms) 2025/04/30 11:11:38 server Canceling loss detection timer. 2025/04/30 11:11:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:38 Retiring connection ID eec6d1e2053f098d in 5s. 2025/04/30 11:11:38 server Dropping Handshake keys. 2025/04/30 11:11:38 server -> Sending packet 1 (251 bytes) for connection eec6d1e2053f098d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.NewTokenFrame{Token: 0x5d3ec821b919ab3e788a6e83c91ff90dcbe114b3fe0ce793b450ce6b2838b26cbda8a40edb0c6d2a218111ffe592e57d1afc188640462b63a2c947602c0e9238b1de4ba55ee66108ed408d94c79ed1c5756ca811848f} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:38 server <- Reading packet 3 (1252 bytes) for connection 1b87c2c7, 1-RTT 2025/04/30 11:11:38 server Short Header{DestConnectionID: 1b87c2c7, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:38 server <- &wire.PingFrame{} 2025/04/30 11:11:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:38 server newly acked packets (1): [0] 2025/04/30 11:11:38 server updated RTT: 32.669ms (σ: 12.445ms) 2025/04/30 11:11:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:38 server -> Sending packet 2 (24 bytes) for connection eec6d1e2053f098d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 106.508µs} 2025/04/30 11:11:38 Received request: GET /abeixrlnmi 2025/04/30 11:11:38 server -> Sending packet 3 (1045 bytes) for connection eec6d1e2053f098d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:38 server <- Reading packet 4 (1332 bytes) for connection 1b87c2c7, 1-RTT 2025/04/30 11:11:38 server Short Header{DestConnectionID: 1b87c2c7, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:38 server <- &wire.PingFrame{} 2025/04/30 11:11:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:38 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:38 server -> Sending packet 4 (25 bytes) for connection eec6d1e2053f098d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.312571ms} 2025/04/30 11:11:38 server <- Reading packet 6 (1412 bytes) for connection 1b87c2c7, 1-RTT 2025/04/30 11:11:38 server Short Header{DestConnectionID: 1b87c2c7, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:38 server <- &wire.PingFrame{} 2025/04/30 11:11:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:38 server -> Sending packet 5 (26 bytes) for connection eec6d1e2053f098d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 174.725µs} 2025/04/30 11:11:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:38 server -> Sending packet 7 (251 bytes) for connection eec6d1e2053f098d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.NewTokenFrame{Token: 0x5d3ec821b919ab3e788a6e83c91ff90dcbe114b3fe0ce793b450ce6b2838b26cbda8a40edb0c6d2a218111ffe592e57d1afc188640462b63a2c947602c0e9238b1de4ba55ee66108ed408d94c79ed1c5756ca811848f} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:38 server Skipping packet number 6 2025/04/30 11:11:38 server -> Sending packet 8 (1045 bytes) for connection eec6d1e2053f098d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:38 server <- Reading packet 7 (1452 bytes) for connection 1b87c2c7, 1-RTT 2025/04/30 11:11:38 server Short Header{DestConnectionID: 1b87c2c7, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:38 server <- &wire.PingFrame{} 2025/04/30 11:11:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:38 server <- Reading packet 9 (28 bytes) for connection 1b87c2c7, 1-RTT 2025/04/30 11:11:38 server Short Header{DestConnectionID: 1b87c2c7, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:38 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:38 Replacing connection for connection IDs [1b87c2c7 e2c06d20 b05064e5 17482502] with a closed connection. 2025/04/30 11:11:38 server Connection eec6d1e2053f098d closed. 2025/04/30 11:11:38 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:38 server -> Sending packet 17 (22 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:38 server Skipping packet number 16 2025/04/30 11:11:38 server -> Sending packet 18 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:38 Removing connection ID 6795ba8f754955b8 after it has been retired. 2025/04/30 11:11:38 Removing connection IDs [08ebac40 49e23f40 c778402a cf5ff60a] for a closed connection after it has been retired. 2025/04/30 11:11:38 server <- Received Initial packet. 2025/04/30 11:11:38 Created qlog file: /logs/qlog/afc634d84626c561.sqlog 2025/04/30 11:11:38 server Changing connection ID to a81ce963. 2025/04/30 11:11:38 Adding connection IDs afc634d84626c561 and a81ce963 for a new connection. 2025/04/30 11:11:38 server <- Reading packet 0 (1220 bytes) for connection afc634d84626c561, Initial 2025/04/30 11:11:38 server Long Header{Type: Initial, DestConnectionID: afc634d84626c561, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:38 Adding connection ID 155655a9. 2025/04/30 11:11:38 Adding connection ID 70b31c18. 2025/04/30 11:11:38 Adding connection ID a5d7c1c7. 2025/04/30 11:11:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection afc634d84626c561 2025/04/30 11:11:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a81ce963, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:11:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a81ce963, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:11:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:11:38 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70b31c18, StatelessResetToken: 0xd20e0b58d2915842b75dd2f0d0a6b319} 2025/04/30 11:11:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a5d7c1c7, StatelessResetToken: 0x60ea6e317ffe647dd2dd9533c4006eac} 2025/04/30 11:11:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 155655a9, StatelessResetToken: 0xda764e7a8425ffd1bdb0c0b186d9bf1f} 2025/04/30 11:11:39 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:11:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:39 server -> Sending packet 19 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:39 server -> Sending packet 20 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:39 server -> Sending packet 19 (251 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:39 server -> &wire.NewTokenFrame{Token: 0xa7d95433372225d056b684dd4c1776c1375cfe19b36f0d6b1c5e235c10272f78d461c7f41eee2d32094b4a47b25e5dfc1f795c40117d4db456d6b41fddc8cad393e4b0691fb1d2045a32e3cd701a81e35e29f394ebbc} 2025/04/30 11:11:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:39 server Skipping packet number 18 2025/04/30 11:11:39 server -> Sending packet 20 (1045 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:39 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:39 server <- Reading packet 3 (72 bytes) for connection a81ce963, Handshake 2025/04/30 11:11:39 server Long Header{Type: Handshake, DestConnectionID: a81ce963, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:39 server Dropping Initial keys. 2025/04/30 11:11:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:39 Retiring connection ID afc634d84626c561 in 5s. 2025/04/30 11:11:39 server Dropping Handshake keys. 2025/04/30 11:11:39 server <- Reading packet 4 (1148 bytes) for connection a81ce963, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: a81ce963, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:39 server -> Sending packet 1 (1366 bytes) for connection afc634d84626c561, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 Received request: GET /mdhrbrhnps 2025/04/30 11:11:39 server -> &wire.PingFrame{} 2025/04/30 11:11:39 server <- Reading packet 2 (1252 bytes) for connection a81ce963, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: a81ce963, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.PingFrame{} 2025/04/30 11:11:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:39 server newly acked packets (1): [0] 2025/04/30 11:11:39 server updated RTT: 33.361062ms (σ: 16.680531ms) 2025/04/30 11:11:39 server Canceling loss detection timer. 2025/04/30 11:11:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:39 server -> Sending packet 2 (1280 bytes) for connection afc634d84626c561, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 481.727µs} 2025/04/30 11:11:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:39 server -> &wire.NewTokenFrame{Token: 0x2c5b22dc7d8c161ea78b342c55facbebc686e93066587e5e98a7caf32f05c5c181ddabaddb5dafa425a5e6a241960f513fc30e07fe04394ade7f241ad7a8eff88cf7b866a63bd44e39cc848fdb2c5fb64c75ed4b73c1} 2025/04/30 11:11:39 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1023, Offset + Data length: 1023} 2025/04/30 11:11:39 server -> Sending packet 3 (24 bytes) for connection afc634d84626c561, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1023, Data length: 1, Offset + Data length: 1024} 2025/04/30 11:11:39 server <- Reading packet 5 (33 bytes) for connection a81ce963, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: a81ce963, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:39 server newly acked packets (2): [1 2] 2025/04/30 11:11:39 server updated RTT: 33.279ms (σ: 12.672ms) 2025/04/30 11:11:39 server ECN capability confirmed. 2025/04/30 11:11:39 server Ignoring all packets below 5. 2025/04/30 11:11:39 server <- Reading packet 6 (1332 bytes) for connection a81ce963, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: a81ce963, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.PingFrame{} 2025/04/30 11:11:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:39 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:39 server -> Sending packet 4 (25 bytes) for connection afc634d84626c561, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 25.281854ms} 2025/04/30 11:11:39 Tracking 56 connection IDs and 0 reset tokens. 2025/04/30 11:11:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:39 server -> Sending packet 6 (24 bytes) for connection afc634d84626c561, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1023, Data length: 1, Offset + Data length: 1024} 2025/04/30 11:11:39 server -> Sending packet 7 (24 bytes) for connection afc634d84626c561, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1023, Data length: 1, Offset + Data length: 1024} 2025/04/30 11:11:39 server <- Reading packet 7 (40 bytes) for connection a81ce963, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: a81ce963, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:39 server newly acked packets (1): [7] 2025/04/30 11:11:39 server updated RTT: 32.994ms (σ: 10.072ms) 2025/04/30 11:11:39 server Canceling loss detection timer. 2025/04/30 11:11:39 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:39 server -> Sending packet 8 (27 bytes) for connection afc634d84626c561, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 114.022µs} 2025/04/30 11:11:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:39 server <- Reading packet 8 (28 bytes) for connection a81ce963, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: a81ce963, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:39 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:39 Replacing connection for connection IDs [a81ce963 155655a9 70b31c18 a5d7c1c7] with a closed connection. 2025/04/30 11:11:39 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:39 server Connection afc634d84626c561 closed. 2025/04/30 11:11:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:39 server -> Sending packet 20 (22 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:39 server Skipping packet number 19 2025/04/30 11:11:39 server -> Sending packet 21 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:39 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:39 Removing connection ID 19802d619642251f after it has been retired. 2025/04/30 11:11:39 server <- Received Initial packet. 2025/04/30 11:11:39 Created qlog file: /logs/qlog/fd7333f4049c556c.sqlog 2025/04/30 11:11:39 server Changing connection ID to 24e7ba41. 2025/04/30 11:11:39 Adding connection IDs fd7333f4049c556c and 24e7ba41 for a new connection. 2025/04/30 11:11:39 server <- Reading packet 1 (1220 bytes) for connection fd7333f4049c556c, Initial 2025/04/30 11:11:39 server Long Header{Type: Initial, DestConnectionID: fd7333f4049c556c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:39 Adding connection ID 3c82de54. 2025/04/30 11:11:39 Adding connection ID 30384d22. 2025/04/30 11:11:39 Adding connection ID 7c9d4e4b. 2025/04/30 11:11:39 server <- &wire.PingFrame{} 2025/04/30 11:11:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fd7333f4049c556c 2025/04/30 11:11:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 24e7ba41, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 430, Version: v1} 2025/04/30 11:11:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 24e7ba41, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:11:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3c82de54, StatelessResetToken: 0x9dd615e8da7c874ac8d2e996c5de7563} 2025/04/30 11:11:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7c9d4e4b, StatelessResetToken: 0x67ebf55a7ed7d800ac132bb76f1eecfe} 2025/04/30 11:11:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 30384d22, StatelessResetToken: 0x4470672e81988a94c2157b3fc80741e6} 2025/04/30 11:11:39 server <- Reading packet 2 (77 bytes) for connection 24e7ba41, Handshake 2025/04/30 11:11:39 server Long Header{Type: Handshake, DestConnectionID: 24e7ba41, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:39 server Dropping Initial keys. 2025/04/30 11:11:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:39 server newly acked packets (1): [0] 2025/04/30 11:11:39 server updated RTT: 32.36986ms (σ: 16.18493ms) 2025/04/30 11:11:39 server Canceling loss detection timer. 2025/04/30 11:11:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:39 Retiring connection ID fd7333f4049c556c in 5s. 2025/04/30 11:11:39 server Dropping Handshake keys. 2025/04/30 11:11:39 server -> Sending packet 1 (251 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:39 server -> &wire.NewTokenFrame{Token: 0x5aad7c0a985bb1c7f2fda586918a2449a862197038398b3f1187b4a4dd035aef5681b769a915d06a936fc368cbbb28e35c86aadd50c6978a1ded3a8d4b71af46068797a418f017be98d9af38bf233c4a4870b1e139ff} 2025/04/30 11:11:39 server <- Reading packet 3 (1252 bytes) for connection 24e7ba41, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: 24e7ba41, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.PingFrame{} 2025/04/30 11:11:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:39 server newly acked packets (1): [0] 2025/04/30 11:11:39 server updated RTT: 32.492ms (σ: 12.383ms) 2025/04/30 11:11:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:39 server -> Sending packet 2 (24 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 134.33µs} 2025/04/30 11:11:39 Received request: GET /bxpinsgdgq 2025/04/30 11:11:39 server -> Sending packet 3 (1045 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:39 server <- Reading packet 4 (1332 bytes) for connection 24e7ba41, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: 24e7ba41, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.PingFrame{} 2025/04/30 11:11:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:39 server <- Reading packet 5 (34 bytes) for connection 24e7ba41, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: 24e7ba41, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.088ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:39 server newly acked packets (1): [1] 2025/04/30 11:11:39 server ECN capability confirmed. 2025/04/30 11:11:39 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:39 server -> Sending packet 4 (25 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 1.103337ms} 2025/04/30 11:11:39 server <- Reading packet 6 (1412 bytes) for connection 24e7ba41, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: 24e7ba41, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.PingFrame{} 2025/04/30 11:11:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:39 server -> Sending packet 6 (1051 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 20.197326ms} 2025/04/30 11:11:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:39 server -> Sending packet 7 (1045 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:39 server <- Reading packet 7 (40 bytes) for connection 24e7ba41, 1-RTT 2025/04/30 11:11:39 server Short Header{DestConnectionID: 24e7ba41, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:39 server newly acked packets (1): [7] 2025/04/30 11:11:39 server updated RTT: 32.487ms (σ: 9.296ms) 2025/04/30 11:11:39 server Canceling loss detection timer. 2025/04/30 11:11:39 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:39 server -> Sending packet 8 (27 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:39 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:39 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 134.69µs} 2025/04/30 11:11:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:40 server -> Sending packet 10 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 server -> Sending packet 11 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 server -> Sending packet 12 (1366 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.PingFrame{} 2025/04/30 11:11:40 Removing connection ID 32fc7b1881048ae1 after it has been retired. 2025/04/30 11:11:40 Removing connection IDs [6574a15d 2cdfdb06 cd44df6c 8e421af0] for a closed connection after it has been retired. 2025/04/30 11:11:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:40 server -> Sending packet 14 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 server -> Sending packet 15 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 server <- Received Initial packet. 2025/04/30 11:11:40 Created qlog file: /logs/qlog/d4f74bdd913d8647.sqlog 2025/04/30 11:11:40 server Changing connection ID to e71b655f. 2025/04/30 11:11:40 Adding connection IDs d4f74bdd913d8647 and e71b655f for a new connection. 2025/04/30 11:11:40 server <- Reading packet 0 (1220 bytes) for connection d4f74bdd913d8647, Initial 2025/04/30 11:11:40 server Long Header{Type: Initial, DestConnectionID: d4f74bdd913d8647, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:40 Adding connection ID a6481566. 2025/04/30 11:11:40 Adding connection ID b2f58fac. 2025/04/30 11:11:40 Adding connection ID ebf17ecf. 2025/04/30 11:11:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d4f74bdd913d8647 2025/04/30 11:11:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e71b655f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:11:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:40 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e71b655f, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2f58fac, StatelessResetToken: 0xe5ff1e3fc0ae878369f66fe0f10585ea} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ebf17ecf, StatelessResetToken: 0x2dafa3264baa87c7cd0b1689f6523d4b} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6481566, StatelessResetToken: 0x60fdd50478eee0e7b16d503ac35a3bc6} 2025/04/30 11:11:40 server <- Reading packet 1 (77 bytes) for connection e71b655f, Handshake 2025/04/30 11:11:40 server Long Header{Type: Handshake, DestConnectionID: e71b655f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:40 server Dropping Initial keys. 2025/04/30 11:11:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:40 server newly acked packets (1): [0] 2025/04/30 11:11:40 server updated RTT: 32.388867ms (σ: 16.194433ms) 2025/04/30 11:11:40 server Canceling loss detection timer. 2025/04/30 11:11:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:40 Retiring connection ID d4f74bdd913d8647 in 5s. 2025/04/30 11:11:40 server Dropping Handshake keys. 2025/04/30 11:11:40 server -> Sending packet 1 (251 bytes) for connection d4f74bdd913d8647, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.NewTokenFrame{Token: 0x2de12d038a5972e7ac75703281557ba55f40ab54ab6ffb752319664b4ace42b5eda2f704c04c0edc72e690fe38b909bad0bbdc36b7753e26e47ae832d4ee34e87c6530e4183a882d477143e1376a3c804b4e3ad58072} 2025/04/30 11:11:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:40 server -> Sending packet 3 (91 bytes) for connection d4f74bdd913d8647, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6481566, StatelessResetToken: 0x60fdd50478eee0e7b16d503ac35a3bc6} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ebf17ecf, StatelessResetToken: 0x2dafa3264baa87c7cd0b1689f6523d4b} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2f58fac, StatelessResetToken: 0xe5ff1e3fc0ae878369f66fe0f10585ea} 2025/04/30 11:11:40 server Skipping packet number 2 2025/04/30 11:11:40 server -> Sending packet 4 (251 bytes) for connection d4f74bdd913d8647, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.NewTokenFrame{Token: 0x2de12d038a5972e7ac75703281557ba55f40ab54ab6ffb752319664b4ace42b5eda2f704c04c0edc72e690fe38b909bad0bbdc36b7753e26e47ae832d4ee34e87c6530e4183a882d477143e1376a3c804b4e3ad58072} 2025/04/30 11:11:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:40 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:40 server Dropping %!s(logging.PacketType=1) packet (72 bytes) because we already dropped the keys. 2025/04/30 11:11:40 server <- Reading packet 4 (1148 bytes) for connection e71b655f, 1-RTT 2025/04/30 11:11:40 server Short Header{DestConnectionID: e71b655f, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:40 server -> Sending packet 5 (24 bytes) for connection d4f74bdd913d8647, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 133.347µs} 2025/04/30 11:11:40 Received request: GET /qateypllsr 2025/04/30 11:11:40 server -> Sending packet 6 (1045 bytes) for connection d4f74bdd913d8647, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:40 server <- Reading packet 5 (35 bytes) for connection e71b655f, 1-RTT 2025/04/30 11:11:40 server Short Header{DestConnectionID: e71b655f, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:40 server newly acked packets (1): [4] 2025/04/30 11:11:40 server updated RTT: 32.24ms (σ: 12.441ms) 2025/04/30 11:11:40 server ECN capability confirmed. 