2025/04/30 11:09:05 Increased receive buffer size to 14336 kiB 2025/04/30 11:09:05 Increased send buffer size to 14336 kiB 2025/04/30 11:09:05 Setting DF for IPv4 and IPv6. 2025/04/30 11:09:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:09:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:09:05 server Listening for udp connections on [::]:443 2025/04/30 11:09:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:09:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:09:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:09:06 server <- Received Initial packet. 2025/04/30 11:09:06 Created qlog file: /logs/qlog/e166b91b6570df72.sqlog 2025/04/30 11:09:06 server Changing connection ID to abeb4108. 2025/04/30 11:09:06 Adding connection IDs e166b91b6570df72 and abeb4108 for a new connection. 2025/04/30 11:09:06 server <- Reading packet 0 (1220 bytes) for connection e166b91b6570df72, Initial 2025/04/30 11:09:06 server Long Header{Type: Initial, DestConnectionID: e166b91b6570df72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:06 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:06 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:06 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:06 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:06 Adding connection ID 09b9aff6. 2025/04/30 11:09:06 Adding connection ID bb3a72fa. 2025/04/30 11:09:06 Adding connection ID e5dee2c4. 2025/04/30 11:09:06 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e166b91b6570df72 2025/04/30 11:09:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: abeb4108, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:09:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: abeb4108, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:09:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:09:06 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:07 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:07 server -> Sending packet 1 (1280 bytes) for connection e166b91b6570df72, Initial 2025/04/30 11:09:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: abeb4108, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:07 server -> Sending packet 2 (1280 bytes) for connection e166b91b6570df72, Initial 2025/04/30 11:09:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: abeb4108, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:07 server Canceling loss detection timer. 2025/04/30 11:09:07 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:09:07 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:07 server <- Reading packet 5 (72 bytes) for connection abeb4108, Handshake 2025/04/30 11:09:07 server Long Header{Type: Handshake, DestConnectionID: abeb4108, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:07 server Dropping Initial keys. 2025/04/30 11:09:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:07 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:07 Retiring connection ID e166b91b6570df72 in 5s. 2025/04/30 11:09:07 server Dropping Handshake keys. 2025/04/30 11:09:07 server <- Reading packet 6 (1148 bytes) for connection abeb4108, 1-RTT 2025/04/30 11:09:07 server Short Header{DestConnectionID: abeb4108, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:07 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:07 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:07 server -> Sending packet 2 (325 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 344.63µs} 2025/04/30 11:09:07 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:07 server -> Sending packet 3 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 Received request: GET /empdiqhngn 2025/04/30 11:09:07 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:07 server -> Sending packet 4 (1366 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.PingFrame{} 2025/04/30 11:09:07 server -> Sending packet 5 (1045 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:07 server <- Reading packet 7 (35 bytes) for connection abeb4108, 1-RTT 2025/04/30 11:09:07 server Short Header{DestConnectionID: abeb4108, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:07 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:07 server <- Reading packet 8 (37 bytes) for connection abeb4108, 1-RTT 2025/04/30 11:09:07 server Short Header{DestConnectionID: abeb4108, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:07 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:07 server newly acked packets (1): [4] 2025/04/30 11:09:07 server updated RTT: 32.292761ms (σ: 16.14638ms) 2025/04/30 11:09:07 server ECN capability confirmed. 2025/04/30 11:09:07 server setting loss timer for packet 3 (1-RTT) to 36.329356ms (in 2025-04-30 11:09:07.451505482 +0000 UTC m=+1.541066604) 2025/04/30 11:09:07 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:07.451505482 +0000 UTC m=+1.541066604 2025/04/30 11:09:07 server lost packet 3 (time threshold) 2025/04/30 11:09:07 server -> Sending packet 6 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:07 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:07 server -> Sending packet 8 (1045 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:07 server Skipping packet number 7 2025/04/30 11:09:07 server -> Sending packet 9 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:07 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:07 server -> Sending packet 11 (1045 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:07 server Skipping packet number 10 2025/04/30 11:09:07 server -> Sending packet 12 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:07 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:07 server -> Sending packet 13 (1409 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.PingFrame{} 2025/04/30 11:09:07 server <- Received Initial packet. 2025/04/30 11:09:07 Created qlog file: /logs/qlog/0a82055c510d2701.sqlog 2025/04/30 11:09:07 server Changing connection ID to a8116e92. 2025/04/30 11:09:07 Adding connection IDs 0a82055c510d2701 and a8116e92 for a new connection. 2025/04/30 11:09:07 server <- Reading packet 0 (1220 bytes) for connection 0a82055c510d2701, Initial 2025/04/30 11:09:07 server Long Header{Type: Initial, DestConnectionID: 0a82055c510d2701, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:07 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:07 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:07 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:07 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:07 Adding connection ID 24584cda. 2025/04/30 11:09:07 Adding connection ID 9c06baa6. 2025/04/30 11:09:07 Adding connection ID 8d847f53. 2025/04/30 11:09:07 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0a82055c510d2701 2025/04/30 11:09:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8116e92, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:09:07 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8116e92, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:07 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9c06baa6, StatelessResetToken: 0x8ed9c8ed3720bc5a5e9d964600ab9974} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 24584cda, StatelessResetToken: 0x688926e238893e995904ac3bc1e62dea} 2025/04/30 11:09:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8d847f53, StatelessResetToken: 0xe7c51af775d247b44a63963637219a3e} 2025/04/30 11:09:07 Tracking 10 connection IDs and 0 reset tokens. 2025/04/30 11:09:08 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:08 server -> Sending packet 1 (1280 bytes) for connection 0a82055c510d2701, Initial 2025/04/30 11:09:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8116e92, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:08 server -> Sending packet 2 (1280 bytes) for connection 0a82055c510d2701, Initial 2025/04/30 11:09:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a8116e92, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:08 server Canceling loss detection timer. 2025/04/30 11:09:08 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:09:08 server <- Reading packet 2 (1220 bytes) for connection a8116e92, Initial 2025/04/30 11:09:08 server Long Header{Type: Initial, DestConnectionID: a8116e92, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:08 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:09:08 server newly acked packets (1): [2] 2025/04/30 11:09:08 server updated RTT: 33.839302ms (σ: 16.919651ms) 2025/04/30 11:09:08 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:08 server -> Sending packet 1 (736 bytes) for connection 0a82055c510d2701, Handshake 2025/04/30 11:09:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8116e92, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:08 server -> Sending packet 2 (736 bytes) for connection 0a82055c510d2701, Handshake 2025/04/30 11:09:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8116e92, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:08 server Queueing packet (1220 bytes) for later decryption 2025/04/30 11:09:08 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:08 server -> Sending packet 3 (736 bytes) for connection 0a82055c510d2701, Handshake 2025/04/30 11:09:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8116e92, PacketNumber: 3, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:08 server -> Sending packet 4 (736 bytes) for connection 0a82055c510d2701, Handshake 2025/04/30 11:09:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a8116e92, PacketNumber: 4, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:08 server -> Sending packet 15 (1045 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:08 server Skipping packet number 14 2025/04/30 11:09:08 server -> Sending packet 16 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:08 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:08 server <- Reading packet 6 (40 bytes) for connection a8116e92, Handshake 2025/04/30 11:09:08 server Long Header{Type: Handshake, DestConnectionID: a8116e92, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 27, Version: v1} 2025/04/30 11:09:08 server Dropping Initial keys. 2025/04/30 11:09:08 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:09:08 server newly acked packets (1): [4] 2025/04/30 11:09:08 server updated RTT: 33.613ms (σ: 13.141ms) 2025/04/30 11:09:08 server Canceling loss detection timer. 