2025/04/30 11:11:40 server setting loss timer for packet 3 (1-RTT) to 36.27ms (in 2025-04-30 11:11:40.510454949 +0000 UTC m=+35.262668153) 2025/04/30 11:11:40 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:11:40.510454949 +0000 UTC m=+35.262668153 2025/04/30 11:11:40 server lost packet 3 (time threshold) 2025/04/30 11:11:40 server -> Sending packet 7 (91 bytes) for connection d4f74bdd913d8647, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6481566, StatelessResetToken: 0x60fdd50478eee0e7b16d503ac35a3bc6} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2f58fac, StatelessResetToken: 0xe5ff1e3fc0ae878369f66fe0f10585ea} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ebf17ecf, StatelessResetToken: 0x2dafa3264baa87c7cd0b1689f6523d4b} 2025/04/30 11:11:40 server <- Reading packet 6 (38 bytes) for connection e71b655f, 1-RTT 2025/04/30 11:11:40 server Short Header{DestConnectionID: e71b655f, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:40 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 256µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:40 server newly acked packets (1): [6] 2025/04/30 11:11:40 server updated RTT: 32.133ms (σ: 9.543ms) 2025/04/30 11:11:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:40 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:40 Replacing connection for connection IDs [e71b655f a6481566 b2f58fac ebf17ecf] with a closed connection. 2025/04/30 11:11:40 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:40 server Connection d4f74bdd913d8647 closed. 2025/04/30 11:11:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:40 server -> Sending packet 17 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 server -> Sending packet 18 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 Removing connection ID f8f6dc75fd1873b9 after it has been retired. 2025/04/30 11:11:40 server <- Received Initial packet. 2025/04/30 11:11:40 Created qlog file: /logs/qlog/8f198925234a9283.sqlog 2025/04/30 11:11:40 server Changing connection ID to c56dee4d. 2025/04/30 11:11:40 Adding connection IDs 8f198925234a9283 and c56dee4d for a new connection. 2025/04/30 11:11:40 server <- Reading packet 0 (1220 bytes) for connection 8f198925234a9283, Initial 2025/04/30 11:11:40 server Long Header{Type: Initial, DestConnectionID: 8f198925234a9283, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:40 Adding connection ID 9158b935. 2025/04/30 11:11:40 Adding connection ID 0d490cb2. 2025/04/30 11:11:40 Adding connection ID 1e67b80c. 2025/04/30 11:11:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8f198925234a9283 2025/04/30 11:11:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c56dee4d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 437, Version: v1} 2025/04/30 11:11:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:40 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c56dee4d, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:11:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0d490cb2, StatelessResetToken: 0x12c3099584f4ca3621305c6e9c7d1d03} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1e67b80c, StatelessResetToken: 0x4cc7a6567c9ba4ce7f6fb9843deee661} 2025/04/30 11:11:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9158b935, StatelessResetToken: 0x310167549d1e5dd8e56f7feaadd33ce1} 2025/04/30 11:11:40 server <- Reading packet 1 (77 bytes) for connection c56dee4d, Handshake 2025/04/30 11:11:40 server Long Header{Type: Handshake, DestConnectionID: c56dee4d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:40 server Dropping Initial keys. 2025/04/30 11:11:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:40 server newly acked packets (1): [0] 2025/04/30 11:11:40 server updated RTT: 32.32699ms (σ: 16.163495ms) 2025/04/30 11:11:40 server Canceling loss detection timer. 2025/04/30 11:11:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:40 Retiring connection ID 8f198925234a9283 in 5s. 2025/04/30 11:11:40 server Dropping Handshake keys. 2025/04/30 11:11:40 server -> Sending packet 1 (251 bytes) for connection 8f198925234a9283, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.NewTokenFrame{Token: 0x61534fbe32e8a09f14231a9e275dd9eaef7259ec961eebc5c691d86e691214062c7bd88104a5dc2bcc35139dc15d26b13d1bf0742f5ae2d2c34e3e6563efc7b5b60a4a9fd9822d4c975e858a238b0a16c1a3833fd219} 2025/04/30 11:11:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:40 server <- Reading packet 2 (1252 bytes) for connection c56dee4d, 1-RTT 2025/04/30 11:11:40 server Short Header{DestConnectionID: c56dee4d, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:40 server <- &wire.PingFrame{} 2025/04/30 11:11:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:40 server newly acked packets (1): [0] 2025/04/30 11:11:40 server updated RTT: 32.451ms (σ: 12.373ms) 2025/04/30 11:11:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:40 server -> Sending packet 2 (24 bytes) for connection 8f198925234a9283, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 128.408µs} 2025/04/30 11:11:40 Received request: GET /eyxzccsjje 2025/04/30 11:11:40 server -> Sending packet 3 (1045 bytes) for connection 8f198925234a9283, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:40 server <- Reading packet 3 (1332 bytes) for connection c56dee4d, 1-RTT 2025/04/30 11:11:40 server Short Header{DestConnectionID: c56dee4d, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:40 server <- &wire.PingFrame{} 2025/04/30 11:11:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:40 server <- Reading packet 4 (38 bytes) for connection c56dee4d, 1-RTT 2025/04/30 11:11:40 server Short Header{DestConnectionID: c56dee4d, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:40 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:40 server newly acked packets (2): [1 3] 2025/04/30 11:11:40 server updated RTT: 32.326ms (σ: 9.528ms) 2025/04/30 11:11:40 server ECN capability confirmed. 2025/04/30 11:11:40 server Canceling loss detection timer. 2025/04/30 11:11:40 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:40 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:11:40 server -> Sending packet 4 (27 bytes) for connection 8f198925234a9283, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 119.194µs} 2025/04/30 11:11:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 server <- Reading packet 5 (28 bytes) for connection c56dee4d, 1-RTT 2025/04/30 11:11:40 server Short Header{DestConnectionID: c56dee4d, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:40 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:40 Replacing connection for connection IDs [9158b935 0d490cb2 1e67b80c c56dee4d] with a closed connection. 2025/04/30 11:11:40 server Connection 8f198925234a9283 closed. 2025/04/30 11:11:40 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:40 server -> Sending packet 23 (22 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:40 server Skipping packet number 22 2025/04/30 11:11:40 server -> Sending packet 24 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:40 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:40 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:41 server -> Sending packet 22 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:41 server -> Sending packet 23 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:41 Tracking 64 connection IDs and 0 reset tokens. 2025/04/30 11:11:41 server <- Received Initial packet. 2025/04/30 11:11:41 Created qlog file: /logs/qlog/8409c9b712407cb5.sqlog 2025/04/30 11:11:41 server Changing connection ID to bef80c85. 2025/04/30 11:11:41 Adding connection IDs 8409c9b712407cb5 and bef80c85 for a new connection. 2025/04/30 11:11:41 server <- Reading packet 0 (1220 bytes) for connection 8409c9b712407cb5, Initial 2025/04/30 11:11:41 server Long Header{Type: Initial, DestConnectionID: 8409c9b712407cb5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:41 Adding connection ID d171d92a. 2025/04/30 11:11:41 Adding connection ID 0be2336e. 2025/04/30 11:11:41 Adding connection ID d27599a7. 2025/04/30 11:11:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8409c9b712407cb5 2025/04/30 11:11:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bef80c85, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 440, Version: v1} 2025/04/30 11:11:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:41 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bef80c85, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:11:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d171d92a, StatelessResetToken: 0x4ab90aaa94b517fd877a1bae680ad99b} 2025/04/30 11:11:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d27599a7, StatelessResetToken: 0x69ac2bf507d4a84de47c216aa7ef155c} 2025/04/30 11:11:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0be2336e, StatelessResetToken: 0x8c660b384034ba15eef31d89b23dcefc} 2025/04/30 11:11:41 server <- Reading packet 1 (77 bytes) for connection bef80c85, Handshake 2025/04/30 11:11:41 server Long Header{Type: Handshake, DestConnectionID: bef80c85, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:41 server Dropping Initial keys. 2025/04/30 11:11:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:41 server newly acked packets (1): [0] 2025/04/30 11:11:41 server updated RTT: 32.482854ms (σ: 16.241427ms) 2025/04/30 11:11:41 server Canceling loss detection timer. 2025/04/30 11:11:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:41 Retiring connection ID 8409c9b712407cb5 in 5s. 2025/04/30 11:11:41 server Dropping Handshake keys. 2025/04/30 11:11:41 server -> Sending packet 1 (251 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.NewTokenFrame{Token: 0x282ff5d479f6d20c4410df15577e54cb995600ed9e2f4d8919c99aaf06c384a0aa232a97c4e6d1af0969ae64b41ad3f40ea34ac5e9bba474677c29e6a96082f6cc39ca6b332d363dd3343cd7d753d7f5155264377a4c} 2025/04/30 11:11:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:41 server <- Reading packet 2 (1252 bytes) for connection bef80c85, 1-RTT 2025/04/30 11:11:41 server Short Header{DestConnectionID: bef80c85, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:41 server <- &wire.PingFrame{} 2025/04/30 11:11:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:41 server newly acked packets (1): [0] 2025/04/30 11:11:41 server updated RTT: 32.606ms (σ: 12.429ms) 2025/04/30 11:11:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:41 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:41 server -> Sending packet 2 (24 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 118.19µs} 2025/04/30 11:11:41 Received request: GET /seyhmujynj 2025/04/30 11:11:41 server -> Sending packet 3 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:41 server <- Reading packet 3 (1332 bytes) for connection bef80c85, 1-RTT 2025/04/30 11:11:41 server Short Header{DestConnectionID: bef80c85, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:41 server <- &wire.PingFrame{} 2025/04/30 11:11:41 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:41 server <- Reading packet 4 (34 bytes) for connection bef80c85, 1-RTT 2025/04/30 11:11:41 server Short Header{DestConnectionID: bef80c85, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:41 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.088ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:41 server newly acked packets (1): [1] 2025/04/30 11:11:41 server ECN capability confirmed. 2025/04/30 11:11:41 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:41 server -> Sending packet 4 (25 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 1.075733ms} 2025/04/30 11:11:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:41 server -> Sending packet 24 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:41 server -> Sending packet 25 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:41 server <- Reading packet 5 (1412 bytes) for connection bef80c85, 1-RTT 2025/04/30 11:11:41 server Short Header{DestConnectionID: bef80c85, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:41 server <- &wire.PingFrame{} 2025/04/30 11:11:41 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:41 server -> Sending packet 20 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:41 server -> Sending packet 21 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:41 server -> Sending packet 6 (1051 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 20.426686ms} 2025/04/30 11:11:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:41 server -> Sending packet 7 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:41 Removing connection ID 4c416c748fbb55a5 after it has been retired. 2025/04/30 11:11:41 server <- Reading packet 6 (35 bytes) for connection bef80c85, 1-RTT 2025/04/30 11:11:41 server Short Header{DestConnectionID: bef80c85, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:41 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:41 server <- Reading packet 7 (1452 bytes) for connection bef80c85, 1-RTT 2025/04/30 11:11:41 server Short Header{DestConnectionID: bef80c85, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:41 server <- &wire.PingFrame{} 2025/04/30 11:11:41 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:41 server -> Sending packet 8 (1366 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.PingFrame{} 2025/04/30 11:11:41 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:41 server -> Sending packet 9 (25 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, DelayTime: 25.437127ms} 2025/04/30 11:11:41 Removing connection IDs [071da340 fe60e8c7 f47c6d8e d0ad685c] for a closed connection after it has been retired. 2025/04/30 11:11:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:41 server -> Sending packet 11 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:41 server -> Sending packet 12 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:41 server <- Received Initial packet. 2025/04/30 11:11:41 Created qlog file: /logs/qlog/c3eabc2fa2df693c.sqlog 2025/04/30 11:11:41 server Changing connection ID to 38a8904f. 2025/04/30 11:11:41 Adding connection IDs c3eabc2fa2df693c and 38a8904f for a new connection. 2025/04/30 11:11:41 server <- Reading packet 0 (1220 bytes) for connection c3eabc2fa2df693c, Initial 2025/04/30 11:11:41 server Long Header{Type: Initial, DestConnectionID: c3eabc2fa2df693c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:41 Adding connection ID 2e93e7bf. 2025/04/30 11:11:41 Adding connection ID 7d5e6807. 2025/04/30 11:11:41 Adding connection ID f09a5c1e. 2025/04/30 11:11:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c3eabc2fa2df693c 2025/04/30 11:11:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 38a8904f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:11:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:41 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 38a8904f, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:11:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:11:41 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d5e6807, StatelessResetToken: 0xff3b36d34e722df435407c5d7a5e7a2c} 2025/04/30 11:11:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e93e7bf, StatelessResetToken: 0x4ad4ae4bfceec3eb1dc845f94fb93e80} 2025/04/30 11:11:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f09a5c1e, StatelessResetToken: 0x9009a8137487070ddd2d5955d6daa62a} 2025/04/30 11:11:41 server <- Reading packet 1 (1220 bytes) for connection c3eabc2fa2df693c, Initial 2025/04/30 11:11:41 server Long Header{Type: Initial, DestConnectionID: c3eabc2fa2df693c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:41 server <- &wire.PingFrame{} 2025/04/30 11:11:41 server -> Sending packet 1 (37 bytes) for connection c3eabc2fa2df693c, Initial 2025/04/30 11:11:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 38a8904f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:42 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:42 server -> Sending packet 2 (1280 bytes) for connection c3eabc2fa2df693c, Initial 2025/04/30 11:11:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 38a8904f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:42 server -> Sending packet 3 (1280 bytes) for connection c3eabc2fa2df693c, Initial 2025/04/30 11:11:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 38a8904f, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:42 server -> Sending packet 26 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:42 server -> Sending packet 27 (22 bytes) for connection 8e73b4a5c4a266ca, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:42 server -> Sending packet 14 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:42 server -> Sending packet 15 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:42 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:11:42 server -> Sending packet 1 (748 bytes) for connection c3eabc2fa2df693c, Handshake 2025/04/30 11:11:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 38a8904f, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:11:42 server -> Sending packet 2 (748 bytes) for connection c3eabc2fa2df693c, Handshake 2025/04/30 11:11:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 38a8904f, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:11:42 Removing connection ID 520482229c69dff6 after it has been retired. 2025/04/30 11:11:42 server <- Reading packet 3 (77 bytes) for connection 38a8904f, Handshake 2025/04/30 11:11:42 server Long Header{Type: Handshake, DestConnectionID: 38a8904f, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:42 server Dropping Initial keys. 2025/04/30 11:11:42 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:11:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:42 Retiring connection ID c3eabc2fa2df693c in 5s. 2025/04/30 11:11:42 server Dropping Handshake keys. 2025/04/30 11:11:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:42 server -> Sending packet 2 (320 bytes) for connection c3eabc2fa2df693c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.NewTokenFrame{Token: 0x0e8066bdae5ca57804e7e4e07d019b7eda31a11fb6233e93ea319e922e5a571dad55523fa16b1b30034b219d0791de642849eaa95191dda8906d4acd5817805d11eab72b9ac0130337adcbdbb3aa027904f9fb2de411} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d5e6807, StatelessResetToken: 0xff3b36d34e722df435407c5d7a5e7a2c} 2025/04/30 11:11:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e93e7bf, StatelessResetToken: 0x4ad4ae4bfceec3eb1dc845f94fb93e80} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f09a5c1e, StatelessResetToken: 0x9009a8137487070ddd2d5955d6daa62a} 2025/04/30 11:11:42 server -> Sending packet 3 (320 bytes) for connection c3eabc2fa2df693c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e93e7bf, StatelessResetToken: 0x4ad4ae4bfceec3eb1dc845f94fb93e80} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d5e6807, StatelessResetToken: 0xff3b36d34e722df435407c5d7a5e7a2c} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f09a5c1e, StatelessResetToken: 0x9009a8137487070ddd2d5955d6daa62a} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:42 server -> &wire.NewTokenFrame{Token: 0x0e8066bdae5ca57804e7e4e07d019b7eda31a11fb6233e93ea319e922e5a571dad55523fa16b1b30034b219d0791de642849eaa95191dda8906d4acd5817805d11eab72b9ac0130337adcbdbb3aa027904f9fb2de411} 2025/04/30 11:11:42 server -> Sending packet 4 (1366 bytes) for connection c3eabc2fa2df693c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.PingFrame{} 2025/04/30 11:11:42 server <- Reading packet 4 (1220 bytes) for connection 38a8904f, 1-RTT 2025/04/30 11:11:42 server Short Header{DestConnectionID: 38a8904f, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:42 server <- &wire.PingFrame{} 2025/04/30 11:11:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:42 server -> Sending packet 5 (24 bytes) for connection c3eabc2fa2df693c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 86.24µs} 2025/04/30 11:11:42 Received request: GET /rpcjxmoeli 2025/04/30 11:11:42 server -> Sending packet 6 (1045 bytes) for connection c3eabc2fa2df693c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:42 server Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:11:42 server <- Reading packet 7 (42 bytes) for connection 38a8904f, 1-RTT 2025/04/30 11:11:42 server Short Header{DestConnectionID: 38a8904f, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:42 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:42 server newly acked packets (2): [4 6] 2025/04/30 11:11:42 server updated RTT: 32.2355ms (σ: 16.11775ms) 2025/04/30 11:11:42 server ECN capability confirmed. 2025/04/30 11:11:42 server lost packet 3 (reordering threshold) 2025/04/30 11:11:42 server Canceling loss detection timer. 