2025/04/30 11:09:08 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:08 server <- Reading packet 7 (72 bytes) for connection a8116e92, Handshake 2025/04/30 11:09:08 server Long Header{Type: Handshake, DestConnectionID: a8116e92, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:08 Retiring connection ID 0a82055c510d2701 in 5s. 2025/04/30 11:09:08 server Dropping Handshake keys. 2025/04/30 11:09:08 server <- Reading packet 8 (1148 bytes) for connection a8116e92, 1-RTT 2025/04/30 11:09:08 server Short Header{DestConnectionID: a8116e92, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:08 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:08 server -> Sending packet 2 (328 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 301.52µs} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8d847f53, StatelessResetToken: 0xe7c51af775d247b44a63963637219a3e} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 24584cda, StatelessResetToken: 0x688926e238893e995904ac3bc1e62dea} 2025/04/30 11:09:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9c06baa6, StatelessResetToken: 0x8ed9c8ed3720bc5a5e9d964600ab9974} 2025/04/30 11:09:08 server -> &wire.NewTokenFrame{Token: 0x6dacef33490388e34a2aa7e89b9f1dbc37707364160f88a743cf7a49b48df57f27c7939c2b0a401a62dadbea0d9c5d7bea1481813fe2a30d457bad585b17ecd6199b18bf6493c5a27af471e8871642fe53942bca827a} 2025/04/30 11:09:08 server -> Sending packet 3 (323 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9c06baa6, StatelessResetToken: 0x8ed9c8ed3720bc5a5e9d964600ab9974} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8d847f53, StatelessResetToken: 0xe7c51af775d247b44a63963637219a3e} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 24584cda, StatelessResetToken: 0x688926e238893e995904ac3bc1e62dea} 2025/04/30 11:09:08 server -> &wire.NewTokenFrame{Token: 0x6dacef33490388e34a2aa7e89b9f1dbc37707364160f88a743cf7a49b48df57f27c7939c2b0a401a62dadbea0d9c5d7bea1481813fe2a30d457bad585b17ecd6199b18bf6493c5a27af471e8871642fe53942bca827a} 2025/04/30 11:09:08 Received request: GET /qegghdlqzc 2025/04/30 11:09:08 server <- Reading packet 4 (1220 bytes) for connection a8116e92, 1-RTT 2025/04/30 11:09:08 server Short Header{DestConnectionID: a8116e92, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:08 server <- &wire.PingFrame{} 2025/04/30 11:09:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:08 server Queueing ACK because packet 4 was missing before. 2025/04/30 11:09:08 server -> Sending packet 4 (26 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}}, DelayTime: 500.619µs} 2025/04/30 11:09:08 server -> Sending packet 5 (1045 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:08 server <- Reading packet 9 (1252 bytes) for connection a8116e92, 1-RTT 2025/04/30 11:09:08 server Short Header{DestConnectionID: a8116e92, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:08 server <- &wire.PingFrame{} 2025/04/30 11:09:08 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:08 server <- Reading packet 10 (38 bytes) for connection a8116e92, 1-RTT 2025/04/30 11:09:08 server Short Header{DestConnectionID: a8116e92, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:08 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:08 server newly acked packets (2): [3 5] 2025/04/30 11:09:08 server updated RTT: 33.43ms (σ: 10.221ms) 2025/04/30 11:09:08 server ECN capability confirmed. 2025/04/30 11:09:08 server Canceling loss detection timer. 2025/04/30 11:09:08 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:08 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:09:08 server -> Sending packet 6 (29 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 4, Smallest: 4}}, DelayTime: 111.549µs} 2025/04/30 11:09:08 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:08 server -> Sending packet 8 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:08 server -> Sending packet 9 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:08 server -> Sending packet 11 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:08 server -> Sending packet 12 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:08 server -> Sending packet 13 (1366 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.PingFrame{} 2025/04/30 11:09:08 server <- Received Initial packet. 2025/04/30 11:09:08 Created qlog file: /logs/qlog/40a8c09cd5519a55.sqlog 2025/04/30 11:09:08 server Changing connection ID to e2b5986f. 2025/04/30 11:09:08 Adding connection IDs 40a8c09cd5519a55 and e2b5986f for a new connection. 2025/04/30 11:09:08 server <- Reading packet 0 (1220 bytes) for connection 40a8c09cd5519a55, Initial 2025/04/30 11:09:08 server Long Header{Type: Initial, DestConnectionID: 40a8c09cd5519a55, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:08 Adding connection ID 129625ff. 2025/04/30 11:09:08 Adding connection ID 7b61f025. 2025/04/30 11:09:08 Adding connection ID 81b16964. 2025/04/30 11:09:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 40a8c09cd5519a55 2025/04/30 11:09:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e2b5986f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:09:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e2b5986f, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:08 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:08 server <- Reading packet 1 (1220 bytes) for connection 40a8c09cd5519a55, Initial 2025/04/30 11:09:08 server Long Header{Type: Initial, DestConnectionID: 40a8c09cd5519a55, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:08 server <- &wire.PingFrame{} 2025/04/30 11:09:08 server -> Sending packet 1 (37 bytes) for connection 40a8c09cd5519a55, Initial 2025/04/30 11:09:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e2b5986f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:08 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:09 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:09 server -> Sending packet 2 (1280 bytes) for connection 40a8c09cd5519a55, Initial 2025/04/30 11:09:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e2b5986f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:09 server -> Sending packet 3 (1280 bytes) for connection 40a8c09cd5519a55, Initial 2025/04/30 11:09:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e2b5986f, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:09 server <- Reading packet 2 (1220 bytes) for connection e2b5986f, Initial 2025/04/30 11:09:09 server Long Header{Type: Initial, DestConnectionID: e2b5986f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:09 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 792µs} 2025/04/30 11:09:09 server newly acked packets (1): [3] 2025/04/30 11:09:09 server updated RTT: 59.255283ms (σ: 29.627641ms) 2025/04/30 11:09:09 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:09 server -> Sending packet 1 (736 bytes) for connection 40a8c09cd5519a55, Handshake 2025/04/30 11:09:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e2b5986f, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:09 server -> Sending packet 2 (736 bytes) for connection 40a8c09cd5519a55, Handshake 2025/04/30 11:09:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e2b5986f, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:09 server -> Sending packet 15 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:09 server -> Sending packet 16 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:09 server -> Sending packet 18 (1045 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:09 server Skipping packet number 17 2025/04/30 11:09:09 server -> Sending packet 19 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:09 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:09 server -> Sending packet 3 (736 bytes) for connection 40a8c09cd5519a55, Handshake 2025/04/30 11:09:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e2b5986f, PacketNumber: 3, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:09 server -> Sending packet 4 (736 bytes) for connection 40a8c09cd5519a55, Handshake 2025/04/30 11:09:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e2b5986f, PacketNumber: 4, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:09 server <- Reading packet 4 (77 bytes) for connection e2b5986f, Handshake 2025/04/30 11:09:09 server Long Header{Type: Handshake, DestConnectionID: e2b5986f, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:09 server Dropping Initial keys. 2025/04/30 11:09:09 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 16µs} 2025/04/30 11:09:09 server newly acked packets (1): [4] 2025/04/30 11:09:09 server updated RTT: 55.935ms (σ: 28.86ms) 2025/04/30 11:09:09 server Canceling loss detection timer. 2025/04/30 11:09:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:09 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:09 Retiring connection ID 40a8c09cd5519a55 in 5s. 2025/04/30 11:09:09 server Dropping Handshake keys. 2025/04/30 11:09:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:09 server -> Sending packet 2 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:09 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:09 server -> Sending packet 3 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:09 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:09 server <- Reading packet 5 (1220 bytes) for connection e2b5986f, 1-RTT 2025/04/30 11:09:09 server Short Header{DestConnectionID: e2b5986f, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:09 server <- &wire.PingFrame{} 2025/04/30 11:09:09 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:09 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:09 server -> Sending packet 4 (24 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 90.147µs} 2025/04/30 11:09:09 Received request: GET /iolgqicmib 2025/04/30 11:09:09 server -> Sending packet 5 (1045 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:09 server <- Reading packet 6 (40 bytes) for connection e2b5986f, 1-RTT 2025/04/30 11:09:09 server Short Header{DestConnectionID: e2b5986f, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:09 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:09 server newly acked packets (1): [5] 2025/04/30 11:09:09 server updated RTT: 52.904ms (σ: 27.705ms) 2025/04/30 11:09:09 server ECN capability confirmed. 2025/04/30 11:09:09 server setting loss timer for packet 3 (1-RTT) to 59.517ms (in 2025-04-30 11:09:09.542187514 +0000 UTC m=+3.631748636) 2025/04/30 11:09:09 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:09 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:09 server -> Sending packet 6 (27 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 162.943µs} 2025/04/30 11:09:09 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:09 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:09.542187514 +0000 UTC m=+3.631748636 2025/04/30 11:09:09 server lost packet 3 (time threshold) 2025/04/30 11:09:09 server -> Sending packet 7 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:09 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:09 server <- Reading packet 7 (1252 bytes) for connection e2b5986f, 1-RTT 2025/04/30 11:09:09 server Short Header{DestConnectionID: e2b5986f, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:09 server <- &wire.PingFrame{} 2025/04/30 11:09:09 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:09 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:09 server -> Sending packet 8 (25 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 25.339565ms} 2025/04/30 11:09:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:09 server -> Sending packet 10 (22 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:09 server Skipping packet number 9 2025/04/30 11:09:09 server -> Sending packet 11 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:09 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:09 Tracking 15 connection IDs and 0 reset tokens. 2025/04/30 11:09:09 server <- Received Initial packet. 