2025/04/30 11:11:42 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:42 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:42 server -> Sending packet 7 (330 bytes) for connection c3eabc2fa2df693c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 99.025µs} 2025/04/30 11:11:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:42 server -> &wire.NewTokenFrame{Token: 0x0e8066bdae5ca57804e7e4e07d019b7eda31a11fb6233e93ea319e922e5a571dad55523fa16b1b30034b219d0791de642849eaa95191dda8906d4acd5817805d11eab72b9ac0130337adcbdbb3aa027904f9fb2de411} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d5e6807, StatelessResetToken: 0xff3b36d34e722df435407c5d7a5e7a2c} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f09a5c1e, StatelessResetToken: 0x9009a8137487070ddd2d5955d6daa62a} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e93e7bf, StatelessResetToken: 0x4ad4ae4bfceec3eb1dc845f94fb93e80} 2025/04/30 11:11:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:42 server <- Reading packet 9 (36 bytes) for connection 38a8904f, 1-RTT 2025/04/30 11:11:42 server Short Header{DestConnectionID: 38a8904f, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:42 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:42 server newly acked packets (1): [7] 2025/04/30 11:11:42 server updated RTT: 32.203ms (σ: 12.15ms) 2025/04/30 11:11:42 server Canceling loss detection timer. 2025/04/30 11:11:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:42 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:42 Replacing connection for connection IDs [38a8904f 2e93e7bf 7d5e6807 f09a5c1e] with a closed connection. 2025/04/30 11:11:42 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:42 server Connection c3eabc2fa2df693c closed. 2025/04/30 11:11:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:42 server -> Sending packet 22 (251 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:42 server -> &wire.NewTokenFrame{Token: 0xa7d95433372225d056b684dd4c1776c1375cfe19b36f0d6b1c5e235c10272f78d461c7f41eee2d32094b4a47b25e5dfc1f795c40117d4db456d6b41fddc8cad393e4b0691fb1d2045a32e3cd701a81e35e29f394ebbc} 2025/04/30 11:11:42 server Skipping packet number 21 2025/04/30 11:11:42 server -> Sending packet 23 (1045 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:42 server <- Received Initial packet. 2025/04/30 11:11:42 Created qlog file: /logs/qlog/39fedb972f25cb5a.sqlog 2025/04/30 11:11:42 server Changing connection ID to b3df4959. 2025/04/30 11:11:42 Adding connection IDs 39fedb972f25cb5a and b3df4959 for a new connection. 2025/04/30 11:11:42 server <- Reading packet 0 (1220 bytes) for connection 39fedb972f25cb5a, Initial 2025/04/30 11:11:42 server Long Header{Type: Initial, DestConnectionID: 39fedb972f25cb5a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:42 Adding connection ID 0e84d0a0. 2025/04/30 11:11:42 Adding connection ID 7d09ae62. 2025/04/30 11:11:42 Adding connection ID 1b1df918. 2025/04/30 11:11:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 39fedb972f25cb5a 2025/04/30 11:11:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b3df4959, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:11:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b3df4959, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d09ae62, StatelessResetToken: 0x6be4003feed3956b1c2120377ec04641} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0e84d0a0, StatelessResetToken: 0x94d48802c13db43e77fc131f8d2b540a} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b1df918, StatelessResetToken: 0x838b20b6444c1d47c6a7467df57f5122} 2025/04/30 11:11:42 server <- Reading packet 1 (77 bytes) for connection b3df4959, Handshake 2025/04/30 11:11:42 server Long Header{Type: Handshake, DestConnectionID: b3df4959, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:42 server Dropping Initial keys. 2025/04/30 11:11:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:42 server newly acked packets (1): [0] 2025/04/30 11:11:42 server updated RTT: 32.465321ms (σ: 16.23266ms) 2025/04/30 11:11:42 server Canceling loss detection timer. 2025/04/30 11:11:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:42 Retiring connection ID 39fedb972f25cb5a in 5s. 2025/04/30 11:11:42 server Dropping Handshake keys. 2025/04/30 11:11:42 server -> Sending packet 1 (251 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.NewTokenFrame{Token: 0xcd833248d2bb0b0ca31450c8585a6e8eada041daa6b97b14bf3b50900ecf0a99daff0c3c45a567caf797759684a1151750599350f1b5d1915e3fd834cbe6c252f4dadfd9328566ab7c912c4c1c2b558e7120f897d2f6} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:42 Removing connection ID fcbaf1f7436c0988 after it has been retired. 2025/04/30 11:11:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:42 server -> Sending packet 3 (91 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d09ae62, StatelessResetToken: 0x6be4003feed3956b1c2120377ec04641} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b1df918, StatelessResetToken: 0x838b20b6444c1d47c6a7467df57f5122} 2025/04/30 11:11:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0e84d0a0, StatelessResetToken: 0x94d48802c13db43e77fc131f8d2b540a} 2025/04/30 11:11:42 server Skipping packet number 2 2025/04/30 11:11:42 server -> Sending packet 4 (251 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:42 server -> &wire.NewTokenFrame{Token: 0xcd833248d2bb0b0ca31450c8585a6e8eada041daa6b97b14bf3b50900ecf0a99daff0c3c45a567caf797759684a1151750599350f1b5d1915e3fd834cbe6c252f4dadfd9328566ab7c912c4c1c2b558e7120f897d2f6} 2025/04/30 11:11:42 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:42 server Dropping %!s(logging.PacketType=1) packet (72 bytes) because we already dropped the keys. 2025/04/30 11:11:42 server <- Reading packet 4 (1148 bytes) for connection b3df4959, 1-RTT 2025/04/30 11:11:42 server Short Header{DestConnectionID: b3df4959, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:42 server -> Sending packet 5 (24 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 Received request: GET /khnyhxydqg 2025/04/30 11:11:42 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 124.892µs} 2025/04/30 11:11:42 server -> Sending packet 6 (1045 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:42 server <- Reading packet 5 (35 bytes) for connection b3df4959, 1-RTT 2025/04/30 11:11:42 server Short Header{DestConnectionID: b3df4959, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:42 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:42 server newly acked packets (1): [3] 2025/04/30 11:11:42 server updated RTT: 32.265ms (σ: 12.573ms) 2025/04/30 11:11:42 server ECN capability confirmed. 2025/04/30 11:11:42 server <- Reading packet 6 (42 bytes) for connection b3df4959, 1-RTT 2025/04/30 11:11:42 server Short Header{DestConnectionID: b3df4959, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:42 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:42 server newly acked packets (2): [4 6] 2025/04/30 11:11:42 server updated RTT: 32.179ms (σ: 9.6ms) 2025/04/30 11:11:42 server Canceling loss detection timer. 2025/04/30 11:11:42 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:42 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:42 server -> Sending packet 7 (1366 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.PingFrame{} 2025/04/30 11:11:42 server -> Sending packet 8 (27 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 167.181µs} 2025/04/30 11:11:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:42 server -> Sending packet 23 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:42 server -> Sending packet 24 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:42 server -> Sending packet 10 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:42 server -> Sending packet 11 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:42 server -> Sending packet 17 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:42 server -> Sending packet 18 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:42 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:43 server -> Sending packet 34 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 34, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:43 server -> Sending packet 35 (1045 bytes) for connection 131dac628364b1b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 35, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:43 server -> Sending packet 13 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:43 server -> Sending packet 14 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:43 Tracking 72 connection IDs and 0 reset tokens. 2025/04/30 11:11:43 server <- Received Initial packet. 2025/04/30 11:11:43 Created qlog file: /logs/qlog/9f4593865fcb60e6.sqlog 2025/04/30 11:11:43 server Changing connection ID to a295278d. 2025/04/30 11:11:43 Adding connection IDs 9f4593865fcb60e6 and a295278d for a new connection. 2025/04/30 11:11:43 server <- Reading packet 0 (1220 bytes) for connection 9f4593865fcb60e6, Initial 2025/04/30 11:11:43 server Long Header{Type: Initial, DestConnectionID: 9f4593865fcb60e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:43 Adding connection ID 16fbae58. 2025/04/30 11:11:43 Adding connection ID d509b2f2. 2025/04/30 11:11:43 Adding connection ID b8741d9c. 2025/04/30 11:11:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9f4593865fcb60e6 2025/04/30 11:11:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a295278d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:11:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a295278d, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:11:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d509b2f2, StatelessResetToken: 0xa16d94503ec9d9531945d62bb14eb745} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b8741d9c, StatelessResetToken: 0xc8202924c1d471f0dd06a714fbdacf45} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 16fbae58, StatelessResetToken: 0x172d7b92a65ad6d43821c51fa5cf98b2} 2025/04/30 11:11:43 server <- Reading packet 1 (1220 bytes) for connection 9f4593865fcb60e6, Initial 2025/04/30 11:11:43 server Long Header{Type: Initial, DestConnectionID: 9f4593865fcb60e6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:43 server <- &wire.PingFrame{} 2025/04/30 11:11:43 server -> Sending packet 1 (37 bytes) for connection 9f4593865fcb60e6, Initial 2025/04/30 11:11:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a295278d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:43 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:43 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:43 server -> Sending packet 2 (1280 bytes) for connection 9f4593865fcb60e6, Initial 2025/04/30 11:11:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a295278d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:43 server -> Sending packet 3 (1280 bytes) for connection 9f4593865fcb60e6, Initial 2025/04/30 11:11:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a295278d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:43 server <- Reading packet 2 (1220 bytes) for connection a295278d, Initial 2025/04/30 11:11:43 server Long Header{Type: Initial, DestConnectionID: a295278d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:43 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:43 server newly acked packets (1): [3] 2025/04/30 11:11:43 server updated RTT: 33.623776ms (σ: 16.811888ms) 2025/04/30 11:11:43 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:43 server -> Sending packet 1 (736 bytes) for connection 9f4593865fcb60e6, Handshake 2025/04/30 11:11:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a295278d, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:11:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:11:43 server -> Sending packet 2 (736 bytes) for connection 9f4593865fcb60e6, Handshake 2025/04/30 11:11:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a295278d, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:11:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:11:43 server <- Reading packet 3 (1220 bytes) for connection a295278d, Handshake 2025/04/30 11:11:43 server Long Header{Type: Handshake, DestConnectionID: a295278d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:43 server Dropping Initial keys. 2025/04/30 11:11:43 server <- &wire.PingFrame{} 2025/04/30 11:11:43 server -> Sending packet 3 (36 bytes) for connection 9f4593865fcb60e6, Handshake 2025/04/30 11:11:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a295278d, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:43 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:11:43 Removing connection ID eec6d1e2053f098d after it has been retired. 2025/04/30 11:11:43 server <- Reading packet 4 (77 bytes) for connection a295278d, Handshake 2025/04/30 11:11:43 server Long Header{Type: Handshake, DestConnectionID: a295278d, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:43 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 8µs} 2025/04/30 11:11:43 server newly acked packets (1): [2] 2025/04/30 11:11:43 server updated RTT: 33.455ms (σ: 12.943ms) 2025/04/30 11:11:43 server Canceling loss detection timer. 2025/04/30 11:11:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:43 Retiring connection ID 9f4593865fcb60e6 in 5s. 2025/04/30 11:11:43 server Dropping Handshake keys. 2025/04/30 11:11:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:43 server -> Sending packet 2 (323 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 16fbae58, StatelessResetToken: 0x172d7b92a65ad6d43821c51fa5cf98b2} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b8741d9c, StatelessResetToken: 0xc8202924c1d471f0dd06a714fbdacf45} 2025/04/30 11:11:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d509b2f2, StatelessResetToken: 0xa16d94503ec9d9531945d62bb14eb745} 2025/04/30 11:11:43 server -> &wire.NewTokenFrame{Token: 0x3b2622d8146f0c3de0893a7ac5b85523d3d1847a0d7ba68dcd44828f3535e1ca0d658f3a08f2234bf2a194e807d53a1435fdf6ce210e2a38c6b201d834f3addf6527908bff24853ebabfb775bcf3219113381f94d9c2} 2025/04/30 11:11:43 server -> Sending packet 3 (323 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d509b2f2, StatelessResetToken: 0xa16d94503ec9d9531945d62bb14eb745} 2025/04/30 11:11:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 16fbae58, StatelessResetToken: 0x172d7b92a65ad6d43821c51fa5cf98b2} 2025/04/30 11:11:43 server -> &wire.NewTokenFrame{Token: 0x3b2622d8146f0c3de0893a7ac5b85523d3d1847a0d7ba68dcd44828f3535e1ca0d658f3a08f2234bf2a194e807d53a1435fdf6ce210e2a38c6b201d834f3addf6527908bff24853ebabfb775bcf3219113381f94d9c2} 2025/04/30 11:11:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b8741d9c, StatelessResetToken: 0xc8202924c1d471f0dd06a714fbdacf45} 2025/04/30 11:11:43 server <- Reading packet 5 (1252 bytes) for connection a295278d, 1-RTT 2025/04/30 11:11:43 server Short Header{DestConnectionID: a295278d, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:43 server <- &wire.PingFrame{} 2025/04/30 11:11:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:43 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:43 server -> Sending packet 4 (24 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 84.987µs} 2025/04/30 11:11:43 Received request: GET /hyhsryofzu 2025/04/30 11:11:43 server -> Sending packet 5 (1045 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:43 server -> Sending packet 16 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:43 server -> Sending packet 17 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:43 server <- Reading packet 6 (33 bytes) for connection a295278d, 1-RTT 2025/04/30 11:11:43 server Short Header{DestConnectionID: a295278d, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:43 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:43 server newly acked packets (1): [3] 2025/04/30 11:11:43 server updated RTT: 33.165ms (σ: 10.285ms) 2025/04/30 11:11:43 server ECN capability confirmed. 2025/04/30 11:11:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:43 server -> Sending packet 7 (1045 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:43 server -> Sending packet 8 (1045 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:43 Removing connection IDs [1b87c2c7 e2c06d20 b05064e5 17482502] for a closed connection after it has been retired. 2025/04/30 11:11:43 server <- Reading packet 8 (37 bytes) for connection a295278d, 1-RTT 2025/04/30 11:11:43 server Short Header{DestConnectionID: a295278d, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:43 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:43 server <- Reading packet 9 (63 bytes) for connection a295278d, 1-RTT 2025/04/30 11:11:43 server Short Header{DestConnectionID: a295278d, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:43 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 5.12ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:11:43 server newly acked packets (1): [8] 2025/04/30 11:11:43 server updated RTT: 33.077ms (σ: 7.888ms) 2025/04/30 11:11:43 server Canceling loss detection timer. 2025/04/30 11:11:43 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:43 server -> Sending packet 9 (29 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 111.638µs} 2025/04/30 11:11:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:43 server -> Sending packet 11 (22 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:43 server -> Sending packet 12 (22 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:43 server -> Sending packet 13 (1366 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.PingFrame{} 2025/04/30 11:11:43 server <- Reading packet 10 (39 bytes) for connection a295278d, 1-RTT 2025/04/30 11:11:43 server Short Header{DestConnectionID: a295278d, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:43 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:11:43 server <- Reading packet 11 (39 bytes) for connection a295278d, 1-RTT 2025/04/30 11:11:43 server Short Header{DestConnectionID: a295278d, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:43 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 2, AckRanges: {{Largest: 13, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:11:43 server newly acked packets (2): [12 13] 2025/04/30 11:11:43 server updated RTT: 32.922ms (σ: 6.225ms) 2025/04/30 11:11:43 server Canceling loss detection timer. 2025/04/30 11:11:43 server <- Reading packet 12 (51 bytes) for connection a295278d, 1-RTT 2025/04/30 11:11:43 server Short Header{DestConnectionID: a295278d, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:43 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:43 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:43 server -> Sending packet 14 (27 bytes) for connection 9f4593865fcb60e6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:43 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:43 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 5, AckRanges: {{Largest: 12, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 25.362698ms} 2025/04/30 11:11:43 server <- Reading packet 15 (28 bytes) for connection a295278d, 1-RTT 2025/04/30 11:11:43 server Short Header{DestConnectionID: a295278d, PacketNumber: 15, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:43 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:43 Replacing connection for connection IDs [d509b2f2 b8741d9c a295278d 16fbae58] with a closed connection. 2025/04/30 11:11:43 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:43 server Connection 9f4593865fcb60e6 closed. 2025/04/30 11:11:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:44 server -> Sending packet 26 (22 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:44 server Skipping packet number 25 2025/04/30 11:11:44 server -> Sending packet 27 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:44 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:44 Removing connection ID afc634d84626c561 after it has been retired. 2025/04/30 11:11:44 server <- Received Initial packet. 2025/04/30 11:11:44 Created qlog file: /logs/qlog/3d6063346f62c7e7.sqlog 2025/04/30 11:11:44 server Changing connection ID to d67ff857. 2025/04/30 11:11:44 Adding connection IDs 3d6063346f62c7e7 and d67ff857 for a new connection. 2025/04/30 11:11:44 server <- Reading packet 0 (1220 bytes) for connection 3d6063346f62c7e7, Initial 2025/04/30 11:11:44 server Long Header{Type: Initial, DestConnectionID: 3d6063346f62c7e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:44 Adding connection ID c02f1eda. 2025/04/30 11:11:44 Adding connection ID 23b4c9d4. 2025/04/30 11:11:44 Adding connection ID 6b88459a. 2025/04/30 11:11:44 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3d6063346f62c7e7 2025/04/30 11:11:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d67ff857, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 440, Version: v1} 2025/04/30 11:11:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d67ff857, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6b88459a, StatelessResetToken: 0x3043715ef3c7fae7b998d2eabf2ccbb5} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c02f1eda, StatelessResetToken: 0xa04791613fdc4c81685259de6e932059} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 23b4c9d4, StatelessResetToken: 0x6af57aa1d1ce0c882c28b56ba134aedf} 2025/04/30 11:11:44 Removing connection IDs [a81ce963 155655a9 70b31c18 a5d7c1c7] for a closed connection after it has been retired. 