2025/04/30 11:09:09 Created qlog file: /logs/qlog/b716a71c22a74a76.sqlog 2025/04/30 11:09:09 server Changing connection ID to 3ba663c5. 2025/04/30 11:09:09 Adding connection IDs b716a71c22a74a76 and 3ba663c5 for a new connection. 2025/04/30 11:09:09 server <- Reading packet 0 (1220 bytes) for connection b716a71c22a74a76, Initial 2025/04/30 11:09:09 server Long Header{Type: Initial, DestConnectionID: b716a71c22a74a76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:09 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:09 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:09 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:09 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:09 Adding connection ID 5ad8aeb7. 2025/04/30 11:09:09 Adding connection ID 7ed269d5. 2025/04/30 11:09:09 Adding connection ID 82af01a6. 2025/04/30 11:09:09 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b716a71c22a74a76 2025/04/30 11:09:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ba663c5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 430, Version: v1} 2025/04/30 11:09:09 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ba663c5, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 82af01a6, StatelessResetToken: 0x7dce40d8dac5d8d04e4d85d762db450c} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ad8aeb7, StatelessResetToken: 0xae278c4296c4ba809cd9276c39793503} 2025/04/30 11:09:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7ed269d5, StatelessResetToken: 0x33936840cace36fcfa29c46e4959ede8} 2025/04/30 11:09:09 server <- Reading packet 1 (77 bytes) for connection 3ba663c5, Handshake 2025/04/30 11:09:09 server Long Header{Type: Handshake, DestConnectionID: 3ba663c5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:09 server Dropping Initial keys. 2025/04/30 11:09:09 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:09 server newly acked packets (1): [0] 2025/04/30 11:09:09 server updated RTT: 32.650453ms (σ: 16.325226ms) 2025/04/30 11:09:09 server Canceling loss detection timer. 2025/04/30 11:09:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:09 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:09 Retiring connection ID b716a71c22a74a76 in 5s. 2025/04/30 11:09:09 server Dropping Handshake keys. 2025/04/30 11:09:09 server -> Sending packet 1 (251 bytes) for connection b716a71c22a74a76, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:09 server -> &wire.NewTokenFrame{Token: 0xfc1280c969e59e462fc4b43bf53597f8d0a29d2749f5f3c6c0c33df0103e12aa9390cb7e25a870c268e492c913bd47e0fc9dc12b081154bbac5aaf2bf64af5235c7743ca643e6b341716a35eedd8d4613b52c95f2a0c} 2025/04/30 11:09:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:09 server -> Sending packet 18 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:09 server -> Sending packet 19 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:09 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:09 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:10 server <- Reading packet 3 (34 bytes) for connection 3ba663c5, 1-RTT 2025/04/30 11:09:10 server Short Header{DestConnectionID: 3ba663c5, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:10 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:10 server newly acked packets (2): [0 1] 2025/04/30 11:09:10 server updated RTT: 35.594ms (σ: 18.132ms) 2025/04/30 11:09:10 server ECN capability confirmed. 2025/04/30 11:09:10 server Canceling loss detection timer. 2025/04/30 11:09:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:10 server -> Sending packet 13 (22 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:10 server Skipping packet number 12 2025/04/30 11:09:10 server -> Sending packet 14 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:10 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:10 server -> Sending packet 15 (1366 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.PingFrame{} 2025/04/30 11:09:10 server <- Reading packet 5 (1220 bytes) for connection 3ba663c5, 1-RTT 2025/04/30 11:09:10 server Short Header{DestConnectionID: 3ba663c5, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:10 server <- &wire.PingFrame{} 2025/04/30 11:09:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:10 server -> Sending packet 2 (1366 bytes) for connection b716a71c22a74a76, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.PingFrame{} 2025/04/30 11:09:10 server -> Sending packet 3 (26 bytes) for connection b716a71c22a74a76, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 Received request: GET /zzujqdmsee 2025/04/30 11:09:10 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 218.074µs} 2025/04/30 11:09:10 server -> Sending packet 4 (1045 bytes) for connection b716a71c22a74a76, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:10 server <- Reading packet 6 (1220 bytes) for connection 3ba663c5, 1-RTT 2025/04/30 11:09:10 server Short Header{DestConnectionID: 3ba663c5, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:10 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:10 server newly acked packets (1): [2] 2025/04/30 11:09:10 server <- &wire.PingFrame{} 2025/04/30 11:09:10 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:10 server <- Reading packet 7 (36 bytes) for connection 3ba663c5, 1-RTT 2025/04/30 11:09:10 server Short Header{DestConnectionID: 3ba663c5, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:10 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 256µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:10 server newly acked packets (1): [4] 2025/04/30 11:09:10 server updated RTT: 35.238ms (σ: 14.31ms) 2025/04/30 11:09:10 server Canceling loss detection timer. 2025/04/30 11:09:10 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:10 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:10 Replacing connection for connection IDs [3ba663c5 5ad8aeb7 7ed269d5 82af01a6] with a closed connection. 2025/04/30 11:09:10 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:10 server Connection b716a71c22a74a76 closed. 2025/04/30 11:09:10 server <- Received Initial packet. 2025/04/30 11:09:10 Created qlog file: /logs/qlog/2c1d54cba4781927.sqlog 2025/04/30 11:09:10 server Changing connection ID to f1c791c3. 2025/04/30 11:09:10 Adding connection IDs 2c1d54cba4781927 and f1c791c3 for a new connection. 2025/04/30 11:09:10 server <- Reading packet 0 (1220 bytes) for connection 2c1d54cba4781927, Initial 2025/04/30 11:09:10 server Long Header{Type: Initial, DestConnectionID: 2c1d54cba4781927, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:10 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:10 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:10 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:10 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:10 Adding connection ID 24faf897. 2025/04/30 11:09:10 Adding connection ID 8954127e. 2025/04/30 11:09:10 Adding connection ID 6038a102. 2025/04/30 11:09:10 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2c1d54cba4781927 2025/04/30 11:09:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f1c791c3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:09:10 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f1c791c3, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:09:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8954127e, StatelessResetToken: 0x375dd7546c1a3381c9e4218573ac0210} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6038a102, StatelessResetToken: 0x4357910ffae0c5a3eb8a725f483e3372} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 24faf897, StatelessResetToken: 0xe5e0c09b9b23a807c97e3f42e7b6ed53} 2025/04/30 11:09:10 server <- Reading packet 1 (77 bytes) for connection f1c791c3, Handshake 2025/04/30 11:09:10 server Long Header{Type: Handshake, DestConnectionID: f1c791c3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:10 server Dropping Initial keys. 2025/04/30 11:09:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:10 server newly acked packets (1): [0] 2025/04/30 11:09:10 server updated RTT: 32.328625ms (σ: 16.164312ms) 2025/04/30 11:09:10 server Canceling loss detection timer. 2025/04/30 11:09:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:10 Retiring connection ID 2c1d54cba4781927 in 5s. 2025/04/30 11:09:10 server Dropping Handshake keys. 2025/04/30 11:09:10 server -> Sending packet 1 (251 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:10 server -> &wire.NewTokenFrame{Token: 0x95898f0b48706bcef391b29106d3a4fb14253ef4af13e7cd289f7db17416776552fcd36fe8db99cc5bae9be782abaa1063ae74838b19d47bdd225732322e717cb4ee10bcc79473ed789c1216ad48e9de8273d7e63021} 2025/04/30 11:09:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:10 server <- Reading packet 2 (1252 bytes) for connection f1c791c3, 1-RTT 2025/04/30 11:09:10 server Short Header{DestConnectionID: f1c791c3, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:10 server <- &wire.PingFrame{} 2025/04/30 11:09:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:10 server newly acked packets (1): [0] 2025/04/30 11:09:10 server updated RTT: 32.453ms (σ: 12.373ms) 2025/04/30 11:09:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:10 server -> Sending packet 2 (24 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 128.679µs} 2025/04/30 11:09:10 Received request: GET /ojapamgbva 2025/04/30 11:09:10 server -> Sending packet 3 (1045 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:10 server <- Reading packet 4 (38 bytes) for connection f1c791c3, 1-RTT 2025/04/30 11:09:10 server Short Header{DestConnectionID: f1c791c3, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:10 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:10 server newly acked packets (2): [1 3] 2025/04/30 11:09:10 server updated RTT: 32.325ms (σ: 9.534ms) 2025/04/30 11:09:10 server ECN capability confirmed. 2025/04/30 11:09:10 server Canceling loss detection timer. 2025/04/30 11:09:10 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:10 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:10 server -> Sending packet 4 (29 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 118.169µs} 2025/04/30 11:09:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:10 server -> Sending packet 17 (22 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:10 server Skipping packet number 16 2025/04/30 11:09:10 server -> Sending packet 18 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:10 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:10 server -> Sending packet 6 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:10 server -> Sending packet 7 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:10 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:11 server -> Sending packet 9 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:11 server -> Sending packet 10 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:11 server -> Sending packet 11 (1366 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.PingFrame{} 2025/04/30 11:09:11 server <- Received Initial packet. 2025/04/30 11:09:11 Created qlog file: /logs/qlog/b593b63e633306c6.sqlog 2025/04/30 11:09:11 server Changing connection ID to d359a43d. 2025/04/30 11:09:11 Adding connection IDs b593b63e633306c6 and d359a43d for a new connection. 2025/04/30 11:09:11 server <- Reading packet 0 (1220 bytes) for connection b593b63e633306c6, Initial 2025/04/30 11:09:11 server Long Header{Type: Initial, DestConnectionID: b593b63e633306c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:11 Adding connection ID ee5467ba. 2025/04/30 11:09:11 Adding connection ID dafb8591. 2025/04/30 11:09:11 Adding connection ID 1a52482c. 2025/04/30 11:09:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b593b63e633306c6 2025/04/30 11:09:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d359a43d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:09:11 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d359a43d, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1a52482c, StatelessResetToken: 0x98b974e3919f2c36ab0fbb7ab7dfe9ab} 2025/04/30 11:09:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dafb8591, StatelessResetToken: 0xacba8dd95dca3c2688e4addf162a08b2} 2025/04/30 11:09:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee5467ba, StatelessResetToken: 0xfb4b22c7709bd830980766b0f9210111} 2025/04/30 11:09:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:11 server -> Sending packet 21 (1045 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:11 server Skipping packet number 20 2025/04/30 11:09:11 server -> Sending packet 22 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:11 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:11 server -> Sending packet 1 (1280 bytes) for connection b593b63e633306c6, Initial 2025/04/30 11:09:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d359a43d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:11 server -> Sending packet 2 (1280 bytes) for connection b593b63e633306c6, Initial 2025/04/30 11:09:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d359a43d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:11 server Canceling loss detection timer. 2025/04/30 11:09:11 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:09:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:11 server -> Sending packet 13 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:11 server -> Sending packet 14 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:11 server -> Sending packet 21 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:11 server -> Sending packet 22 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:11 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:11 Tracking 30 connection IDs and 0 reset tokens. 2025/04/30 11:09:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:12 server -> Sending packet 16 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:12 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:12 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:12 server -> Sending packet 17 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:12 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:12 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:12 server -> Sending packet 20 (22 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:12 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:12 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:12 server Skipping packet number 19 2025/04/30 11:09:12 server -> Sending packet 21 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:12 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:12 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:12 Removing connection ID e166b91b6570df72 after it has been retired. 2025/04/30 11:09:13 server <- Reading packet 4 (1220 bytes) for connection b593b63e633306c6, Initial 2025/04/30 11:09:13 server Long Header{Type: Initial, DestConnectionID: b593b63e633306c6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:13 server <- &wire.PingFrame{} 2025/04/30 11:09:13 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:13 server -> Sending packet 1 (736 bytes) for connection b593b63e633306c6, Handshake 2025/04/30 11:09:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d359a43d, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:13 server -> Sending packet 2 (736 bytes) for connection b593b63e633306c6, Handshake 2025/04/30 11:09:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d359a43d, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:13 server -> Sending packet 3 (39 bytes) for connection b593b63e633306c6, Initial 2025/04/30 11:09:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d359a43d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:09:13 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:09:13 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:09:13 server -> Sending packet 4 (1280 bytes) for connection b593b63e633306c6, Initial 2025/04/30 11:09:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d359a43d, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:13 server -> Sending packet 5 (1280 bytes) for connection b593b63e633306c6, Initial 2025/04/30 11:09:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d359a43d, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:13 server Canceling loss detection timer. 2025/04/30 11:09:13 server Amplification window limited. Received 2440 bytes, already sent out 7911 bytes 2025/04/30 11:09:13 server <- Reading packet 5 (1220 bytes) for connection d359a43d, Initial 2025/04/30 11:09:13 server Long Header{Type: Initial, DestConnectionID: d359a43d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:13 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:09:13 server <- &wire.PingFrame{} 2025/04/30 11:09:13 server -> Sending packet 6 (39 bytes) for connection b593b63e633306c6, Initial 2025/04/30 11:09:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d359a43d, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:09:13 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:09:13 Removing connection ID 0a82055c510d2701 after it has been retired. 2025/04/30 11:09:13 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:13 server <- Reading packet 8 (72 bytes) for connection d359a43d, Handshake 2025/04/30 11:09:13 server Long Header{Type: Handshake, DestConnectionID: d359a43d, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:13 server Dropping Initial keys. 2025/04/30 11:09:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:13 Retiring connection ID b593b63e633306c6 in 5s. 2025/04/30 11:09:13 server Dropping Handshake keys. 2025/04/30 11:09:13 server <- Reading packet 9 (1148 bytes) for connection d359a43d, 1-RTT 2025/04/30 11:09:13 server Short Header{DestConnectionID: d359a43d, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:13 server -> Sending packet 2 (325 bytes) for connection b593b63e633306c6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:13 Received request: GET /mtvprqzsne 2025/04/30 11:09:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:13 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 352.013µs} 2025/04/30 11:09:13 server -> &wire.NewTokenFrame{Token: 0x2a22e22b5fbbfa4e386ff3401f46c6cbf9fa6ed4e43d7a40009a626065f9d5d6c67e9a9b36e3b03ee7470b92e6c093fe0defd09bccc4a9890cc9c2e55bee2850f2a4732abd1c274affdb80dbae2b4963c9539d022317} 2025/04/30 11:09:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1a52482c, StatelessResetToken: 0x98b974e3919f2c36ab0fbb7ab7dfe9ab} 2025/04/30 11:09:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dafb8591, StatelessResetToken: 0xacba8dd95dca3c2688e4addf162a08b2} 2025/04/30 11:09:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee5467ba, StatelessResetToken: 0xfb4b22c7709bd830980766b0f9210111} 2025/04/30 11:09:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:13 server -> Sending packet 3 (1280 bytes) for connection b593b63e633306c6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:13 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1a52482c, StatelessResetToken: 0x98b974e3919f2c36ab0fbb7ab7dfe9ab} 2025/04/30 11:09:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dafb8591, StatelessResetToken: 0xacba8dd95dca3c2688e4addf162a08b2} 2025/04/30 11:09:13 server -> &wire.NewTokenFrame{Token: 0x2a22e22b5fbbfa4e386ff3401f46c6cbf9fa6ed4e43d7a40009a626065f9d5d6c67e9a9b36e3b03ee7470b92e6c093fe0defd09bccc4a9890cc9c2e55bee2850f2a4732abd1c274affdb80dbae2b4963c9539d022317} 2025/04/30 11:09:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee5467ba, StatelessResetToken: 0xfb4b22c7709bd830980766b0f9210111} 2025/04/30 11:09:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 958, Offset + Data length: 958} 2025/04/30 11:09:13 server -> Sending packet 4 (1366 bytes) for connection b593b63e633306c6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:13 server -> &wire.PingFrame{} 2025/04/30 11:09:13 server -> Sending packet 5 (89 bytes) for connection b593b63e633306c6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:13 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 958, Data length: 66, Offset + Data length: 1024} 2025/04/30 11:09:13 server <- Reading packet 10 (40 bytes) for connection d359a43d, 1-RTT 2025/04/30 11:09:13 server Short Header{DestConnectionID: d359a43d, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:13 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:13 server newly acked packets (2): [3 5] 2025/04/30 11:09:13 server updated RTT: 33.046133ms (σ: 16.523066ms) 2025/04/30 11:09:13 server ECN capability confirmed. 2025/04/30 11:09:13 server setting loss timer for packet 4 (1-RTT) to 37.176899ms (in 2025-04-30 11:09:13.58248446 +0000 UTC m=+7.672045582) 2025/04/30 11:09:13 server Canceling loss detection timer. 2025/04/30 11:09:13 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:13 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:13 server -> Sending packet 6 (27 bytes) for connection b593b63e633306c6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:13 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:13 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 156.731µs} 2025/04/30 11:09:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:13 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:13.58248446 +0000 UTC m=+7.672045582 2025/04/30 11:09:13 server lost packet 4 (time threshold) 2025/04/30 11:09:13 server <- Reading packet 11 (36 bytes) for connection d359a43d, 1-RTT 2025/04/30 11:09:13 server Short Header{DestConnectionID: d359a43d, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:13 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:13 server newly acked packets (1): [6] 2025/04/30 11:09:13 server updated RTT: 32.77ms (σ: 12.944ms) 2025/04/30 11:09:13 server Canceling loss detection timer. 2025/04/30 11:09:13 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:13 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:13 Replacing connection for connection IDs [1a52482c d359a43d ee5467ba dafb8591] with a closed connection. 2025/04/30 11:09:13 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:13 server Connection b593b63e633306c6 closed. 