2025/04/30 11:11:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:11:44 server -> Sending packet 19 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:44 server -> Sending packet 20 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:44 server <- Reading packet 1 (1220 bytes) for connection 3d6063346f62c7e7, Initial 2025/04/30 11:11:44 server Long Header{Type: Initial, DestConnectionID: 3d6063346f62c7e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:44 server <- &wire.PingFrame{} 2025/04/30 11:11:44 server -> Sending packet 1 (37 bytes) for connection 3d6063346f62c7e7, Initial 2025/04/30 11:11:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d67ff857, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:11:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:44 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:44 server -> Sending packet 2 (1280 bytes) for connection 3d6063346f62c7e7, Initial 2025/04/30 11:11:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d67ff857, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:44 server -> Sending packet 3 (1280 bytes) for connection 3d6063346f62c7e7, Initial 2025/04/30 11:11:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d67ff857, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:44 server <- Reading packet 2 (1220 bytes) for connection d67ff857, Initial 2025/04/30 11:11:44 server Long Header{Type: Initial, DestConnectionID: d67ff857, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:44 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 792µs} 2025/04/30 11:11:44 server newly acked packets (1): [3] 2025/04/30 11:11:44 server updated RTT: 59.109191ms (σ: 29.554595ms) 2025/04/30 11:11:44 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:44 server -> Sending packet 1 (735 bytes) for connection 3d6063346f62c7e7, Handshake 2025/04/30 11:11:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d67ff857, PacketNumber: 1, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:11:44 server -> Sending packet 2 (735 bytes) for connection 3d6063346f62c7e7, Handshake 2025/04/30 11:11:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d67ff857, PacketNumber: 2, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:11:44 server <- Reading packet 3 (77 bytes) for connection d67ff857, Handshake 2025/04/30 11:11:44 server Long Header{Type: Handshake, DestConnectionID: d67ff857, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:44 server Dropping Initial keys. 2025/04/30 11:11:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:11:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:44 Retiring connection ID 3d6063346f62c7e7 in 5s. 2025/04/30 11:11:44 server Dropping Handshake keys. 2025/04/30 11:11:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:44 server -> Sending packet 2 (323 bytes) for connection 3d6063346f62c7e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 23b4c9d4, StatelessResetToken: 0x6af57aa1d1ce0c882c28b56ba134aedf} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c02f1eda, StatelessResetToken: 0xa04791613fdc4c81685259de6e932059} 2025/04/30 11:11:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6b88459a, StatelessResetToken: 0x3043715ef3c7fae7b998d2eabf2ccbb5} 2025/04/30 11:11:44 server -> &wire.NewTokenFrame{Token: 0x905069350612556ec0853865b3ca8e7e9501d400abe54f1c685166627b251bdbf4c37a903365efd79dce8a46a7b768b4665001d5e6571c98112e3d6b05b7a2982c487e9c4c5e9aec36494c5322bba8e63bfca519cf98} 2025/04/30 11:11:44 server -> Sending packet 3 (323 bytes) for connection 3d6063346f62c7e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:44 server -> &wire.NewTokenFrame{Token: 0x905069350612556ec0853865b3ca8e7e9501d400abe54f1c685166627b251bdbf4c37a903365efd79dce8a46a7b768b4665001d5e6571c98112e3d6b05b7a2982c487e9c4c5e9aec36494c5322bba8e63bfca519cf98} 2025/04/30 11:11:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 23b4c9d4, StatelessResetToken: 0x6af57aa1d1ce0c882c28b56ba134aedf} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c02f1eda, StatelessResetToken: 0xa04791613fdc4c81685259de6e932059} 2025/04/30 11:11:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6b88459a, StatelessResetToken: 0x3043715ef3c7fae7b998d2eabf2ccbb5} 2025/04/30 11:11:44 server <- Reading packet 5 (33 bytes) for connection d67ff857, 1-RTT 2025/04/30 11:11:44 server Short Header{DestConnectionID: d67ff857, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:44 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:44 server newly acked packets (1): [3] 2025/04/30 11:11:44 server updated RTT: 55.636ms (σ: 29.111ms) 2025/04/30 11:11:44 server ECN capability confirmed. 2025/04/30 11:11:44 server Canceling loss detection timer. 2025/04/30 11:11:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:44 server -> Sending packet 20 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:44 server -> Sending packet 21 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:44 server <- Reading packet 6 (1220 bytes) for connection d67ff857, 1-RTT 2025/04/30 11:11:44 server Short Header{DestConnectionID: d67ff857, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:44 server <- &wire.PingFrame{} 2025/04/30 11:11:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:44 server -> Sending packet 4 (1366 bytes) for connection 3d6063346f62c7e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.PingFrame{} 2025/04/30 11:11:44 server -> Sending packet 5 (24 bytes) for connection 3d6063346f62c7e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 187.018µs} 2025/04/30 11:11:44 Received request: GET /jhrlwutfsw 2025/04/30 11:11:44 server -> Sending packet 6 (1045 bytes) for connection 3d6063346f62c7e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:44 Removing connection ID fd7333f4049c556c after it has been retired. 2025/04/30 11:11:44 server <- Reading packet 7 (38 bytes) for connection d67ff857, 1-RTT 2025/04/30 11:11:44 server Short Header{DestConnectionID: d67ff857, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:44 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:11:44 server newly acked packets (2): [4 6] 2025/04/30 11:11:44 server updated RTT: 52.753ms (σ: 27.598ms) 2025/04/30 11:11:44 server Canceling loss detection timer. 2025/04/30 11:11:44 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:44 server -> Sending packet 7 (27 bytes) for connection 3d6063346f62c7e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:44 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:44 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 108.592µs} 2025/04/30 11:11:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:44 server <- Reading packet 8 (28 bytes) for connection d67ff857, 1-RTT 2025/04/30 11:11:44 server Short Header{DestConnectionID: d67ff857, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:44 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:44 Replacing connection for connection IDs [d67ff857 c02f1eda 23b4c9d4 6b88459a] with a closed connection. 2025/04/30 11:11:44 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:44 server Connection 3d6063346f62c7e7 closed. 2025/04/30 11:11:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 11:11:45 server -> Sending packet 28 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server -> Sending packet 29 (22 bytes) for connection 0f56e1f45857cf4c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:45 server -> Sending packet 25 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server -> Sending packet 26 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server <- Received Initial packet. 2025/04/30 11:11:45 Created qlog file: /logs/qlog/bd194314efd22e9d.sqlog 2025/04/30 11:11:45 server Changing connection ID to 704daea5. 2025/04/30 11:11:45 Adding connection IDs bd194314efd22e9d and 704daea5 for a new connection. 2025/04/30 11:11:45 server <- Reading packet 0 (1220 bytes) for connection bd194314efd22e9d, Initial 2025/04/30 11:11:45 server Long Header{Type: Initial, DestConnectionID: bd194314efd22e9d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:45 Adding connection ID 5aadbad6. 2025/04/30 11:11:45 Adding connection ID c2518e21. 2025/04/30 11:11:45 Adding connection ID 703953cf. 2025/04/30 11:11:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bd194314efd22e9d 2025/04/30 11:11:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 704daea5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 438, Version: v1} 2025/04/30 11:11:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 704daea5, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:11:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 703953cf, StatelessResetToken: 0x69fc694e6c67fc63ccf308f7363e22b5} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5aadbad6, StatelessResetToken: 0x0aae42e2e73f3585afd06f40aa246d46} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2518e21, StatelessResetToken: 0xafd2ed5226b276d6800b564d0962f379} 2025/04/30 11:11:45 Tracking 76 connection IDs and 0 reset tokens. 2025/04/30 11:11:45 server Destroying connection: timeout: no recent network activity 2025/04/30 11:11:45 Removing connection ID 09cd176a. 2025/04/30 11:11:45 Removing connection ID e7f505e5. 2025/04/30 11:11:45 Removing connection ID 6bf01bd9. 2025/04/30 11:11:45 Removing connection ID 0015b8f6. 2025/04/30 11:11:45 Error accepting stream: timeout: no recent network activity 2025/04/30 11:11:45 server Connection 0f56e1f45857cf4c closed. 2025/04/30 11:11:45 Removing connection ID d4f74bdd913d8647 after it has been retired. 2025/04/30 11:11:45 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:45 server -> Sending packet 1 (1280 bytes) for connection bd194314efd22e9d, Initial 2025/04/30 11:11:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 704daea5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:45 server -> Sending packet 2 (1280 bytes) for connection bd194314efd22e9d, Initial 2025/04/30 11:11:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 704daea5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:45 server Canceling loss detection timer. 2025/04/30 11:11:45 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:45 Removing connection IDs [e71b655f a6481566 b2f58fac ebf17ecf] for a closed connection after it has been retired. 2025/04/30 11:11:45 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:45 server <- Reading packet 5 (72 bytes) for connection 704daea5, Handshake 2025/04/30 11:11:45 server Long Header{Type: Handshake, DestConnectionID: 704daea5, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:45 server Dropping Initial keys. 2025/04/30 11:11:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:45 Retiring connection ID bd194314efd22e9d in 5s. 2025/04/30 11:11:45 server Dropping Handshake keys. 2025/04/30 11:11:45 server <- Reading packet 6 (1148 bytes) for connection 704daea5, 1-RTT 2025/04/30 11:11:45 server Short Header{DestConnectionID: 704daea5, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:45 server -> Sending packet 2 (325 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 341.676µs} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 703953cf, StatelessResetToken: 0x69fc694e6c67fc63ccf308f7363e22b5} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2518e21, StatelessResetToken: 0xafd2ed5226b276d6800b564d0962f379} 2025/04/30 11:11:45 server -> &wire.NewTokenFrame{Token: 0x66c90d8b69ff2b84a8e0f639103fbfd5328437cb44db19c00a4ce77513a2132d80c09d1a4d9c177dda99a8958179ead587651dfc954de54748d9571ccbaa0796859044f6134e11b7e66d615ecc3f13834312adf39d61} 2025/04/30 11:11:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5aadbad6, StatelessResetToken: 0x0aae42e2e73f3585afd06f40aa246d46} 2025/04/30 11:11:45 Received request: GET /zbjtnttpcf 2025/04/30 11:11:45 server -> Sending packet 3 (320 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2518e21, StatelessResetToken: 0xafd2ed5226b276d6800b564d0962f379} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 703953cf, StatelessResetToken: 0x69fc694e6c67fc63ccf308f7363e22b5} 2025/04/30 11:11:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5aadbad6, StatelessResetToken: 0x0aae42e2e73f3585afd06f40aa246d46} 2025/04/30 11:11:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:45 server -> &wire.NewTokenFrame{Token: 0x66c90d8b69ff2b84a8e0f639103fbfd5328437cb44db19c00a4ce77513a2132d80c09d1a4d9c177dda99a8958179ead587651dfc954de54748d9571ccbaa0796859044f6134e11b7e66d615ecc3f13834312adf39d61} 2025/04/30 11:11:45 server -> Sending packet 4 (1366 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.PingFrame{} 2025/04/30 11:11:45 server -> Sending packet 5 (1045 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:45 server <- Reading packet 7 (35 bytes) for connection 704daea5, 1-RTT 2025/04/30 11:11:45 server Short Header{DestConnectionID: 704daea5, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:45 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:45 server newly acked packets (1): [3] 2025/04/30 11:11:45 server updated RTT: 31.426279ms (σ: 15.713139ms) 2025/04/30 11:11:45 server ECN capability confirmed. 2025/04/30 11:11:45 server <- Reading packet 8 (40 bytes) for connection 704daea5, 1-RTT 2025/04/30 11:11:45 server Short Header{DestConnectionID: 704daea5, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:45 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:45 server newly acked packets (2): [4 5] 2025/04/30 11:11:45 server updated RTT: 31.64ms (σ: 12.213ms) 2025/04/30 11:11:45 server Canceling loss detection timer. 2025/04/30 11:11:45 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:45 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:45 server -> Sending packet 6 (27 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 84.747µs} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:45 server -> Sending packet 8 (22 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server -> Sending packet 9 (22 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server <- Reading packet 9 (37 bytes) for connection 704daea5, 1-RTT 2025/04/30 11:11:45 server Short Header{DestConnectionID: 704daea5, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:45 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:45 server -> Sending packet 10 (1409 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.PingFrame{} 2025/04/30 11:11:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:11:45 server -> Sending packet 22 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server -> Sending packet 23 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 Removing connection ID 8f198925234a9283 after it has been retired. 2025/04/30 11:11:45 Removing connection IDs [9158b935 0d490cb2 1e67b80c c56dee4d] for a closed connection after it has been retired. 2025/04/30 11:11:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:45 server -> Sending packet 26 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:45 server -> Sending packet 27 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:45 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:46 server -> Sending packet 12 (22 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:46 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:46 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:46 server -> Sending packet 13 (22 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:46 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:46 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:46 server <- Reading packet 13 (49 bytes) for connection 704daea5, 1-RTT 2025/04/30 11:11:46 server Short Header{DestConnectionID: 704daea5, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:46 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:46 server -> Sending packet 14 (26 bytes) for connection bd194314efd22e9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:46 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:46 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 9, Smallest: 6}}, DelayTime: 145.122µs} 2025/04/30 11:11:46 server <- Reading packet 14 (38 bytes) for connection 704daea5, 1-RTT 2025/04/30 11:11:46 server Short Header{DestConnectionID: 704daea5, PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:46 server <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 9, AckRanges: {{Largest: 14, Smallest: 12}, {Largest: 9, Smallest: 9}}, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:11:46 server newly acked packets (1): [13] 2025/04/30 11:11:46 server lost packet 10 (time threshold) 2025/04/30 11:11:46 server Canceling loss detection timer. 2025/04/30 11:11:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:46 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:46 Replacing connection for connection IDs [704daea5 5aadbad6 c2518e21 703953cf] with a closed connection. 2025/04/30 11:11:46 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:46 server Connection bd194314efd22e9d closed. 2025/04/30 11:11:46 Removing connection ID 8409c9b712407cb5 after it has been retired. 2025/04/30 11:11:46 server <- Received Initial packet. 2025/04/30 11:11:46 Created qlog file: /logs/qlog/6f12185fa97d97b5.sqlog 2025/04/30 11:11:46 server Changing connection ID to ced56970. 2025/04/30 11:11:46 Adding connection IDs 6f12185fa97d97b5 and ced56970 for a new connection. 2025/04/30 11:11:46 server <- Reading packet 1 (1220 bytes) for connection 6f12185fa97d97b5, Initial 2025/04/30 11:11:46 server Long Header{Type: Initial, DestConnectionID: 6f12185fa97d97b5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:46 Adding connection ID d4eee241. 2025/04/30 11:11:46 Adding connection ID 428338c0. 2025/04/30 11:11:46 Adding connection ID 21be93eb. 2025/04/30 11:11:46 server <- &wire.PingFrame{} 2025/04/30 11:11:46 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6f12185fa97d97b5 2025/04/30 11:11:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ced56970, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 429, Version: v1} 2025/04/30 11:11:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ced56970, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:11:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:11:46 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d4eee241, StatelessResetToken: 0x999e5c0a942edca93b4c6949503b9c48} 2025/04/30 11:11:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 428338c0, StatelessResetToken: 0x7311d5e16825f27e077951378e632c8a} 2025/04/30 11:11:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 21be93eb, StatelessResetToken: 0xb6b29ba81a7e2c7791af171ca3822366} 2025/04/30 11:11:46 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:46 server <- Reading packet 4 (72 bytes) for connection ced56970, Handshake 2025/04/30 11:11:46 server Long Header{Type: Handshake, DestConnectionID: ced56970, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:46 server Dropping Initial keys. 2025/04/30 11:11:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:46 Retiring connection ID 6f12185fa97d97b5 in 5s. 2025/04/30 11:11:46 server Dropping Handshake keys. 2025/04/30 11:11:46 server <- Reading packet 5 (1148 bytes) for connection ced56970, 1-RTT 2025/04/30 11:11:46 server Short Header{DestConnectionID: ced56970, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:46 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:46 server -> Sending packet 1 (1366 bytes) for connection 6f12185fa97d97b5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:46 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:46 server -> &wire.PingFrame{} 2025/04/30 11:11:46 Received request: GET /htpnqgxtvq 2025/04/30 11:11:46 server -> Sending packet 2 (253 bytes) for connection 6f12185fa97d97b5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:46 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:46 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 326.707µs} 2025/04/30 11:11:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:46 server -> &wire.NewTokenFrame{Token: 0xa0f40e04842d8003aa73921a7b4b88f600db0b5f5c1a1f05860d146312f3baaf4d05625264156cf964610e5de809f7c73d07e727eace584f23a263b7c434989bedaf0f6982b4868eb3e0aee3a0d492f08c42d2707ffa} 2025/04/30 11:11:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:46 server -> Sending packet 3 (1045 bytes) for connection 6f12185fa97d97b5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:46 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:46 server <- Reading packet 7 (38 bytes) for connection ced56970, 1-RTT 2025/04/30 11:11:46 server Short Header{DestConnectionID: ced56970, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:46 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:46 server newly acked packets (3): [0 2 3] 2025/04/30 11:11:46 server updated RTT: 32.903495ms (σ: 16.451747ms) 2025/04/30 11:11:46 server ECN capability confirmed. 2025/04/30 11:11:46 server setting loss timer for packet 1 (1-RTT) to 37.016431ms (in 2025-04-30 11:11:46.935432298 +0000 UTC m=+41.687645492) 2025/04/30 11:11:46 server Canceling loss detection timer. 2025/04/30 11:11:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:46 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:46 Replacing connection for connection IDs [d4eee241 428338c0 21be93eb ced56970] with a closed connection. 2025/04/30 11:11:46 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:46 server Connection 6f12185fa97d97b5 closed. 2025/04/30 11:11:47 Removing connection ID c3eabc2fa2df693c after it has been retired. 2025/04/30 11:11:47 Tracking 65 connection IDs and 0 reset tokens. 2025/04/30 11:11:47 server <- Received Initial packet. 2025/04/30 11:11:47 Created qlog file: /logs/qlog/01bdee3a12a38ff6.sqlog 2025/04/30 11:11:47 server Changing connection ID to b53eb12d. 2025/04/30 11:11:47 Adding connection IDs 01bdee3a12a38ff6 and b53eb12d for a new connection. 2025/04/30 11:11:47 server <- Reading packet 0 (1220 bytes) for connection 01bdee3a12a38ff6, Initial 2025/04/30 11:11:47 server Long Header{Type: Initial, DestConnectionID: 01bdee3a12a38ff6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:47 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:47 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:47 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:47 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:47 Adding connection ID cd62f059. 2025/04/30 11:11:47 Adding connection ID 6602b546. 2025/04/30 11:11:47 Adding connection ID db106d64. 2025/04/30 11:11:47 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 01bdee3a12a38ff6 2025/04/30 11:11:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b53eb12d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 444, Version: v1} 2025/04/30 11:11:47 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:47 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b53eb12d, PacketNumber: 0, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 11:11:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cd62f059, StatelessResetToken: 0x2ab99f2940235993b81f4ca79ae76f14} 2025/04/30 11:11:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: db106d64, StatelessResetToken: 0x814c59ed9fa0f865020d171d0ccde5b9} 2025/04/30 11:11:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6602b546, StatelessResetToken: 0x3d25e384d8f23da36012424214fed3a6} 2025/04/30 11:11:47 Removing connection IDs [38a8904f 2e93e7bf 7d5e6807 f09a5c1e] for a closed connection after it has been retired. 2025/04/30 11:11:47 server <- Reading packet 1 (77 bytes) for connection b53eb12d, Handshake 2025/04/30 11:11:47 server Long Header{Type: Handshake, DestConnectionID: b53eb12d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:47 server Dropping Initial keys. 2025/04/30 11:11:47 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:47 server newly acked packets (1): [0] 2025/04/30 11:11:47 server updated RTT: 32.322646ms (σ: 16.161323ms) 2025/04/30 11:11:47 server Canceling loss detection timer. 2025/04/30 11:11:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:47 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:47 Retiring connection ID 01bdee3a12a38ff6 in 5s. 2025/04/30 11:11:47 server Dropping Handshake keys. 2025/04/30 11:11:47 server -> Sending packet 1 (251 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.NewTokenFrame{Token: 0xe1a67473e940ea8b49589e7c55c0288401d17ec485adb2035aaddeaaeeb05ce9d7a30534e37679099c7932b6cff8a4f79bafce8c1cc64852cf2dc658f3d4625ba3a622013c0a1556888669d8a061c7f7b5906228c11c} 2025/04/30 11:11:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:47 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:47 server <- Reading packet 2 (1252 bytes) for connection b53eb12d, 1-RTT 2025/04/30 11:11:47 server Short Header{DestConnectionID: b53eb12d, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:47 server <- &wire.PingFrame{} 2025/04/30 11:11:47 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:47 server newly acked packets (1): [0] 2025/04/30 11:11:47 server updated RTT: 32.45ms (σ: 12.378ms) 2025/04/30 11:11:47 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:47 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:47 server -> Sending packet 2 (24 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 100.296µs} 2025/04/30 11:11:47 Received request: GET /gnmslitiat 2025/04/30 11:11:47 server -> Sending packet 3 (1045 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:47 server <- Reading packet 3 (1332 bytes) for connection b53eb12d, 1-RTT 2025/04/30 11:11:47 server Short Header{DestConnectionID: b53eb12d, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:47 server <- &wire.PingFrame{} 2025/04/30 11:11:47 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:47 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:47 server -> Sending packet 4 (25 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.249492ms} 2025/04/30 11:11:47 server <- Reading packet 5 (1412 bytes) for connection b53eb12d, 1-RTT 2025/04/30 11:11:47 server Short Header{DestConnectionID: b53eb12d, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:47 server <- &wire.PingFrame{} 2025/04/30 11:11:47 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:47 server -> Sending packet 5 (26 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 85.259µs} 2025/04/30 11:11:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:47 server -> Sending packet 7 (251 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:47 server -> &wire.NewTokenFrame{Token: 0xe1a67473e940ea8b49589e7c55c0288401d17ec485adb2035aaddeaaeeb05ce9d7a30534e37679099c7932b6cff8a4f79bafce8c1cc64852cf2dc658f3d4625ba3a622013c0a1556888669d8a061c7f7b5906228c11c} 2025/04/30 11:11:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:47 server Skipping packet number 6 2025/04/30 11:11:47 server -> Sending packet 8 (1045 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:47 server <- Reading packet 6 (1452 bytes) for connection b53eb12d, 1-RTT 2025/04/30 11:11:47 server Short Header{DestConnectionID: b53eb12d, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:47 server <- &wire.PingFrame{} 2025/04/30 11:11:47 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:47 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:47 server -> Sending packet 9 (27 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 25.242151ms} 2025/04/30 11:11:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:47 server -> Sending packet 11 (251 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:47 server -> &wire.NewTokenFrame{Token: 0xe1a67473e940ea8b49589e7c55c0288401d17ec485adb2035aaddeaaeeb05ce9d7a30534e37679099c7932b6cff8a4f79bafce8c1cc64852cf2dc658f3d4625ba3a622013c0a1556888669d8a061c7f7b5906228c11c} 2025/04/30 11:11:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:47 server Skipping packet number 10 2025/04/30 11:11:47 server -> Sending packet 12 (1045 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:47 server -> Sending packet 13 (1366 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:47 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:47 server -> &wire.PingFrame{} 2025/04/30 11:11:47 Removing connection ID 39fedb972f25cb5a after it has been retired. 2025/04/30 11:11:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:11:48 server -> Sending packet 15 (251 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.NewTokenFrame{Token: 0xe1a67473e940ea8b49589e7c55c0288401d17ec485adb2035aaddeaaeeb05ce9d7a30534e37679099c7932b6cff8a4f79bafce8c1cc64852cf2dc658f3d4625ba3a622013c0a1556888669d8a061c7f7b5906228c11c} 2025/04/30 11:11:48 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:48 server Skipping packet number 14 2025/04/30 11:11:48 server -> Sending packet 16 (1045 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:48 server <- Reading packet 8 (46 bytes) for connection b53eb12d, 1-RTT 2025/04/30 11:11:48 server Short Header{DestConnectionID: b53eb12d, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:48 server <- &wire.AckFrame{LargestAcked: 16, LowestAcked: 1, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:11:48 server newly acked packets (1): [16] 2025/04/30 11:11:48 server updated RTT: 32.405ms (σ: 9.371ms) 2025/04/30 11:11:48 server lost packet 13 (time threshold) 2025/04/30 11:11:48 server setting loss timer for packet 15 (1-RTT) to 36.455625ms (in 2025-04-30 11:11:48.108241521 +0000 UTC m=+42.860454705) 2025/04/30 11:11:48 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:48 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:48 server -> Sending packet 17 (1323 bytes) for connection 01bdee3a12a38ff6, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.PingFrame{} 2025/04/30 11:11:48 server <- Reading packet 9 (28 bytes) for connection b53eb12d, 1-RTT 2025/04/30 11:11:48 server Short Header{DestConnectionID: b53eb12d, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:48 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:48 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:48 Replacing connection for connection IDs [b53eb12d cd62f059 6602b546 db106d64] with a closed connection. 2025/04/30 11:11:48 server Connection 01bdee3a12a38ff6 closed. 2025/04/30 11:11:48 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:48 server -> Sending packet 27 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:48 server -> Sending packet 28 (22 bytes) for connection 19802d619642251f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:48 server -> Sending packet 23 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:48 server -> Sending packet 24 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:48 Removing connection ID 9f4593865fcb60e6 after it has been retired. 2025/04/30 11:11:48 server <- Received Initial packet. 2025/04/30 11:11:48 Created qlog file: /logs/qlog/fcdb75eac242af0e.sqlog 2025/04/30 11:11:48 server Changing connection ID to cdb99ece. 2025/04/30 11:11:48 Adding connection IDs fcdb75eac242af0e and cdb99ece for a new connection. 2025/04/30 11:11:48 server <- Reading packet 1 (1220 bytes) for connection fcdb75eac242af0e, Initial 2025/04/30 11:11:48 server Long Header{Type: Initial, DestConnectionID: fcdb75eac242af0e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:48 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:48 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:48 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:48 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:48 Adding connection ID 1e0d4b53. 2025/04/30 11:11:48 Adding connection ID cf85403d. 2025/04/30 11:11:48 Adding connection ID 553f4a4d. 2025/04/30 11:11:48 server <- &wire.PingFrame{} 2025/04/30 11:11:48 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fcdb75eac242af0e 2025/04/30 11:11:48 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cdb99ece, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 428, Version: v1} 2025/04/30 11:11:48 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:48 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cdb99ece, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 11:11:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e0d4b53, StatelessResetToken: 0x34479479e430c87c91b70f6c058e0b10} 2025/04/30 11:11:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 553f4a4d, StatelessResetToken: 0x83810b01b35911c097e40f9980e0eec7} 2025/04/30 11:11:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cf85403d, StatelessResetToken: 0x29acd5fbdca876c703aff801445b20ac} 2025/04/30 11:11:48 server <- Reading packet 2 (77 bytes) for connection cdb99ece, Handshake 2025/04/30 11:11:48 server Long Header{Type: Handshake, DestConnectionID: cdb99ece, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:48 server Dropping Initial keys. 2025/04/30 11:11:48 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:11:48 server newly acked packets (1): [0] 2025/04/30 11:11:48 server updated RTT: 32.659653ms (σ: 16.329826ms) 2025/04/30 11:11:48 server Canceling loss detection timer. 2025/04/30 11:11:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:48 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:48 Retiring connection ID fcdb75eac242af0e in 5s. 2025/04/30 11:11:48 server Dropping Handshake keys. 2025/04/30 11:11:48 server -> Sending packet 1 (251 bytes) for connection fcdb75eac242af0e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.NewTokenFrame{Token: 0xafcd4e1960b067b6d3cb0754ddf9dc571b4df5d90bf4a32cae711bd658bb35af6c0166d3678436568613fc3ee13b8b8e8b3220dbafb3626956388a511d0dfa5a44ab20f6e5f5413aa06fc305ed131a66345d1c7b1300} 2025/04/30 11:11:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:48 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:48 server <- Reading packet 3 (1252 bytes) for connection cdb99ece, 1-RTT 2025/04/30 11:11:48 server Short Header{DestConnectionID: cdb99ece, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:48 server <- &wire.PingFrame{} 2025/04/30 11:11:48 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:48 server newly acked packets (1): [0] 2025/04/30 11:11:48 server updated RTT: 32.782ms (σ: 12.494ms) 2025/04/30 11:11:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:48 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:48 server -> Sending packet 2 (24 bytes) for connection fcdb75eac242af0e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 105.506µs} 2025/04/30 11:11:48 Received request: GET /dvwswdhuqa 2025/04/30 11:11:48 server -> Sending packet 3 (1045 bytes) for connection fcdb75eac242af0e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:48 server <- Reading packet 4 (1332 bytes) for connection cdb99ece, 1-RTT 2025/04/30 11:11:48 server Short Header{DestConnectionID: cdb99ece, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:48 server <- &wire.PingFrame{} 2025/04/30 11:11:48 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:48 server <- Reading packet 5 (38 bytes) for connection cdb99ece, 1-RTT 2025/04/30 11:11:48 server Short Header{DestConnectionID: cdb99ece, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:48 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:48 server newly acked packets (2): [1 3] 2025/04/30 11:11:48 server updated RTT: 32.636ms (σ: 9.66ms) 2025/04/30 11:11:48 server ECN capability confirmed. 2025/04/30 11:11:48 server Canceling loss detection timer. 2025/04/30 11:11:48 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:48 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:11:48 server <- Reading packet 6 (28 bytes) for connection cdb99ece, 1-RTT 2025/04/30 11:11:48 server Short Header{DestConnectionID: cdb99ece, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:48 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:48 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:48 Replacing connection for connection IDs [553f4a4d cdb99ece 1e0d4b53 cf85403d] with a closed connection. 2025/04/30 11:11:48 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:48 server Connection fcdb75eac242af0e closed. 2025/04/30 11:11:48 Removing connection IDs [d509b2f2 b8741d9c a295278d 16fbae58] for a closed connection after it has been retired. 2025/04/30 11:11:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:11:48 server -> Sending packet 25 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:48 server -> Sending packet 26 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:48 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:48 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:49 server <- Received Initial packet. 2025/04/30 11:11:49 Created qlog file: /logs/qlog/60976d11ae09aaaf.sqlog 2025/04/30 11:11:49 server Changing connection ID to 87854e3b. 2025/04/30 11:11:49 Adding connection IDs 60976d11ae09aaaf and 87854e3b for a new connection. 2025/04/30 11:11:49 server <- Reading packet 0 (1220 bytes) for connection 60976d11ae09aaaf, Initial 2025/04/30 11:11:49 server Long Header{Type: Initial, DestConnectionID: 60976d11ae09aaaf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:49 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:49 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:49 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:49 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:49 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:49 Adding connection ID b1a1ca80. 2025/04/30 11:11:49 Adding connection ID 1ec9510f. 2025/04/30 11:11:49 Adding connection ID 4b41a88d. 2025/04/30 11:11:49 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 60976d11ae09aaaf 2025/04/30 11:11:49 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 87854e3b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:11:49 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:49 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 87854e3b, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:11:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:11:49 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b1a1ca80, StatelessResetToken: 0xc74a255bc42d1f4b4d685a7754953fb6} 2025/04/30 11:11:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1ec9510f, StatelessResetToken: 0x62dc46e61a508c081b2106e22b535737} 2025/04/30 11:11:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4b41a88d, StatelessResetToken: 0xe2a14760953ae8bcc6452b887f8fe2fc} 2025/04/30 11:11:49 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:49 server -> Sending packet 1 (1280 bytes) for connection 60976d11ae09aaaf, Initial 2025/04/30 11:11:49 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 87854e3b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:49 server -> Sending packet 2 (1280 bytes) for connection 60976d11ae09aaaf, Initial 2025/04/30 11:11:49 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 87854e3b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:49 server Canceling loss detection timer. 2025/04/30 11:11:49 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:49 Tracking 70 connection IDs and 0 reset tokens. 2025/04/30 11:11:49 server <- Reading packet 3 (1220 bytes) for connection 87854e3b, Initial 2025/04/30 11:11:49 server Long Header{Type: Initial, DestConnectionID: 87854e3b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:49 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:49 server <- &wire.PingFrame{} 2025/04/30 11:11:49 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:11:49 server -> Sending packet 1 (741 bytes) for connection 60976d11ae09aaaf, Handshake 2025/04/30 11:11:49 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 87854e3b, PacketNumber: 1, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:11:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:11:49 server -> Sending packet 2 (741 bytes) for connection 60976d11ae09aaaf, Handshake 2025/04/30 11:11:49 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 87854e3b, PacketNumber: 2, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:11:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:11:49 server -> Sending packet 3 (39 bytes) for connection 60976d11ae09aaaf, Initial 2025/04/30 11:11:49 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 87854e3b, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:11:49 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:11:49 server Queueing packet (1220 bytes) for later decryption 2025/04/30 11:11:49 Removing connection ID 3d6063346f62c7e7 after it has been retired. 2025/04/30 11:11:49 server <- Reading packet 6 (39 bytes) for connection 87854e3b, Handshake 2025/04/30 11:11:49 server Long Header{Type: Handshake, DestConnectionID: 87854e3b, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 26, Version: v1} 2025/04/30 11:11:49 server Dropping Initial keys. 2025/04/30 11:11:49 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 11:11:49 server newly acked packets (1): [2] 2025/04/30 11:11:49 server updated RTT: 57.061886ms (σ: 28.530943ms) 2025/04/30 11:11:49 server Canceling loss detection timer. 2025/04/30 11:11:49 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:49 server -> Sending packet 25 (251 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:49 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:49 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:49 server -> &wire.NewTokenFrame{Token: 0xa7d95433372225d056b684dd4c1776c1375cfe19b36f0d6b1c5e235c10272f78d461c7f41eee2d32094b4a47b25e5dfc1f795c40117d4db456d6b41fddc8cad393e4b0691fb1d2045a32e3cd701a81e35e29f394ebbc} 2025/04/30 11:11:49 server Skipping packet number 24 2025/04/30 11:11:49 server -> Sending packet 26 (1045 bytes) for connection f8f6dc75fd1873b9, 1-RTT (ECN: Not-ECT) 2025/04/30 11:11:49 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:49 Removing connection IDs [d67ff857 c02f1eda 23b4c9d4 6b88459a] for a closed connection after it has been retired. 2025/04/30 11:11:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:50 server -> Sending packet 29 (22 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:50 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:50 server Skipping packet number 28 2025/04/30 11:11:50 server -> Sending packet 30 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:50 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:50 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:50 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:11:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:50 Removing connection ID bd194314efd22e9d after it has been retired. 