2025/04/30 11:09:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:13 server -> Sending packet 19 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:13 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:13 server -> Sending packet 20 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:13 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:13 Tracking 28 connection IDs and 0 reset tokens. 2025/04/30 11:09:14 server <- Received Initial packet. 2025/04/30 11:09:14 Created qlog file: /logs/qlog/9b3060a354b91dcc.sqlog 2025/04/30 11:09:14 server Changing connection ID to 80ffa927. 2025/04/30 11:09:14 Adding connection IDs 9b3060a354b91dcc and 80ffa927 for a new connection. 2025/04/30 11:09:14 server <- Reading packet 2 (1220 bytes) for connection 9b3060a354b91dcc, Initial 2025/04/30 11:09:14 server Long Header{Type: Initial, DestConnectionID: 9b3060a354b91dcc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:14 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:14 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:14 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:14 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:14 Adding connection ID 2e6fce5f. 2025/04/30 11:09:14 Adding connection ID 8709d709. 2025/04/30 11:09:14 Adding connection ID ef1b4b43. 2025/04/30 11:09:14 server <- &wire.PingFrame{} 2025/04/30 11:09:14 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9b3060a354b91dcc 2025/04/30 11:09:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 80ffa927, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:09:14 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:09:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:14 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 80ffa927, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:09:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:09:14 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8709d709, StatelessResetToken: 0xefc77d6b3bd514da3c565675b33690eb} 2025/04/30 11:09:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e6fce5f, StatelessResetToken: 0xe2ea361ed3c1aa7c21af7401d52ee970} 2025/04/30 11:09:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ef1b4b43, StatelessResetToken: 0x2eba1cbf0fe6d3ab9b2f3af443154df7} 2025/04/30 11:09:14 server <- Reading packet 3 (1220 bytes) for connection 80ffa927, Handshake 2025/04/30 11:09:14 server Long Header{Type: Handshake, DestConnectionID: 80ffa927, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:09:14 server Dropping Initial keys. 2025/04/30 11:09:14 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:09:14 server newly acked packets (1): [0] 2025/04/30 11:09:14 server updated RTT: 33.642841ms (σ: 16.82142ms) 2025/04/30 11:09:14 server Canceling loss detection timer. 2025/04/30 11:09:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:14 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:14 server <- &wire.PingFrame{} 2025/04/30 11:09:14 Retiring connection ID 9b3060a354b91dcc in 5s. 2025/04/30 11:09:14 server Dropping Handshake keys. 2025/04/30 11:09:14 server -> Sending packet 1 (251 bytes) for connection 9b3060a354b91dcc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:14 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:14 server -> &wire.NewTokenFrame{Token: 0xeb26f9ac75d4d1e3d8735598a0b92599f650f59e3508d82c4e447728127b21d365ce249647dae428045fb6e95bca202705587a88c5ee04e18fdac5edde4583d75c05be2bb4e97f203f36f6260a647dc7d59455d8f951} 2025/04/30 11:09:14 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:14 server <- Reading packet 4 (1252 bytes) for connection 80ffa927, 1-RTT 2025/04/30 11:09:14 server Short Header{DestConnectionID: 80ffa927, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:14 server <- &wire.PingFrame{} 2025/04/30 11:09:14 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:14 server newly acked packets (1): [0] 2025/04/30 11:09:14 server updated RTT: 33.764ms (σ: 12.86ms) 2025/04/30 11:09:14 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:14 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:14 server -> Sending packet 2 (24 bytes) for connection 9b3060a354b91dcc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:14 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:14 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 116.156µs} 2025/04/30 11:09:14 Received request: GET /zdjvgiwdji 2025/04/30 11:09:14 server -> Sending packet 3 (1045 bytes) for connection 9b3060a354b91dcc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:14 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:14 server <- Reading packet 5 (1332 bytes) for connection 80ffa927, 1-RTT 2025/04/30 11:09:14 server Short Header{DestConnectionID: 80ffa927, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:14 server <- &wire.PingFrame{} 2025/04/30 11:09:14 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:14 server <- Reading packet 6 (38 bytes) for connection 80ffa927, 1-RTT 2025/04/30 11:09:14 server Short Header{DestConnectionID: 80ffa927, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:14 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:14 server newly acked packets (2): [1 3] 2025/04/30 11:09:14 server updated RTT: 33.482ms (σ: 10.208ms) 2025/04/30 11:09:14 server ECN capability confirmed. 2025/04/30 11:09:14 server Canceling loss detection timer. 2025/04/30 11:09:14 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:14 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:09:14 server -> Sending packet 4 (27 bytes) for connection 9b3060a354b91dcc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:14 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:14 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 207.333µs} 2025/04/30 11:09:14 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:14 server <- Reading packet 7 (28 bytes) for connection 80ffa927, 1-RTT 2025/04/30 11:09:14 server Short Header{DestConnectionID: 80ffa927, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:14 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:14 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:14 Replacing connection for connection IDs [2e6fce5f 8709d709 ef1b4b43 80ffa927] with a closed connection. 2025/04/30 11:09:14 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:14 server Connection 9b3060a354b91dcc closed. 2025/04/30 11:09:14 Removing connection ID 40a8c09cd5519a55 after it has been retired. 2025/04/30 11:09:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:14 server -> Sending packet 24 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:14 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:14 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:14 server -> Sending packet 25 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:14 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:14 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:14 server <- Received Initial packet. 2025/04/30 11:09:14 Created qlog file: /logs/qlog/bce86b40e1e58380.sqlog 2025/04/30 11:09:14 server Changing connection ID to 1f948bce. 2025/04/30 11:09:14 Adding connection IDs bce86b40e1e58380 and 1f948bce for a new connection. 2025/04/30 11:09:14 server <- Reading packet 0 (1220 bytes) for connection bce86b40e1e58380, Initial 2025/04/30 11:09:14 server Long Header{Type: Initial, DestConnectionID: bce86b40e1e58380, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:14 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:14 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:14 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:14 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:14 Adding connection ID 077ada9c. 2025/04/30 11:09:14 Adding connection ID e57b6d49. 2025/04/30 11:09:14 Adding connection ID 0b7a1c4d. 2025/04/30 11:09:14 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bce86b40e1e58380 2025/04/30 11:09:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f948bce, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 441, Version: v1} 2025/04/30 11:09:14 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:14 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1f948bce, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:09:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:09:14 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b7a1c4d, StatelessResetToken: 0x8faa44ecfc00d7f1f98cdc85f09330fa} 2025/04/30 11:09:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 077ada9c, StatelessResetToken: 0x8eb54a8815977280db06196139193771} 2025/04/30 11:09:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e57b6d49, StatelessResetToken: 0x3f3507f386e3eeb0d85683b9133eeb1c} 2025/04/30 11:09:14 Removing connection ID b716a71c22a74a76 after it has been retired. 2025/04/30 11:09:14 server <- Reading packet 1 (1220 bytes) for connection bce86b40e1e58380, Initial 2025/04/30 11:09:14 server Long Header{Type: Initial, DestConnectionID: bce86b40e1e58380, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:14 server <- &wire.PingFrame{} 2025/04/30 11:09:14 server -> Sending packet 1 (37 bytes) for connection bce86b40e1e58380, Initial 2025/04/30 11:09:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f948bce, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:14 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:15 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:15 server -> Sending packet 2 (1280 bytes) for connection bce86b40e1e58380, Initial 2025/04/30 11:09:15 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f948bce, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:15 server -> Sending packet 3 (1280 bytes) for connection bce86b40e1e58380, Initial 2025/04/30 11:09:15 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1f948bce, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:15 server <- Reading packet 2 (1220 bytes) for connection 1f948bce, Initial 2025/04/30 11:09:15 server Long Header{Type: Initial, DestConnectionID: 1f948bce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:15 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 792µs} 2025/04/30 11:09:15 server newly acked packets (1): [3] 2025/04/30 11:09:15 server updated RTT: 59.480126ms (σ: 29.740063ms) 2025/04/30 11:09:15 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:15 server -> Sending packet 1 (734 bytes) for connection bce86b40e1e58380, Handshake 2025/04/30 11:09:15 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1f948bce, PacketNumber: 1, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:09:15 server -> Sending packet 2 (734 bytes) for connection bce86b40e1e58380, Handshake 2025/04/30 11:09:15 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1f948bce, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:09:15 server <- Reading packet 3 (77 bytes) for connection 1f948bce, Handshake 2025/04/30 11:09:15 server Long Header{Type: Handshake, DestConnectionID: 1f948bce, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:15 server Dropping Initial keys. 2025/04/30 11:09:15 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:09:15 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:15 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:15 Retiring connection ID bce86b40e1e58380 in 5s. 2025/04/30 11:09:15 server Dropping Handshake keys. 2025/04/30 11:09:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:15 