2025/04/30 11:11:50 server Destroying connection: timeout: no recent network activity 2025/04/30 11:11:50 Removing connection ID f691c2b8. 2025/04/30 11:11:50 Removing connection ID 773e4dc7. 2025/04/30 11:11:50 Error accepting stream: timeout: no recent network activity 2025/04/30 11:11:50 Removing connection ID 8fe497da. 2025/04/30 11:11:50 Removing connection ID e2d3f135. 2025/04/30 11:11:50 server Connection 615da66b8ac4f14a closed. 2025/04/30 11:11:51 Removing connection IDs [704daea5 5aadbad6 c2518e21 703953cf] for a closed connection after it has been retired. 2025/04/30 11:11:51 Tracking 56 connection IDs and 0 reset tokens. 2025/04/30 11:11:51 Removing connection ID 6f12185fa97d97b5 after it has been retired. 2025/04/30 11:11:51 Removing connection IDs [d4eee241 428338c0 21be93eb ced56970] for a closed connection after it has been retired. 2025/04/30 11:11:52 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:52 server -> Sending packet 29 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:52 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:52 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:52 server -> Sending packet 30 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:52 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:52 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:52 Removing connection ID 01bdee3a12a38ff6 after it has been retired. 2025/04/30 11:11:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:53 server -> Sending packet 28 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:53 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:53 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:53 server -> Sending packet 29 (22 bytes) for connection 520482229c69dff6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:53 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:53 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:53 Removing connection IDs [b53eb12d cd62f059 6602b546 db106d64] for a closed connection after it has been retired. 2025/04/30 11:11:53 Tracking 46 connection IDs and 0 reset tokens. 2025/04/30 11:11:53 Removing connection ID fcdb75eac242af0e after it has been retired. 2025/04/30 11:11:53 Removing connection IDs [553f4a4d cdb99ece 1e0d4b53 cf85403d] for a closed connection after it has been retired. 2025/04/30 11:11:53 server Destroying connection: timeout: no recent network activity 2025/04/30 11:11:53 Removing connection ID e944f4fe. 2025/04/30 11:11:53 Removing connection ID 7d2cb74e. 2025/04/30 11:11:53 Removing connection ID 40e7ebba. 2025/04/30 11:11:53 Removing connection ID 7da9289a. 2025/04/30 11:11:53 Error accepting stream: timeout: no recent network activity 2025/04/30 11:11:53 server Connection 131dac628364b1b3 closed. 2025/04/30 11:11:53 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:53 server <- Reading packet 11 (72 bytes) for connection 87854e3b, Handshake 2025/04/30 11:11:53 server Long Header{Type: Handshake, DestConnectionID: 87854e3b, SrcConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:53 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:53 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:53 Retiring connection ID 60976d11ae09aaaf in 5s. 2025/04/30 11:11:53 server Dropping Handshake keys. 2025/04/30 11:11:53 server <- Reading packet 12 (1148 bytes) for connection 87854e3b, 1-RTT 2025/04/30 11:11:53 server Short Header{DestConnectionID: 87854e3b, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:53 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:53 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:53 server -> Sending packet 2 (328 bytes) for connection 60976d11ae09aaaf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:53 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:53 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 12, DelayTime: 313.252µs} 2025/04/30 11:11:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4b41a88d, StatelessResetToken: 0xe2a14760953ae8bcc6452b887f8fe2fc} 2025/04/30 11:11:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b1a1ca80, StatelessResetToken: 0xc74a255bc42d1f4b4d685a7754953fb6} 2025/04/30 11:11:53 Received request: GET /lpizhinpuo 2025/04/30 11:11:53 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1ec9510f, StatelessResetToken: 0x62dc46e61a508c081b2106e22b535737} 2025/04/30 11:11:53 server -> &wire.NewTokenFrame{Token: 0xe05602dcf276c87b50d436c32bf90c3cea6ca45fec7d12ea832d4b65b5c01d1dd5256759a7b612d6781901d2566e79cfbfba500310111e12fd97dfc2068681c8a95996cfb49c7ffac6f5bfc1e90e9993d2627702544d} 2025/04/30 11:11:53 server -> Sending packet 3 (323 bytes) for connection 60976d11ae09aaaf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:53 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b1a1ca80, StatelessResetToken: 0xc74a255bc42d1f4b4d685a7754953fb6} 2025/04/30 11:11:53 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1ec9510f, StatelessResetToken: 0x62dc46e61a508c081b2106e22b535737} 2025/04/30 11:11:53 server -> &wire.NewTokenFrame{Token: 0xe05602dcf276c87b50d436c32bf90c3cea6ca45fec7d12ea832d4b65b5c01d1dd5256759a7b612d6781901d2566e79cfbfba500310111e12fd97dfc2068681c8a95996cfb49c7ffac6f5bfc1e90e9993d2627702544d} 2025/04/30 11:11:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4b41a88d, StatelessResetToken: 0xe2a14760953ae8bcc6452b887f8fe2fc} 2025/04/30 11:11:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:53 server -> Sending packet 4 (1045 bytes) for connection 60976d11ae09aaaf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:53 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:53 server <- Reading packet 5 (1220 bytes) for connection 87854e3b, 1-RTT 2025/04/30 11:11:53 server Short Header{DestConnectionID: 87854e3b, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:53 server <- &wire.PingFrame{} 2025/04/30 11:11:53 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:53 server Queueing ACK because packet 5 was missing before. 2025/04/30 11:11:53 server -> Sending packet 5 (27 bytes) for connection 60976d11ae09aaaf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:53 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:53 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 5, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 5, Smallest: 5}}, DelayTime: 672.91µs} 2025/04/30 11:11:53 server <- Reading packet 13 (1252 bytes) for connection 87854e3b, 1-RTT 2025/04/30 11:11:53 server Short Header{DestConnectionID: 87854e3b, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:53 server <- &wire.PingFrame{} 2025/04/30 11:11:53 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:53 server <- Reading packet 14 (36 bytes) for connection 87854e3b, 1-RTT 2025/04/30 11:11:53 server Short Header{DestConnectionID: 87854e3b, PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:53 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 25.088ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:53 server newly acked packets (1): [3] 2025/04/30 11:11:53 server ECN capability confirmed. 2025/04/30 11:11:53 server setting loss timer for packet 4 (1-RTT) to 64.194621ms (in 2025-04-30 11:11:53.774652939 +0000 UTC m=+48.526866133) 2025/04/30 11:11:53 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:53 server -> Sending packet 6 (27 bytes) for connection 60976d11ae09aaaf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:53 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:53 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 5, AckRanges: {{Largest: 14, Smallest: 12}, {Largest: 5, Smallest: 5}}, DelayTime: 1.103137ms} 2025/04/30 11:11:53 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:11:53.774652939 +0000 UTC m=+48.526866133 2025/04/30 11:11:53 server lost packet 4 (time threshold) 2025/04/30 11:11:53 server Canceling loss detection timer. 2025/04/30 11:11:53 server -> Sending packet 7 (1045 bytes) for connection 60976d11ae09aaaf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:53 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:53 server <- Reading packet 16 (36 bytes) for connection 87854e3b, 1-RTT 2025/04/30 11:11:53 server Short Header{DestConnectionID: 87854e3b, PacketNumber: 16, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:53 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 256µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:53 server newly acked packets (1): [7] 2025/04/30 11:11:53 server updated RTT: 53.899ms (σ: 27.72ms) 2025/04/30 11:11:53 server Canceling loss detection timer. 2025/04/30 11:11:53 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:53 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:53 Replacing connection for connection IDs [87854e3b b1a1ca80 1ec9510f 4b41a88d] with a closed connection. 2025/04/30 11:11:53 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:53 server Connection 60976d11ae09aaaf closed. 2025/04/30 11:11:54 server <- Received Initial packet. 2025/04/30 11:11:54 Created qlog file: /logs/qlog/d0e230942575b7f7.sqlog 2025/04/30 11:11:54 server Changing connection ID to 25f327d4. 2025/04/30 11:11:54 Adding connection IDs d0e230942575b7f7 and 25f327d4 for a new connection. 2025/04/30 11:11:54 server <- Reading packet 1 (1220 bytes) for connection d0e230942575b7f7, Initial 2025/04/30 11:11:54 server Long Header{Type: Initial, DestConnectionID: d0e230942575b7f7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:54 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:54 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:54 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:54 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:54 Adding connection ID 974657d1. 2025/04/30 11:11:54 Adding connection ID 2c1fbd46. 2025/04/30 11:11:54 Adding connection ID a07e1919. 2025/04/30 11:11:54 server <- &wire.PingFrame{} 2025/04/30 11:11:54 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d0e230942575b7f7 2025/04/30 11:11:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 25f327d4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:11:54 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 25f327d4, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c1fbd46, StatelessResetToken: 0x1d4e6ccf42c15ae193dea8d73dbd1ab2} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a07e1919, StatelessResetToken: 0x0fb08018e5e388828e45e2e8732bd063} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 974657d1, StatelessResetToken: 0xb4e45793dc3e65e963ae180e58fd6c22} 2025/04/30 11:11:54 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:54 server -> Sending packet 1 (1280 bytes) for connection d0e230942575b7f7, Initial 2025/04/30 11:11:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 25f327d4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:54 server -> Sending packet 2 (1280 bytes) for connection d0e230942575b7f7, Initial 2025/04/30 11:11:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 25f327d4, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:54 server Canceling loss detection timer. 2025/04/30 11:11:54 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:54 server Destroying connection: timeout: no recent network activity 2025/04/30 11:11:54 Error accepting stream: timeout: no recent network activity 2025/04/30 11:11:54 Removing connection ID 140e7c55. 2025/04/30 11:11:54 Removing connection ID bf77acc4. 2025/04/30 11:11:54 Removing connection ID 5f0681ec. 2025/04/30 11:11:54 Removing connection ID c525d432. 2025/04/30 11:11:54 server Connection 8e73b4a5c4a266ca closed. 2025/04/30 11:11:54 server <- Reading packet 2 (1220 bytes) for connection 25f327d4, Initial 2025/04/30 11:11:54 server Long Header{Type: Initial, DestConnectionID: 25f327d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:54 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:11:54 server newly acked packets (1): [2] 2025/04/30 11:11:54 server updated RTT: 33.819489ms (σ: 16.909744ms) 2025/04/30 11:11:54 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:11:54 server -> Sending packet 1 (739 bytes) for connection d0e230942575b7f7, Handshake 2025/04/30 11:11:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 25f327d4, PacketNumber: 1, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:54 server -> Sending packet 2 (739 bytes) for connection d0e230942575b7f7, Handshake 2025/04/30 11:11:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 25f327d4, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:11:54 server <- Reading packet 3 (77 bytes) for connection 25f327d4, Handshake 2025/04/30 11:11:54 server Long Header{Type: Handshake, DestConnectionID: 25f327d4, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:54 server Dropping Initial keys. 2025/04/30 11:11:54 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:11:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:54 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:54 Retiring connection ID d0e230942575b7f7 in 5s. 2025/04/30 11:11:54 server Dropping Handshake keys. 2025/04/30 11:11:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:54 server -> Sending packet 2 (323 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.NewTokenFrame{Token: 0x0653cf08901dff01b226fa9203aa6c7110f3be23657293613e07aa44e656c9bcac12274f5a6b81376fc6aa1a94fdc44eed9320e6656e6c5bc72a24af78f7df184b029fdeabaf2b0779ec8466ea084ee9dfa1a256309c} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 974657d1, StatelessResetToken: 0xb4e45793dc3e65e963ae180e58fd6c22} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c1fbd46, StatelessResetToken: 0x1d4e6ccf42c15ae193dea8d73dbd1ab2} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a07e1919, StatelessResetToken: 0x0fb08018e5e388828e45e2e8732bd063} 2025/04/30 11:11:54 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:54 server -> Sending packet 3 (323 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.NewTokenFrame{Token: 0x0653cf08901dff01b226fa9203aa6c7110f3be23657293613e07aa44e656c9bcac12274f5a6b81376fc6aa1a94fdc44eed9320e6656e6c5bc72a24af78f7df184b029fdeabaf2b0779ec8466ea084ee9dfa1a256309c} 2025/04/30 11:11:54 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a07e1919, StatelessResetToken: 0x0fb08018e5e388828e45e2e8732bd063} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c1fbd46, StatelessResetToken: 0x1d4e6ccf42c15ae193dea8d73dbd1ab2} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 974657d1, StatelessResetToken: 0xb4e45793dc3e65e963ae180e58fd6c22} 2025/04/30 11:11:54 server <- Reading packet 4 (1220 bytes) for connection 25f327d4, 1-RTT 2025/04/30 11:11:54 server Short Header{DestConnectionID: 25f327d4, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:54 server <- &wire.PingFrame{} 2025/04/30 11:11:54 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:54 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:54 server -> Sending packet 4 (24 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 140.731µs} 2025/04/30 11:11:54 Received request: GET /jcloopopot 2025/04/30 11:11:54 server -> Sending packet 5 (1045 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:54 server Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:11:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:11:54 server -> Sending packet 7 (323 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 974657d1, StatelessResetToken: 0xb4e45793dc3e65e963ae180e58fd6c22} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a07e1919, StatelessResetToken: 0x0fb08018e5e388828e45e2e8732bd063} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c1fbd46, StatelessResetToken: 0x1d4e6ccf42c15ae193dea8d73dbd1ab2} 2025/04/30 11:11:54 server -> &wire.NewTokenFrame{Token: 0x0653cf08901dff01b226fa9203aa6c7110f3be23657293613e07aa44e656c9bcac12274f5a6b81376fc6aa1a94fdc44eed9320e6656e6c5bc72a24af78f7df184b029fdeabaf2b0779ec8466ea084ee9dfa1a256309c} 2025/04/30 11:11:54 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:54 server Skipping packet number 6 2025/04/30 11:11:54 server -> Sending packet 8 (1045 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:54 server -> Sending packet 9 (1366 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.PingFrame{} 2025/04/30 11:11:54 server <- Reading packet 7 (40 bytes) for connection 25f327d4, 1-RTT 2025/04/30 11:11:54 server Short Header{DestConnectionID: 25f327d4, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:54 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:54 server newly acked packets (1): [8] 2025/04/30 11:11:54 server updated RTT: 33.605ms (σ: 13.108ms) 2025/04/30 11:11:54 server ECN capability confirmed. 2025/04/30 11:11:54 server setting loss timer for packet 7 (1-RTT) to 37.805625ms (in 2025-04-30 11:11:54.909006935 +0000 UTC m=+49.661220129) 2025/04/30 11:11:54 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:54 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:54 server -> Sending packet 10 (29 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 151.361µs} 2025/04/30 11:11:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:54 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:11:54.909006935 +0000 UTC m=+49.661220129 2025/04/30 11:11:54 server lost packet 7 (time threshold) 2025/04/30 11:11:54 server -> Sending packet 11 (323 bytes) for connection d0e230942575b7f7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:54 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:54 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a07e1919, StatelessResetToken: 0x0fb08018e5e388828e45e2e8732bd063} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 974657d1, StatelessResetToken: 0xb4e45793dc3e65e963ae180e58fd6c22} 2025/04/30 11:11:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:54 server -> &wire.NewTokenFrame{Token: 0x0653cf08901dff01b226fa9203aa6c7110f3be23657293613e07aa44e656c9bcac12274f5a6b81376fc6aa1a94fdc44eed9320e6656e6c5bc72a24af78f7df184b029fdeabaf2b0779ec8466ea084ee9dfa1a256309c} 2025/04/30 11:11:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c1fbd46, StatelessResetToken: 0x1d4e6ccf42c15ae193dea8d73dbd1ab2} 2025/04/30 11:11:54 server <- Reading packet 8 (36 bytes) for connection 25f327d4, 1-RTT 2025/04/30 11:11:54 server Short Header{DestConnectionID: 25f327d4, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:54 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 3, Smallest: 2}}, DelayTime: 25.088ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:11:54 server newly acked packets (1): [9] 2025/04/30 11:11:54 server updated RTT: 33.53ms (σ: 9.979ms) 2025/04/30 11:11:54 server <- Reading packet 9 (1252 bytes) for connection 25f327d4, 1-RTT 2025/04/30 11:11:54 server Short Header{DestConnectionID: 25f327d4, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:54 server <- &wire.PingFrame{} 2025/04/30 11:11:54 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:54 server <- Reading packet 10 (36 bytes) for connection 25f327d4, 1-RTT 2025/04/30 11:11:54 server Short Header{DestConnectionID: 25f327d4, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:54 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:11:54 server newly acked packets (1): [10] 2025/04/30 11:11:54 server updated RTT: 33.294ms (σ: 7.954ms) 2025/04/30 11:11:54 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:54 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:54 Replacing connection for connection IDs [a07e1919 25f327d4 974657d1 2c1fbd46] with a closed connection. 2025/04/30 11:11:54 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:54 server Connection d0e230942575b7f7 closed. 2025/04/30 11:11:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:55 server -> Sending packet 26 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:55 server -> Sending packet 27 (1045 bytes) for connection 8409c9b712407cb5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:11:55 server -> Sending packet 28 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:55 server -> Sending packet 29 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:55 Tracking 38 connection IDs and 0 reset tokens. 2025/04/30 11:11:55 server <- Received Initial packet. 2025/04/30 11:11:55 Created qlog file: /logs/qlog/481784242e5fb73b.sqlog 2025/04/30 11:11:55 server Changing connection ID to 8fec9939. 2025/04/30 11:11:55 Adding connection IDs 481784242e5fb73b and 8fec9939 for a new connection. 2025/04/30 11:11:55 server <- Reading packet 0 (1220 bytes) for connection 481784242e5fb73b, Initial 2025/04/30 11:11:55 server Long Header{Type: Initial, DestConnectionID: 481784242e5fb73b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:55 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:55 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:55 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:55 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:55 Adding connection ID 37abdc55. 2025/04/30 11:11:55 Adding connection ID 51b518aa. 2025/04/30 11:11:55 Adding connection ID 43d90446. 