server -> Sending packet 2 (323 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e57b6d49, StatelessResetToken: 0x3f3507f386e3eeb0d85683b9133eeb1c} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b7a1c4d, StatelessResetToken: 0x8faa44ecfc00d7f1f98cdc85f09330fa} 2025/04/30 11:09:15 server -> &wire.NewTokenFrame{Token: 0xbef60489ce448906727200272a5f421ada37bf5ca1d5f18062243fb4aff6214b31d08e31bc0526087b491eb5dc1707a507618d789decee0cb4525f4ce4999f431e1da8598efd36a8b96a17d43f1db1cf3bde09f14d96} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 077ada9c, StatelessResetToken: 0x8eb54a8815977280db06196139193771} 2025/04/30 11:09:15 server -> Sending packet 3 (323 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e57b6d49, StatelessResetToken: 0x3f3507f386e3eeb0d85683b9133eeb1c} 2025/04/30 11:09:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 077ada9c, StatelessResetToken: 0x8eb54a8815977280db06196139193771} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b7a1c4d, StatelessResetToken: 0x8faa44ecfc00d7f1f98cdc85f09330fa} 2025/04/30 11:09:15 server -> &wire.NewTokenFrame{Token: 0xbef60489ce448906727200272a5f421ada37bf5ca1d5f18062243fb4aff6214b31d08e31bc0526087b491eb5dc1707a507618d789decee0cb4525f4ce4999f431e1da8598efd36a8b96a17d43f1db1cf3bde09f14d96} 2025/04/30 11:09:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:15 server -> Sending packet 24 (1045 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:15 server Skipping packet number 23 2025/04/30 11:09:15 server -> Sending packet 25 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:15 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:15 Removing connection IDs [3ba663c5 5ad8aeb7 7ed269d5 82af01a6] for a closed connection after it has been retired. 2025/04/30 11:09:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:15 server -> Sending packet 23 (22 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:15 server Skipping packet number 22 2025/04/30 11:09:15 server -> Sending packet 24 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:15 server -> Sending packet 5 (323 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.NewTokenFrame{Token: 0xbef60489ce448906727200272a5f421ada37bf5ca1d5f18062243fb4aff6214b31d08e31bc0526087b491eb5dc1707a507618d789decee0cb4525f4ce4999f431e1da8598efd36a8b96a17d43f1db1cf3bde09f14d96} 2025/04/30 11:09:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 077ada9c, StatelessResetToken: 0x8eb54a8815977280db06196139193771} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e57b6d49, StatelessResetToken: 0x3f3507f386e3eeb0d85683b9133eeb1c} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b7a1c4d, StatelessResetToken: 0x8faa44ecfc00d7f1f98cdc85f09330fa} 2025/04/30 11:09:15 server -> Sending packet 6 (323 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e57b6d49, StatelessResetToken: 0x3f3507f386e3eeb0d85683b9133eeb1c} 2025/04/30 11:09:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b7a1c4d, StatelessResetToken: 0x8faa44ecfc00d7f1f98cdc85f09330fa} 2025/04/30 11:09:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 077ada9c, StatelessResetToken: 0x8eb54a8815977280db06196139193771} 2025/04/30 11:09:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:15 server -> &wire.NewTokenFrame{Token: 0xbef60489ce448906727200272a5f421ada37bf5ca1d5f18062243fb4aff6214b31d08e31bc0526087b491eb5dc1707a507618d789decee0cb4525f4ce4999f431e1da8598efd36a8b96a17d43f1db1cf3bde09f14d96} 2025/04/30 11:09:15 server -> Sending packet 7 (1366 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:15 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:15 server -> &wire.PingFrame{} 2025/04/30 11:09:15 server <- Reading packet 7 (35 bytes) for connection 1f948bce, 1-RTT 2025/04/30 11:09:15 server Short Header{DestConnectionID: 1f948bce, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:15 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:15 server newly acked packets (1): [6] 2025/04/30 11:09:15 server updated RTT: 55.969ms (σ: 29.325ms) 2025/04/30 11:09:15 server ECN capability confirmed. 2025/04/30 11:09:15 server Canceling loss detection timer. 2025/04/30 11:09:15 Removing connection ID 2c1d54cba4781927 after it has been retired. 2025/04/30 11:09:15 Tracking 31 connection IDs and 0 reset tokens. 2025/04/30 11:09:16 server <- Reading packet 9 (1220 bytes) for connection 1f948bce, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 1f948bce, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.PingFrame{} 2025/04/30 11:09:16 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:16 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:16 server -> Sending packet 8 (26 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 167.261µs} 2025/04/30 11:09:16 Received request: GET /xqnlknxtbp 2025/04/30 11:09:16 server -> Sending packet 9 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server <- Reading packet 10 (1220 bytes) for connection 1f948bce, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 1f948bce, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:09:16 server newly acked packets (1): [7] 2025/04/30 11:09:16 server <- &wire.PingFrame{} 2025/04/30 11:09:16 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:16 server -> Sending packet 10 (1409 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.PingFrame{} 2025/04/30 11:09:16 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:16 server -> Sending packet 11 (27 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 25.327583ms} 2025/04/30 11:09:16 server <- Reading packet 11 (35 bytes) for connection 1f948bce, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 1f948bce, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 7, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:09:16 server newly acked packets (1): [10] 2025/04/30 11:09:16 server updated RTT: 52.942ms (σ: 28.046ms) 2025/04/30 11:09:16 server lost packet 9 (time threshold) 2025/04/30 11:09:16 server Canceling loss detection timer. 2025/04/30 11:09:16 server -> Sending packet 12 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server <- Reading packet 12 (1220 bytes) for connection 1f948bce, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 1f948bce, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.PingFrame{} 2025/04/30 11:09:16 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:16 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:16 server -> Sending packet 13 (27 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 7, AckRanges: {{Largest: 12, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 25.287738ms} 2025/04/30 11:09:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:16 server -> Sending packet 15 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server -> Sending packet 16 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server <- Received Initial packet. 2025/04/30 11:09:16 Created qlog file: /logs/qlog/db0078fb53c2f0d2.sqlog 2025/04/30 11:09:16 server Changing connection ID to 08957c1b. 2025/04/30 11:09:16 Adding connection IDs db0078fb53c2f0d2 and 08957c1b for a new connection. 2025/04/30 11:09:16 server <- Reading packet 0 (1220 bytes) for connection db0078fb53c2f0d2, Initial 2025/04/30 11:09:16 server Long Header{Type: Initial, DestConnectionID: db0078fb53c2f0d2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:16 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:16 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:16 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:16 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:16 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:16 Adding connection ID f6ee3aa3. 2025/04/30 11:09:16 Adding connection ID 8b8ea635. 2025/04/30 11:09:16 Adding connection ID ab3218ad. 2025/04/30 11:09:16 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection db0078fb53c2f0d2 2025/04/30 11:09:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08957c1b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:09:16 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08957c1b, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:09:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ab3218ad, StatelessResetToken: 0x0b821d8ddcffe3862de8dfadc9540a47} 2025/04/30 11:09:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b8ea635, StatelessResetToken: 0x453b8face3a2bf0be24ada0fabe8521b} 2025/04/30 11:09:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f6ee3aa3, StatelessResetToken: 0x216503ae511f64bee70a475c350b5a92} 2025/04/30 11:09:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:16 server -> Sending packet 18 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server -> Sending packet 19 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server -> Sending packet 20 (1430 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.PingFrame{} 2025/04/30 11:09:16 server <- Reading packet 1 (77 bytes) for connection 08957c1b, Handshake 2025/04/30 11:09:16 server Long Header{Type: Handshake, DestConnectionID: 08957c1b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:16 server Dropping Initial keys. 2025/04/30 11:09:16 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:16 server newly acked packets (1): [0] 2025/04/30 11:09:16 server updated RTT: 32.507393ms (σ: 16.253696ms) 2025/04/30 11:09:16 server Canceling loss detection timer. 2025/04/30 11:09:16 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:16 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:16 Retiring connection ID db0078fb53c2f0d2 in 5s. 2025/04/30 11:09:16 server Dropping Handshake keys. 2025/04/30 11:09:16 server -> Sending packet 1 (251 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.NewTokenFrame{Token: 0x2ed3de9e32274f5baa4af6391a3aacec51e37f9b3ab0d27f383030f9461ed18bcf36fdac464741633023a97f9e79ccb4d044c4baa3db22ba64bbca5c56c3e6c21ab8fedeccfd7a96444f00612c5cd96decbb8c3d61e8} 2025/04/30 11:09:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:16 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:16 server <- Reading packet 2 (1252 bytes) for connection 08957c1b, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 08957c1b, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.PingFrame{} 2025/04/30 11:09:16 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:16 server newly acked packets (1): [0] 2025/04/30 11:09:16 server updated RTT: 32.633ms (σ: 12.442ms) 2025/04/30 11:09:16 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:16 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:16 server -> Sending packet 2 (24 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 118.839µs} 2025/04/30 11:09:16 Received request: GET /bvcqxypfyv 2025/04/30 11:09:16 server -> Sending packet 3 (1045 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server <- Reading packet 3 (34 bytes) for connection 08957c1b, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 08957c1b, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:16 server newly acked packets (1): [1] 2025/04/30 11:09:16 server updated RTT: 35.565ms (σ: 15.196ms) 2025/04/30 11:09:16 server ECN capability confirmed. 