2025/04/30 11:11:55 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 481784242e5fb73b 2025/04/30 11:11:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8fec9939, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 440, Version: v1} 2025/04/30 11:11:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8fec9939, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:11:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 51b518aa, StatelessResetToken: 0xcbef05199a1afa6fde96372aa5944ca4} 2025/04/30 11:11:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 43d90446, StatelessResetToken: 0xd3a87e9f262d18bdf58bc56846511034} 2025/04/30 11:11:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 37abdc55, StatelessResetToken: 0x933d971a23bc22c5948b23b3bdba7e97} 2025/04/30 11:11:55 server <- Reading packet 1 (77 bytes) for connection 8fec9939, Handshake 2025/04/30 11:11:55 server Long Header{Type: Handshake, DestConnectionID: 8fec9939, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:55 server Dropping Initial keys. 2025/04/30 11:11:55 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:55 server newly acked packets (1): [0] 2025/04/30 11:11:55 server updated RTT: 32.501179ms (σ: 16.250589ms) 2025/04/30 11:11:55 server Canceling loss detection timer. 2025/04/30 11:11:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:55 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:55 Retiring connection ID 481784242e5fb73b in 5s. 2025/04/30 11:11:55 server Dropping Handshake keys. 2025/04/30 11:11:55 server -> Sending packet 1 (251 bytes) for connection 481784242e5fb73b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.NewTokenFrame{Token: 0xc7114608c900f9c53a790d4eceef4c5fd6d4549eda387b35e4631f1c44a24f5ab5730ec430423c5718c4ad8d12794611e34d7eec2480f981c7e8d735f006b580cd012d6557958bda299f6e07cc73e36f31e47be66f7a} 2025/04/30 11:11:55 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:55 server <- Reading packet 2 (1252 bytes) for connection 8fec9939, 1-RTT 2025/04/30 11:11:55 server Short Header{DestConnectionID: 8fec9939, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:55 server <- &wire.PingFrame{} 2025/04/30 11:11:55 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:55 server newly acked packets (1): [0] 2025/04/30 11:11:55 server updated RTT: 32.623ms (σ: 12.431ms) 2025/04/30 11:11:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:55 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:55 server -> Sending packet 2 (24 bytes) for connection 481784242e5fb73b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 106.809µs} 2025/04/30 11:11:55 Received request: GET /gfcsvapipq 2025/04/30 11:11:55 server -> Sending packet 3 (1045 bytes) for connection 481784242e5fb73b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:55 server <- Reading packet 3 (1332 bytes) for connection 8fec9939, 1-RTT 2025/04/30 11:11:55 server Short Header{DestConnectionID: 8fec9939, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:55 server <- &wire.PingFrame{} 2025/04/30 11:11:55 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:55 server <- Reading packet 4 (34 bytes) for connection 8fec9939, 1-RTT 2025/04/30 11:11:55 server Short Header{DestConnectionID: 8fec9939, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:55 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.088ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:55 server newly acked packets (1): [1] 2025/04/30 11:11:55 server ECN capability confirmed. 2025/04/30 11:11:55 server Sending ACK because the ACK timer expired. 2025/04/30 11:11:55 server -> Sending packet 4 (25 bytes) for connection 481784242e5fb73b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 1.101718ms} 2025/04/30 11:11:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:55 server -> Sending packet 6 (1045 bytes) for connection 481784242e5fb73b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:55 server -> Sending packet 7 (1045 bytes) for connection 481784242e5fb73b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:55 server <- Reading packet 5 (40 bytes) for connection 8fec9939, 1-RTT 2025/04/30 11:11:55 server Short Header{DestConnectionID: 8fec9939, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:55 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:55 server newly acked packets (1): [7] 2025/04/30 11:11:55 server updated RTT: 32.612ms (σ: 9.343ms) 2025/04/30 11:11:55 server Canceling loss detection timer. 2025/04/30 11:11:55 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:55 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:55 server <- Reading packet 6 (28 bytes) for connection 8fec9939, 1-RTT 2025/04/30 11:11:55 server Short Header{DestConnectionID: 8fec9939, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:55 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:55 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:55 Replacing connection for connection IDs [8fec9939 37abdc55 51b518aa 43d90446] with a closed connection. 2025/04/30 11:11:55 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:55 server Connection 481784242e5fb73b closed. 2025/04/30 11:11:55 server <- Received Initial packet. 2025/04/30 11:11:55 Created qlog file: /logs/qlog/4a6f343bf9286aa1.sqlog 2025/04/30 11:11:55 server Changing connection ID to 072d309b. 2025/04/30 11:11:55 Adding connection IDs 4a6f343bf9286aa1 and 072d309b for a new connection. 2025/04/30 11:11:55 server <- Reading packet 0 (1220 bytes) for connection 4a6f343bf9286aa1, Initial 2025/04/30 11:11:55 server Long Header{Type: Initial, DestConnectionID: 4a6f343bf9286aa1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:55 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:55 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:55 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:55 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:55 Adding connection ID 9488624b. 2025/04/30 11:11:55 Adding connection ID 03363c07. 2025/04/30 11:11:55 Adding connection ID 3c5102db. 2025/04/30 11:11:55 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4a6f343bf9286aa1 2025/04/30 11:11:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 072d309b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:11:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 072d309b, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:55 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03363c07, StatelessResetToken: 0x07a173afbdf4ee23686e749cae9c0709} 2025/04/30 11:11:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3c5102db, StatelessResetToken: 0x2522ed700512cde36066476e0dcd0ed7} 2025/04/30 11:11:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9488624b, StatelessResetToken: 0x82e7b9bbfbb463c0bb0c7ededfb7813c} 2025/04/30 11:11:56 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:11:56 server -> Sending packet 1 (1280 bytes) for connection 4a6f343bf9286aa1, Initial 2025/04/30 11:11:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 072d309b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:56 server -> Sending packet 2 (1280 bytes) for connection 4a6f343bf9286aa1, Initial 2025/04/30 11:11:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 072d309b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:56 server Canceling loss detection timer. 2025/04/30 11:11:56 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:11:56 server <- Reading packet 4 (1220 bytes) for connection 072d309b, Initial 2025/04/30 11:11:56 server Long Header{Type: Initial, DestConnectionID: 072d309b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:11:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:56 server <- &wire.PingFrame{} 2025/04/30 11:11:56 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:11:56 server -> Sending packet 1 (744 bytes) for connection 4a6f343bf9286aa1, Handshake 2025/04/30 11:11:56 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 072d309b, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:56 server -> Sending packet 2 (744 bytes) for connection 4a6f343bf9286aa1, Handshake 2025/04/30 11:11:56 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 072d309b, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:11:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:11:56 server -> Sending packet 3 (39 bytes) for connection 4a6f343bf9286aa1, Initial 2025/04/30 11:11:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 072d309b, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:11:56 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:11:56 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:11:56 server -> Sending packet 4 (1280 bytes) for connection 4a6f343bf9286aa1, Initial 2025/04/30 11:11:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 072d309b, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:56 server -> Sending packet 5 (1280 bytes) for connection 4a6f343bf9286aa1, Initial 2025/04/30 11:11:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 072d309b, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:11:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:56 server Canceling loss detection timer. 2025/04/30 11:11:56 server Amplification window limited. Received 2440 bytes, already sent out 7927 bytes 2025/04/30 11:11:56 server <- Reading packet 5 (77 bytes) for connection 072d309b, Handshake 2025/04/30 11:11:56 server Long Header{Type: Handshake, DestConnectionID: 072d309b, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:56 server Dropping Initial keys. 2025/04/30 11:11:56 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:11:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:56 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:56 Retiring connection ID 4a6f343bf9286aa1 in 5s. 2025/04/30 11:11:56 server Dropping Handshake keys. 2025/04/30 11:11:56 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:56 server -> Sending packet 2 (320 bytes) for connection 4a6f343bf9286aa1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:56 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:56 server -> &wire.NewTokenFrame{Token: 0xac0b43db46ad01519fe090c82acd948722b8d4bd281b6304aca4f339b8a69853b3c2bafbf671ba7187b59a3c8843bd01f218a31606f61d963eef6ee9805ce99a8ac2b8e780a0d7160e2a0c40fd867f98dd028faa13c2} 2025/04/30 11:11:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9488624b, StatelessResetToken: 0x82e7b9bbfbb463c0bb0c7ededfb7813c} 2025/04/30 11:11:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03363c07, StatelessResetToken: 0x07a173afbdf4ee23686e749cae9c0709} 2025/04/30 11:11:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3c5102db, StatelessResetToken: 0x2522ed700512cde36066476e0dcd0ed7} 2025/04/30 11:11:56 server -> Sending packet 3 (320 bytes) for connection 4a6f343bf9286aa1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:56 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9488624b, StatelessResetToken: 0x82e7b9bbfbb463c0bb0c7ededfb7813c} 2025/04/30 11:11:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03363c07, StatelessResetToken: 0x07a173afbdf4ee23686e749cae9c0709} 2025/04/30 11:11:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3c5102db, StatelessResetToken: 0x2522ed700512cde36066476e0dcd0ed7} 2025/04/30 11:11:56 server -> &wire.NewTokenFrame{Token: 0xac0b43db46ad01519fe090c82acd948722b8d4bd281b6304aca4f339b8a69853b3c2bafbf671ba7187b59a3c8843bd01f218a31606f61d963eef6ee9805ce99a8ac2b8e780a0d7160e2a0c40fd867f98dd028faa13c2} 2025/04/30 11:11:56 server -> Sending packet 4 (1366 bytes) for connection 4a6f343bf9286aa1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:56 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:56 server -> &wire.PingFrame{} 2025/04/30 11:11:56 server <- Reading packet 6 (1220 bytes) for connection 072d309b, 1-RTT 2025/04/30 11:11:56 server Short Header{DestConnectionID: 072d309b, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:56 server <- &wire.PingFrame{} 2025/04/30 11:11:56 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:56 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:56 server -> Sending packet 5 (24 bytes) for connection 4a6f343bf9286aa1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:56 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:56 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 83.265µs} 2025/04/30 11:11:56 Received request: GET /escsfadzsz 2025/04/30 11:11:56 server -> Sending packet 6 (1045 bytes) for connection 4a6f343bf9286aa1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:56 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:56 server Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:11:56 server <- Reading packet 9 (1252 bytes) for connection 072d309b, 1-RTT 2025/04/30 11:11:56 server Short Header{DestConnectionID: 072d309b, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:56 server <- &wire.PingFrame{} 2025/04/30 11:11:56 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:56 server -> Sending packet 7 (26 bytes) for connection 4a6f343bf9286aa1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:56 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:56 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 64.981µs} 2025/04/30 11:11:56 server <- Reading packet 10 (38 bytes) for connection 072d309b, 1-RTT 2025/04/30 11:11:56 server Short Header{DestConnectionID: 072d309b, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:56 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:11:56 server newly acked packets (3): [3 4 6] 2025/04/30 11:11:56 server updated RTT: 32.434097ms (σ: 16.217048ms) 2025/04/30 11:11:56 server ECN capability confirmed. 2025/04/30 11:11:56 server Canceling loss detection timer. 2025/04/30 11:11:56 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:56 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:56 server <- Reading packet 11 (28 bytes) for connection 072d309b, 1-RTT 2025/04/30 11:11:56 server Short Header{DestConnectionID: 072d309b, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:56 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:56 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:56 Replacing connection for connection IDs [072d309b 9488624b 03363c07 3c5102db] with a closed connection. 2025/04/30 11:11:56 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:56 server Connection 4a6f343bf9286aa1 closed. 2025/04/30 11:11:57 Tracking 48 connection IDs and 0 reset tokens. 2025/04/30 11:11:57 server <- Received Initial packet. 2025/04/30 11:11:57 Created qlog file: /logs/qlog/5a9b1db1a6d181c0.sqlog 2025/04/30 11:11:57 server Changing connection ID to 0a8e0a09. 2025/04/30 11:11:57 Adding connection IDs 5a9b1db1a6d181c0 and 0a8e0a09 for a new connection. 2025/04/30 11:11:57 server <- Reading packet 0 (1220 bytes) for connection 5a9b1db1a6d181c0, Initial 2025/04/30 11:11:57 server Long Header{Type: Initial, DestConnectionID: 5a9b1db1a6d181c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:57 Adding connection ID 65e1bec6. 2025/04/30 11:11:57 Adding connection ID 0f25071b. 2025/04/30 11:11:57 Adding connection ID 3b07ff52. 2025/04/30 11:11:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5a9b1db1a6d181c0 2025/04/30 11:11:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0a8e0a09, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 438, Version: v1} 2025/04/30 11:11:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0a8e0a09, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:11:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:11:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0f25071b, StatelessResetToken: 0xc2dcfcae878b4cd52be3716754e55c26} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3b07ff52, StatelessResetToken: 0xe14d2abb5170a438840b219470ab9a95} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65e1bec6, StatelessResetToken: 0x3187d56dec9901dcbf3a74663e782276} 2025/04/30 11:11:57 server <- Reading packet 1 (77 bytes) for connection 0a8e0a09, Handshake 2025/04/30 11:11:57 server Long Header{Type: Handshake, DestConnectionID: 0a8e0a09, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:57 server Dropping Initial keys. 2025/04/30 11:11:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:57 server newly acked packets (1): [0] 2025/04/30 11:11:57 server updated RTT: 32.290122ms (σ: 16.145061ms) 2025/04/30 11:11:57 server Canceling loss detection timer. 2025/04/30 11:11:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:57 Retiring connection ID 5a9b1db1a6d181c0 in 5s. 2025/04/30 11:11:57 server Dropping Handshake keys. 2025/04/30 11:11:57 server -> Sending packet 1 (251 bytes) for connection 5a9b1db1a6d181c0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:57 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:57 server -> &wire.NewTokenFrame{Token: 0xfad84256fce0d122f722190d14afb4ec5c9439eee9b194f2a04603fde882eae0e32fd6c4c6b0fcfd4bc5511dd38fc6d529ff75073bb408df6ee8494c87990f435f5e4e18768500bc1a79f82f0e931584fc53ca9cdb33} 2025/04/30 11:11:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:11:57 server -> Sending packet 3 (91 bytes) for connection 5a9b1db1a6d181c0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:57 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0f25071b, StatelessResetToken: 0xc2dcfcae878b4cd52be3716754e55c26} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3b07ff52, StatelessResetToken: 0xe14d2abb5170a438840b219470ab9a95} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65e1bec6, StatelessResetToken: 0x3187d56dec9901dcbf3a74663e782276} 2025/04/30 11:11:57 server Skipping packet number 2 2025/04/30 11:11:57 server -> Sending packet 4 (251 bytes) for connection 5a9b1db1a6d181c0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:57 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:57 server -> &wire.NewTokenFrame{Token: 0xfad84256fce0d122f722190d14afb4ec5c9439eee9b194f2a04603fde882eae0e32fd6c4c6b0fcfd4bc5511dd38fc6d529ff75073bb408df6ee8494c87990f435f5e4e18768500bc1a79f82f0e931584fc53ca9cdb33} 2025/04/30 11:11:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:57 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:57 server Dropping %!s(logging.PacketType=1) packet (72 bytes) because we already dropped the keys. 2025/04/30 11:11:57 server <- Reading packet 4 (1148 bytes) for connection 0a8e0a09, 1-RTT 2025/04/30 11:11:57 server Short Header{DestConnectionID: 0a8e0a09, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:57 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:57 server -> Sending packet 5 (24 bytes) for connection 5a9b1db1a6d181c0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:57 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:57 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 122.207µs} 2025/04/30 11:11:57 Received request: GET /eaitizvpdg 2025/04/30 11:11:57 server -> Sending packet 6 (1045 bytes) for connection 5a9b1db1a6d181c0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:57 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:57 server <- Reading packet 5 (35 bytes) for connection 0a8e0a09, 1-RTT 2025/04/30 11:11:57 server Short Header{DestConnectionID: 0a8e0a09, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:57 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:11:57 server newly acked packets (1): [3] 2025/04/30 11:11:57 server updated RTT: 32.107ms (σ: 12.473ms) 2025/04/30 11:11:57 server ECN capability confirmed. 2025/04/30 11:11:57 server <- Reading packet 7 (28 bytes) for connection 0a8e0a09, 1-RTT 2025/04/30 11:11:57 server Short Header{DestConnectionID: 0a8e0a09, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:57 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:57 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:57 Replacing connection for connection IDs [0a8e0a09 65e1bec6 0f25071b 3b07ff52] with a closed connection. 2025/04/30 11:11:57 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:57 server Connection 5a9b1db1a6d181c0 closed. 2025/04/30 11:11:57 server <- Received Initial packet. 2025/04/30 11:11:57 Created qlog file: /logs/qlog/8e4c3fbe08a518c9.sqlog 2025/04/30 11:11:57 server Changing connection ID to 767db128. 2025/04/30 11:11:57 Adding connection IDs 8e4c3fbe08a518c9 and 767db128 for a new connection. 2025/04/30 11:11:57 server <- Reading packet 0 (1220 bytes) for connection 8e4c3fbe08a518c9, Initial 2025/04/30 11:11:57 server Long Header{Type: Initial, DestConnectionID: 8e4c3fbe08a518c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:57 Adding connection ID b89d91c7. 2025/04/30 11:11:57 Adding connection ID 9d20a925. 2025/04/30 11:11:57 Adding connection ID 12db8d51. 2025/04/30 11:11:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8e4c3fbe08a518c9 2025/04/30 11:11:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 767db128, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:11:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 767db128, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:11:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:11:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d20a925, StatelessResetToken: 0xb478c30359ed00250f20be7784702844} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b89d91c7, StatelessResetToken: 0x9c8199210e4464628be4e061817eee6c} 2025/04/30 11:11:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12db8d51, StatelessResetToken: 0x8b6af3f1ca9773f092d8cc59323bbe3a} 2025/04/30 11:11:57 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:11:58 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:11:58 server <- Reading packet 3 (72 bytes) for connection 767db128, Handshake 2025/04/30 11:11:58 server Long Header{Type: Handshake, DestConnectionID: 767db128, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:11:58 server Dropping Initial keys. 2025/04/30 11:11:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:58 Retiring connection ID 8e4c3fbe08a518c9 in 5s. 2025/04/30 11:11:58 server Dropping Handshake keys. 2025/04/30 11:11:58 server <- Reading packet 4 (1148 bytes) for connection 767db128, 1-RTT 2025/04/30 11:11:58 server Short Header{DestConnectionID: 767db128, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:58 server -> Sending packet 1 (1366 bytes) for connection 8e4c3fbe08a518c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:58 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:58 server -> &wire.PingFrame{} 2025/04/30 11:11:58 Received request: GET /veolaldfii 2025/04/30 11:11:58 server <- Reading packet 2 (1252 bytes) for connection 767db128, 1-RTT 2025/04/30 11:11:58 server Short Header{DestConnectionID: 767db128, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:58 server <- &wire.PingFrame{} 2025/04/30 11:11:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:58 server newly acked packets (1): [0] 2025/04/30 11:11:58 server updated RTT: 33.46717ms (σ: 16.733585ms) 2025/04/30 11:11:58 server Canceling loss detection timer. 2025/04/30 11:11:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:58 server -> Sending packet 2 (1280 bytes) for connection 8e4c3fbe08a518c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:58 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 488.039µs} 2025/04/30 11:11:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:58 server -> &wire.NewTokenFrame{Token: 0xc58acba41f50e03e97c3d15048b0edfbdbea2f9819028ec12543027de3f3de7116843c23e53c583ff6db728796b221bb5c421a63feeb0b1a983784e7d4d6a96b3125d27584420552ea39b3427a1bd222ee3537449f6b} 2025/04/30 11:11:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:11:58 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1023, Offset + Data length: 1023} 2025/04/30 11:11:58 server -> Sending packet 3 (24 bytes) for connection 8e4c3fbe08a518c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:58 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1023, Data length: 1, Offset + Data length: 1024} 2025/04/30 11:11:58 server <- Reading packet 6 (38 bytes) for connection 767db128, 1-RTT 2025/04/30 11:11:58 server Short Header{DestConnectionID: 767db128, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:58 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:11:58 server newly acked packets (2): [2 3] 2025/04/30 11:11:58 server updated RTT: 33.49ms (σ: 12.596ms) 2025/04/30 11:11:58 server ECN capability confirmed. 2025/04/30 11:11:58 server setting loss timer for packet 1 (1-RTT) to 37.862863ms (in 2025-04-30 11:11:58.07488834 +0000 UTC m=+52.827101544) 2025/04/30 11:11:58 server Canceling loss detection timer. 2025/04/30 11:11:58 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:58 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:11:58 server Ignoring all packets below 5. 2025/04/30 11:11:58 server <- Reading packet 7 (28 bytes) for connection 767db128, 1-RTT 2025/04/30 11:11:58 server Short Header{DestConnectionID: 767db128, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:58 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:58 Replacing connection for connection IDs [767db128 b89d91c7 9d20a925 12db8d51] with a closed connection. 2025/04/30 11:11:58 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:58 server Connection 8e4c3fbe08a518c9 closed. 2025/04/30 11:11:58 server <- Received Initial packet. 2025/04/30 11:11:58 Created qlog file: /logs/qlog/71b7b82ca4703ca4.sqlog 2025/04/30 11:11:58 server Changing connection ID to 27cc0354. 2025/04/30 11:11:58 Adding connection IDs 71b7b82ca4703ca4 and 27cc0354 for a new connection. 2025/04/30 11:11:58 server <- Reading packet 0 (1220 bytes) for connection 71b7b82ca4703ca4, Initial 2025/04/30 11:11:58 server Long Header{Type: Initial, DestConnectionID: 71b7b82ca4703ca4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:58 Adding connection ID e5291e04. 2025/04/30 11:11:58 Adding connection ID 9cbcc4a9. 2025/04/30 11:11:58 Adding connection ID 155315e0. 2025/04/30 11:11:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 71b7b82ca4703ca4 2025/04/30 11:11:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 27cc0354, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:11:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 27cc0354, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:11:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:11:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 155315e0, StatelessResetToken: 0x8fff5e82f98406d11ba16bd21a68d950} 2025/04/30 11:11:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e5291e04, StatelessResetToken: 0x7313139735be8c709a5711f5e2826f09} 2025/04/30 11:11:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9cbcc4a9, StatelessResetToken: 0xa530464671e4423dddadcb8ad6846e1a} 2025/04/30 11:11:58 server <- Reading packet 1 (77 bytes) for connection 27cc0354, Handshake 2025/04/30 11:11:58 server Long Header{Type: Handshake, DestConnectionID: 27cc0354, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:11:58 server Dropping Initial keys. 2025/04/30 11:11:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:58 server newly acked packets (1): [0] 2025/04/30 11:11:58 server updated RTT: 32.490879ms (σ: 16.245439ms) 2025/04/30 11:11:58 server Canceling loss detection timer. 2025/04/30 11:11:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:58 Retiring connection ID 71b7b82ca4703ca4 in 5s. 2025/04/30 11:11:58 server Dropping Handshake keys. 2025/04/30 11:11:58 server -> Sending packet 1 (251 bytes) for connection 71b7b82ca4703ca4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:58 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:58 server -> &wire.NewTokenFrame{Token: 0x058120dde3f62f744ce33c1887513a3a3766fc198274b6cbd515c307c8a1929ca411283682e9d2ccef45dbc06510caf099e7b8331120e3619327dc242066f19d3b43f91d3c69af77dbbe31923dbc1d09eec7bbac6ddc} 2025/04/30 11:11:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:58 server <- Reading packet 2 (1252 bytes) for connection 27cc0354, 1-RTT 2025/04/30 11:11:58 server Short Header{DestConnectionID: 27cc0354, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:58 server <- &wire.PingFrame{} 2025/04/30 11:11:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:58 server newly acked packets (1): [0] 2025/04/30 11:11:58 server updated RTT: 32.616ms (σ: 12.436ms) 2025/04/30 11:11:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:58 server -> Sending packet 2 (24 bytes) for connection 71b7b82ca4703ca4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:58 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 151.361µs} 2025/04/30 11:11:58 Received request: GET /hxvnxookol 2025/04/30 11:11:58 server -> Sending packet 3 (1045 bytes) for connection 71b7b82ca4703ca4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:58 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:58 server <- Reading packet 3 (1332 bytes) for connection 27cc0354, 1-RTT 2025/04/30 11:11:58 server Short Header{DestConnectionID: 27cc0354, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:58 server <- &wire.PingFrame{} 2025/04/30 11:11:58 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:58 server <- Reading packet 4 (38 bytes) for connection 27cc0354, 1-RTT 2025/04/30 11:11:58 server Short Header{DestConnectionID: 27cc0354, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:58 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:11:58 server newly acked packets (2): [1 3] 2025/04/30 11:11:58 server updated RTT: 32.474ms (σ: 9.609ms) 2025/04/30 11:11:58 server ECN capability confirmed. 2025/04/30 11:11:58 server Canceling loss detection timer. 2025/04/30 11:11:58 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:11:58 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:11:58 server -> Sending packet 4 (27 bytes) for connection 71b7b82ca4703ca4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:58 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:58 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 156.471µs} 2025/04/30 11:11:58 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:11:58 server <- Reading packet 5 (28 bytes) for connection 27cc0354, 1-RTT 2025/04/30 11:11:58 server Short Header{DestConnectionID: 27cc0354, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:58 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:58 Replacing connection for connection IDs [27cc0354 e5291e04 9cbcc4a9 155315e0] with a closed connection. 2025/04/30 11:11:58 server Connection 71b7b82ca4703ca4 closed. 2025/04/30 11:11:58 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:58 Removing connection ID 60976d11ae09aaaf after it has been retired. 2025/04/30 11:11:58 Removing connection IDs [87854e3b b1a1ca80 1ec9510f 4b41a88d] for a closed connection after it has been retired. 2025/04/30 11:11:59 Tracking 58 connection IDs and 0 reset tokens. 2025/04/30 11:11:59 server <- Received Initial packet. 2025/04/30 11:11:59 Created qlog file: /logs/qlog/b07e2f85effbd180.sqlog 2025/04/30 11:11:59 server Changing connection ID to 3bb2db98. 2025/04/30 11:11:59 Adding connection IDs b07e2f85effbd180 and 3bb2db98 for a new connection. 2025/04/30 11:11:59 server <- Reading packet 2 (1220 bytes) for connection b07e2f85effbd180, Initial 2025/04/30 11:11:59 server Long Header{Type: Initial, DestConnectionID: b07e2f85effbd180, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:11:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:11:59 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:59 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:59 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:59 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:11:59 Adding connection ID c1959b8c. 2025/04/30 11:11:59 Adding connection ID 835c115a. 2025/04/30 11:11:59 Adding connection ID e668c807. 2025/04/30 11:11:59 server <- &wire.PingFrame{} 2025/04/30 11:11:59 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b07e2f85effbd180 2025/04/30 11:11:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3bb2db98, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 442, Version: v1} 2025/04/30 11:11:59 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:11:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:11:59 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3bb2db98, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:11:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:11:59 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c1959b8c, StatelessResetToken: 0x98eef1f960cd23d9c3aa9d0f2989f265} 2025/04/30 11:11:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e668c807, StatelessResetToken: 0xd5834b76b613afdfd822e40d4005be13} 2025/04/30 11:11:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 835c115a, StatelessResetToken: 0x7545a6c1a2ef6210611f5a9bb0155534} 2025/04/30 11:11:59 server <- Reading packet 3 (1220 bytes) for connection 3bb2db98, Handshake 2025/04/30 11:11:59 server Long Header{Type: Handshake, DestConnectionID: 3bb2db98, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:11:59 server Dropping Initial keys. 2025/04/30 11:11:59 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:11:59 server newly acked packets (1): [0] 2025/04/30 11:11:59 server updated RTT: 33.376069ms (σ: 16.688034ms) 2025/04/30 11:11:59 server Canceling loss detection timer. 2025/04/30 11:11:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:11:59 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:11:59 server <- &wire.PingFrame{} 2025/04/30 11:11:59 Retiring connection ID b07e2f85effbd180 in 5s. 2025/04/30 11:11:59 server Dropping Handshake keys. 2025/04/30 11:11:59 server -> Sending packet 1 (251 bytes) for connection b07e2f85effbd180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:59 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:59 server -> &wire.NewTokenFrame{Token: 0x285dcb5ff9dd06b5a1d831fbd4290d5f0cd0207fc5d40c4e8e35fda629caed2633ff38ddf1bed3948f4a84833416abf0a3666d8e534e8d217745f2ecfe4b3e21e601a054369387900371cbe5a13832dc4c8cb8f5a4a3} 2025/04/30 11:11:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:11:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:11:59 server <- Reading packet 4 (1252 bytes) for connection 3bb2db98, 1-RTT 2025/04/30 11:11:59 server Short Header{DestConnectionID: 3bb2db98, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:59 server <- &wire.PingFrame{} 2025/04/30 11:11:59 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:11:59 server newly acked packets (1): [0] 2025/04/30 11:11:59 server updated RTT: 33.497ms (σ: 12.758ms) 2025/04/30 11:11:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:11:59 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:11:59 server -> Sending packet 2 (24 bytes) for connection b07e2f85effbd180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:59 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:59 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 95.928µs} 2025/04/30 11:11:59 Received request: GET /guusqaeoxy 2025/04/30 11:11:59 server -> Sending packet 3 (1045 bytes) for connection b07e2f85effbd180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:11:59 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:11:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:11:59 server <- Reading packet 5 (1332 bytes) for connection 3bb2db98, 1-RTT 2025/04/30 11:11:59 server Short Header{DestConnectionID: 3bb2db98, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:59 server <- &wire.PingFrame{} 2025/04/30 11:11:59 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:11:59 server <- Reading packet 7 (28 bytes) for connection 3bb2db98, 1-RTT 2025/04/30 11:11:59 server Short Header{DestConnectionID: 3bb2db98, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:11:59 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:11:59 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:11:59 Replacing connection for connection IDs [3bb2db98 c1959b8c 835c115a e668c807] with a closed connection. 2025/04/30 11:11:59 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:11:59 server Connection b07e2f85effbd180 closed. 2025/04/30 11:11:59 Removing connection ID d0e230942575b7f7 after it has been retired. 2025/04/30 11:11:59 server Destroying connection: timeout: no recent network activity 2025/04/30 11:11:59 Removing connection ID 89de9b2a. 2025/04/30 11:11:59 Removing connection ID b9c65b78. 2025/04/30 11:11:59 Removing connection ID 2774ccb8. 2025/04/30 11:11:59 Removing connection ID 3af78838. 2025/04/30 11:11:59 Error accepting stream: timeout: no recent network activity 2025/04/30 11:11:59 server Connection 19802d619642251f closed. 2025/04/30 11:11:59 Removing connection IDs [a07e1919 25f327d4 974657d1 2c1fbd46] for a closed connection after it has been retired. 2025/04/30 11:12:00 Removing connection ID 481784242e5fb73b after it has been retired. 2025/04/30 11:12:00 Removing connection IDs [8fec9939 37abdc55 51b518aa 43d90446] for a closed connection after it has been retired. 2025/04/30 11:12:00 server Destroying connection: timeout: no recent network activity 2025/04/30 11:12:00 Removing connection ID c294fcc8. 2025/04/30 11:12:00 Removing connection ID 6277ee25. 2025/04/30 11:12:00 Removing connection ID 23a0824a. 2025/04/30 11:12:00 Removing connection ID 9b17eca6. 2025/04/30 11:12:00 Error accepting stream: timeout: no recent network activity 2025/04/30 11:12:00 server Connection f8f6dc75fd1873b9 closed. 2025/04/30 11:12:01 Tracking 45 connection IDs and 0 reset tokens. 2025/04/30 11:12:01 Removing connection ID 4a6f343bf9286aa1 after it has been retired. 2025/04/30 11:12:01 Removing connection IDs [072d309b 9488624b 03363c07 3c5102db] for a closed connection after it has been retired. 2025/04/30 11:12:02 Removing connection ID 5a9b1db1a6d181c0 after it has been retired. 2025/04/30 11:12:02 server Destroying connection: timeout: no recent network activity 2025/04/30 11:12:02 Removing connection ID d7dae2f2. 2025/04/30 11:12:02 Removing connection ID f097710c. 2025/04/30 11:12:02 Removing connection ID 5c79c965. 2025/04/30 11:12:02 Removing connection ID faed28c1. 2025/04/30 11:12:02 Error accepting stream: timeout: no recent network activity 2025/04/30 11:12:02 server Connection 520482229c69dff6 closed. 2025/04/30 11:12:02 Removing connection IDs [0a8e0a09 65e1bec6 0f25071b 3b07ff52] for a closed connection after it has been retired. 2025/04/30 11:12:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 11:12:02 server -> Sending packet 32 (22 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:12:02 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:12:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:12:02 server Skipping packet number 31 2025/04/30 11:12:02 server -> Sending packet 33 (251 bytes) for connection fcbaf1f7436c0988, 1-RTT (ECN: ECT(0)) 2025/04/30 11:12:02 server Short Header{DestConnectionID: (empty), PacketNumber: 33, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:12:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:12:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:12:02 server -> &wire.NewTokenFrame{Token: 0xe62b47146466471547eacf13dab7e9b6c4c0e6169217d3681094d25e967dd915ccaf8732e80c29712652a7468cc2afdb76dad52a92366c19c6f8ed5710d967f365c5f6015ae66802029dd2f95b695da6d320df5d13e2} 2025/04/30 11:12:02 server Destroying connection: timeout: no recent network activity 2025/04/30 11:12:02 Removing connection ID e9aa5d16. 2025/04/30 11:12:02 Removing connection ID 2f1e89ff. 2025/04/30 11:12:02 Removing connection ID b6775423. 2025/04/30 11:12:02 Removing connection ID c8d78925. 2025/04/30 11:12:02 Error accepting stream: timeout: no recent network activity 2025/04/30 11:12:02 server Connection fcbaf1f7436c0988 closed. 2025/04/30 11:12:03 Removing connection ID 8e4c3fbe08a518c9 after it has been retired. 2025/04/30 11:12:03 Removing connection IDs [767db128 b89d91c7 9d20a925 12db8d51] for a closed connection after it has been retired. 2025/04/30 11:12:03 Tracking 22 connection IDs and 0 reset tokens. 2025/04/30 11:12:03 Removing connection ID 71b7b82ca4703ca4 after it has been retired. 2025/04/30 11:12:03 Removing connection IDs [27cc0354 e5291e04 9cbcc4a9 155315e0] for a closed connection after it has been retired. 2025/04/30 11:12:04 Removing connection ID b07e2f85effbd180 after it has been retired. 2025/04/30 11:12:04 Removing connection IDs [3bb2db98 c1959b8c 835c115a e668c807] for a closed connection after it has been retired. 2025/04/30 11:12:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 11:12:04 server -> Sending packet 32 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:12:04 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:12:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:12:04 server -> Sending packet 33 (22 bytes) for connection fd7333f4049c556c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:12:04 server Short Header{DestConnectionID: (empty), PacketNumber: 33, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:12:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:12:04 server Destroying connection: timeout: no recent network activity 2025/04/30 11:12:04 Removing connection ID 30384d22. 2025/04/30 11:12:04 Removing connection ID 7c9d4e4b. 2025/04/30 11:12:04 Removing connection ID 24e7ba41. 2025/04/30 11:12:04 Error accepting stream: timeout: no recent network activity 2025/04/30 11:12:04 Removing connection ID 3c82de54. 2025/04/30 11:12:04 server Connection fd7333f4049c556c closed. 2025/04/30 11:12:05 Tracking 8 connection IDs and 0 reset tokens. 2025/04/30 11:12:06 server Destroying connection: timeout: no recent network activity 2025/04/30 11:12:06 Removing connection ID bef80c85. 2025/04/30 11:12:06 Removing connection ID d171d92a. 2025/04/30 11:12:06 Removing connection ID 0be2336e. 2025/04/30 11:12:06 Removing connection ID d27599a7. 2025/04/30 11:12:06 Error accepting stream: timeout: no recent network activity 2025/04/30 11:12:06 server Connection 8409c9b712407cb5 closed. 2025/04/30 11:12:07 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 11:12:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 11:12:07 server -> Sending packet 31 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:12:07 server Short Header{DestConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:12:07 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:12:07 server -> Sending packet 32 (22 bytes) for connection 39fedb972f25cb5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:12:07 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:12:07 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:12:07 server Destroying connection: timeout: no recent network activity 2025/04/30 11:12:07 Removing connection ID b3df4959. 2025/04/30 11:12:07 Removing connection ID 0e84d0a0. 2025/04/30 11:12:07 Removing connection ID 7d09ae62. 2025/04/30 11:12:07 Removing connection ID 1b1df918. 2025/04/30 11:12:07 Error accepting stream: timeout: no recent network activity 2025/04/30 11:12:07 server Connection 39fedb972f25cb5a closed. 2025/04/30 11:12:09 Tracking 0 connection IDs and 0 reset tokens.