2025/04/30 11:09:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:16 server -> Sending packet 5 (1045 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server -> Sending packet 6 (1045 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:16 server <- Reading packet 4 (1220 bytes) for connection 08957c1b, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 08957c1b, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.PingFrame{} 2025/04/30 11:09:16 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:16 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:16 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:16 server -> Sending packet 7 (25 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 25.311475ms} 2025/04/30 11:09:16 server <- Reading packet 5 (40 bytes) for connection 08957c1b, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 08957c1b, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:16 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:16 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:16 server -> Sending packet 8 (1366 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.PingFrame{} 2025/04/30 11:09:16 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:16 server -> Sending packet 9 (25 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 25.341839ms} 2025/04/30 11:09:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:16 server -> Sending packet 22 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:16 server -> Sending packet 23 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:16 server <- Reading packet 7 (1332 bytes) for connection 08957c1b, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 08957c1b, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.PingFrame{} 2025/04/30 11:09:16 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:16 server -> Sending packet 10 (26 bytes) for connection db0078fb53c2f0d2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:16 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:16 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 2}}, DelayTime: 72.675µs} 2025/04/30 11:09:16 server <- Reading packet 8 (36 bytes) for connection 08957c1b, 1-RTT 2025/04/30 11:09:16 server Short Header{DestConnectionID: 08957c1b, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:16 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:16 server newly acked packets (1): [6] 2025/04/30 11:09:16 server Canceling loss detection timer. 2025/04/30 11:09:16 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:16 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:16 Replacing connection for connection IDs [08957c1b f6ee3aa3 8b8ea635 ab3218ad] with a closed connection. 2025/04/30 11:09:16 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:16 server Connection db0078fb53c2f0d2 closed. 2025/04/30 11:09:17 server <- Received Initial packet. 2025/04/30 11:09:17 Created qlog file: /logs/qlog/4b8bf91a4cde15d8.sqlog 2025/04/30 11:09:17 server Changing connection ID to ab00671d. 2025/04/30 11:09:17 Adding connection IDs 4b8bf91a4cde15d8 and ab00671d for a new connection. 2025/04/30 11:09:17 server <- Reading packet 1 (1220 bytes) for connection 4b8bf91a4cde15d8, Initial 2025/04/30 11:09:17 server Long Header{Type: Initial, DestConnectionID: 4b8bf91a4cde15d8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:17 Adding connection ID be301142. 2025/04/30 11:09:17 Adding connection ID 91c4a913. 2025/04/30 11:09:17 Adding connection ID fba49083. 2025/04/30 11:09:17 server <- &wire.PingFrame{} 2025/04/30 11:09:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4b8bf91a4cde15d8 2025/04/30 11:09:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ab00671d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:09:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:09:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ab00671d, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:09:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: be301142, StatelessResetToken: 0xac3121d893765f7615c3c2bc950c839f} 2025/04/30 11:09:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fba49083, StatelessResetToken: 0xdbe083c8464e462259dfd54e9b4d0d8d} 2025/04/30 11:09:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 91c4a913, StatelessResetToken: 0xb8bfb20d196a19ac269b3d6a96196513} 2025/04/30 11:09:17 server <- Reading packet 2 (77 bytes) for connection ab00671d, Handshake 2025/04/30 11:09:17 server Long Header{Type: Handshake, DestConnectionID: ab00671d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:17 server Dropping Initial keys. 2025/04/30 11:09:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:17 server newly acked packets (1): [0] 2025/04/30 11:09:17 server updated RTT: 32.607095ms (σ: 16.303547ms) 2025/04/30 11:09:17 server Canceling loss detection timer. 2025/04/30 11:09:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:17 Retiring connection ID 4b8bf91a4cde15d8 in 5s. 2025/04/30 11:09:17 server Dropping Handshake keys. 2025/04/30 11:09:17 server -> Sending packet 1 (251 bytes) for connection 4b8bf91a4cde15d8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:17 server -> &wire.NewTokenFrame{Token: 0x8c9d7b843d39fa7552ca6f55ba639c609f28fae85a11986a47142f40ad9cc09908eced7f3c17b553ef344fdac19cf4153a170340a46c3b713b035651cc0a98d8f93dbff69da70ed57c8a6c8f40fb785de61679eb95a2} 2025/04/30 11:09:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:17 server <- Reading packet 3 (1252 bytes) for connection ab00671d, 1-RTT 2025/04/30 11:09:17 server Short Header{DestConnectionID: ab00671d, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:17 server <- &wire.PingFrame{} 2025/04/30 11:09:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:17 server newly acked packets (1): [0] 2025/04/30 11:09:17 server updated RTT: 32.729ms (σ: 12.472ms) 2025/04/30 11:09:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:17 server -> Sending packet 2 (24 bytes) for connection 4b8bf91a4cde15d8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 125.653µs} 2025/04/30 11:09:17 Received request: GET /ohbowmvjvy 2025/04/30 11:09:17 server -> Sending packet 3 (1045 bytes) for connection 4b8bf91a4cde15d8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:17 server -> Sending packet 22 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:17 server -> Sending packet 23 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:17 server <- Reading packet 4 (1332 bytes) for connection ab00671d, 1-RTT 2025/04/30 11:09:17 server Short Header{DestConnectionID: ab00671d, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:17 server <- &wire.PingFrame{} 2025/04/30 11:09:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:17 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:17 server -> Sending packet 4 (25 bytes) for connection 4b8bf91a4cde15d8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.220994ms} 2025/04/30 11:09:17 server <- Reading packet 5 (1412 bytes) for connection ab00671d, 1-RTT 2025/04/30 11:09:17 server Short Header{DestConnectionID: ab00671d, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:17 server <- &wire.PingFrame{} 2025/04/30 11:09:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:17 server -> Sending packet 6 (257 bytes) for connection 4b8bf91a4cde15d8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 20.177375ms} 2025/04/30 11:09:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:17 server -> &wire.NewTokenFrame{Token: 0x8c9d7b843d39fa7552ca6f55ba639c609f28fae85a11986a47142f40ad9cc09908eced7f3c17b553ef344fdac19cf4153a170340a46c3b713b035651cc0a98d8f93dbff69da70ed57c8a6c8f40fb785de61679eb95a2} 2025/04/30 11:09:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:17 server Skipping packet number 5 2025/04/30 11:09:17 server -> Sending packet 7 (1045 bytes) for connection 4b8bf91a4cde15d8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:17 server <- Reading packet 6 (42 bytes) for connection ab00671d, 1-RTT 2025/04/30 11:09:17 server Short Header{DestConnectionID: ab00671d, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:17 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:17 server newly acked packets (1): [7] 2025/04/30 11:09:17 server updated RTT: 32.63ms (σ: 9.55ms) 2025/04/30 11:09:17 server ECN capability confirmed. 2025/04/30 11:09:17 server setting loss timer for packet 6 (1-RTT) to 36.70875ms (in 2025-04-30 11:09:17.544195149 +0000 UTC m=+11.633756271) 2025/04/30 11:09:17 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:17 server -> Sending packet 8 (27 bytes) for connection 4b8bf91a4cde15d8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 129.942µs} 2025/04/30 11:09:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:17 server <- Reading packet 7 (28 bytes) for connection ab00671d, 1-RTT 2025/04/30 11:09:17 server Short Header{DestConnectionID: ab00671d, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:17 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:17 Replacing connection for connection IDs [be301142 91c4a913 fba49083 ab00671d] with a closed connection. 2025/04/30 11:09:17 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:17 server Connection 4b8bf91a4cde15d8 closed. 2025/04/30 11:09:17 server <- Received Initial packet. 2025/04/30 11:09:17 Created qlog file: /logs/qlog/2c44a2609674b94e.sqlog 2025/04/30 11:09:17 server Changing connection ID to b10b115f. 2025/04/30 11:09:17 Adding connection IDs 2c44a2609674b94e and b10b115f for a new connection. 2025/04/30 11:09:17 server <- Reading packet 0 (1220 bytes) for connection 2c44a2609674b94e, Initial 2025/04/30 11:09:17 server Long Header{Type: Initial, DestConnectionID: 2c44a2609674b94e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:17 Adding connection ID 76786c33. 2025/04/30 11:09:17 Adding connection ID bb4d7db5. 2025/04/30 11:09:17 Adding connection ID caee89f8. 2025/04/30 11:09:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2c44a2609674b94e 2025/04/30 11:09:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b10b115f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 443, Version: v1} 2025/04/30 11:09:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b10b115f, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:09:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb4d7db5, StatelessResetToken: 0x275e577cf70763780ca6508552af5242} 2025/04/30 11:09:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76786c33, StatelessResetToken: 0x220ed12c5cf784d170dcd8a04c172193} 2025/04/30 11:09:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: caee89f8, StatelessResetToken: 0xdcc8a3e3784c775aba6281f1d20c87d2} 2025/04/30 11:09:17 Tracking 46 connection IDs and 0 reset tokens. 2025/04/30 11:09:17 server <- Reading packet 1 (77 bytes) for connection b10b115f, Handshake 2025/04/30 11:09:17 server Long Header{Type: Handshake, DestConnectionID: b10b115f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:17 server Dropping Initial keys. 2025/04/30 11:09:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:17 server newly acked packets (1): [0] 2025/04/30 11:09:17 server updated RTT: 32.55543ms (σ: 16.277715ms) 2025/04/30 11:09:17 server Canceling loss detection timer. 2025/04/30 11:09:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:17 Retiring connection ID 2c44a2609674b94e in 5s. 2025/04/30 11:09:17 server Dropping Handshake keys. 2025/04/30 11:09:17 server -> Sending packet 1 (251 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.NewTokenFrame{Token: 0x61b66f6b4ecefcf200f98b5b56fcda94a5ca0771f77bafae895f0dafb8cb22c72bd1e7e2d0000c864bc3edf16dafb787826a22155d2f8f3db07f0044a915ee251ba88b66ed44058cb4795a73283888263b803929ac53} 2025/04/30 11:09:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:17 server <- Reading packet 2 (1252 bytes) for connection b10b115f, 1-RTT 2025/04/30 11:09:17 server Short Header{DestConnectionID: b10b115f, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:17 server <- &wire.PingFrame{} 2025/04/30 11:09:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:17 server newly acked packets (1): [0] 2025/04/30 11:09:17 server updated RTT: 32.673ms (σ: 12.445ms) 2025/04/30 11:09:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:17 server -> Sending packet 2 (24 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 127.086µs} 2025/04/30 11:09:17 Received request: GET /uiybwwlmgd 2025/04/30 11:09:17 server -> Sending packet 3 (1045 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:17 server <- Reading packet 3 (1332 bytes) for connection b10b115f, 1-RTT 2025/04/30 11:09:17 server Short Header{DestConnectionID: b10b115f, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:17 server <- &wire.PingFrame{} 2025/04/30 11:09:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:17 server <- Reading packet 4 (38 bytes) for connection b10b115f, 1-RTT 2025/04/30 11:09:17 server Short Header{DestConnectionID: b10b115f, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:17 server newly acked packets (2): [1 3] 2025/04/30 11:09:17 server updated RTT: 32.534ms (σ: 9.61ms) 2025/04/30 11:09:17 server ECN capability confirmed. 2025/04/30 11:09:17 server Canceling loss detection timer. 2025/04/30 11:09:17 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:17 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:09:17 server -> Sending packet 4 (27 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:17 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:17 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 211.313µs} 2025/04/30 11:09:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:18 server -> Sending packet 6 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server -> Sending packet 7 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:18 server -> Sending packet 9 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server -> Sending packet 10 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server -> Sending packet 11 (1366 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.PingFrame{} 2025/04/30 11:09:18 server <- Received Initial packet. 2025/04/30 11:09:18 Created qlog file: /logs/qlog/4aabec3c5358fc61.sqlog 2025/04/30 11:09:18 server Changing connection ID to 3ed18a74. 2025/04/30 11:09:18 Adding connection IDs 4aabec3c5358fc61 and 3ed18a74 for a new connection. 2025/04/30 11:09:18 server <- Reading packet 0 (1220 bytes) for connection 4aabec3c5358fc61, Initial 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: 4aabec3c5358fc61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:18 Adding connection ID 92c7a606. 2025/04/30 11:09:18 Adding connection ID ee13fff7. 2025/04/30 11:09:18 Adding connection ID d03c9eb4. 2025/04/30 11:09:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4aabec3c5358fc61 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ed18a74, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 444, Version: v1} 2025/04/30 11:09:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ed18a74, PacketNumber: 0, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:18 server <- Reading packet 1 (1220 bytes) for connection 4aabec3c5358fc61, Initial 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: 4aabec3c5358fc61, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:18 server <- &wire.PingFrame{} 2025/04/30 11:09:18 server -> Sending packet 1 (37 bytes) for connection 4aabec3c5358fc61, Initial 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ed18a74, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:18 server -> Sending packet 2 (1280 bytes) for connection 4aabec3c5358fc61, Initial 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ed18a74, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:18 server -> Sending packet 3 (1280 bytes) for connection 4aabec3c5358fc61, Initial 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ed18a74, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:18 Removing connection ID b593b63e633306c6 after it has been retired. 2025/04/30 11:09:18 server <- Reading packet 2 (1220 bytes) for connection 3ed18a74, Initial 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: 3ed18a74, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:09:18 server newly acked packets (1): [3] 2025/04/30 11:09:18 server updated RTT: 33.696489ms (σ: 16.848244ms) 2025/04/30 11:09:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:18 server -> Sending packet 1 (731 bytes) for connection 4aabec3c5358fc61, Handshake 2025/04/30 11:09:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ed18a74, PacketNumber: 1, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 11:09:18 server -> Sending packet 2 (731 bytes) for connection 4aabec3c5358fc61, Handshake 2025/04/30 11:09:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ed18a74, PacketNumber: 2, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 11:09:18 server <- Reading packet 3 (77 bytes) for connection 3ed18a74, Handshake 2025/04/30 11:09:18 server Long Header{Type: Handshake, DestConnectionID: 3ed18a74, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:18 server Dropping Initial keys. 2025/04/30 11:09:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:09:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:18 Retiring connection ID 4aabec3c5358fc61 in 5s. 2025/04/30 11:09:18 server Dropping Handshake keys. 2025/04/30 11:09:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:18 server -> Sending packet 2 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:18 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:18 server -> Sending packet 3 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:18 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:18 server <- Reading packet 4 (1220 bytes) for connection 3ed18a74, 1-RTT 2025/04/30 11:09:18 server Short Header{DestConnectionID: 3ed18a74, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:18 server <- &wire.PingFrame{} 2025/04/30 11:09:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:18 server -> Sending packet 4 (24 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 90.218µs} 2025/04/30 11:09:18 Received request: GET /iuxtaonjyo 2025/04/30 11:09:18 server -> Sending packet 5 (1045 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:18 Removing connection IDs [1a52482c d359a43d ee5467ba dafb8591] for a closed connection after it has been retired. 2025/04/30 11:09:18 server <- Reading packet 6 (40 bytes) for connection 3ed18a74, 1-RTT 2025/04/30 11:09:18 server Short Header{DestConnectionID: 3ed18a74, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:18 server newly acked packets (1): [5] 2025/04/30 11:09:18 server updated RTT: 33.417ms (σ: 13.193ms) 2025/04/30 11:09:18 server ECN capability confirmed. 2025/04/30 11:09:18 server setting loss timer for packet 3 (1-RTT) to 37.594125ms (in 2025-04-30 11:09:18.617549593 +0000 UTC m=+12.707110705) 2025/04/30 11:09:18 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:18 server -> Sending packet 6 (29 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 125.453µs} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:18.617549593 +0000 UTC m=+12.707110705 2025/04/30 11:09:18 server lost packet 3 (time threshold) 2025/04/30 11:09:18 server -> Sending packet 7 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:18 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:18 server -> Sending packet 13 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server -> Sending packet 14 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:18 server -> Sending packet 9 (22 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server Skipping packet number 8 2025/04/30 11:09:18 server -> Sending packet 10 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:18 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:18 server -> Sending packet 12 (22 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:18 server Skipping packet number 11 2025/04/30 11:09:18 server -> Sending packet 13 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:18 server -> Sending packet 14 (1366 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.PingFrame{} 2025/04/30 11:09:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:18 server -> Sending packet 25 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:18 server -> Sending packet 26 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:18 server <- Received Initial packet. 2025/04/30 11:09:18 Created qlog file: /logs/qlog/98758f9f61a2f4a8.sqlog 2025/04/30 11:09:18 server Changing connection ID to 4e7210b8. 2025/04/30 11:09:18 Adding connection IDs 98758f9f61a2f4a8 and 4e7210b8 for a new connection. 2025/04/30 11:09:18 server <- Reading packet 0 (1220 bytes) for connection 98758f9f61a2f4a8, Initial 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: 98758f9f61a2f4a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:18 Adding connection ID 1c2e14c6. 2025/04/30 11:09:18 Adding connection ID 28aa8cb7. 2025/04/30 11:09:18 Adding connection ID 6a56003b. 2025/04/30 11:09:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 98758f9f61a2f4a8 2025/04/30 11:09:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:09:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:18 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c2e14c6, StatelessResetToken: 0x48792978c4cb1f3bb5efaadb5ff90427} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a56003b, StatelessResetToken: 0xd9c0a663f0c967e3bf831ff36193af01} 2025/04/30 11:09:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 28aa8cb7, StatelessResetToken: 0x44e9baa6e0e2b33788e120c4bc54e105} 2025/04/30 11:09:19 server <- Reading packet 1 (1220 bytes) for connection 98758f9f61a2f4a8, Initial 2025/04/30 11:09:19 server Long Header{Type: Initial, DestConnectionID: 98758f9f61a2f4a8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:19 server <- &wire.PingFrame{} 2025/04/30 11:09:19 server -> Sending packet 1 (37 bytes) for connection 98758f9f61a2f4a8, Initial 2025/04/30 11:09:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:19 server -> Sending packet 2 (1280 bytes) for connection 98758f9f61a2f4a8, Initial 2025/04/30 11:09:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:19 server -> Sending packet 3 (1280 bytes) for connection 98758f9f61a2f4a8, Initial 2025/04/30 11:09:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:19 server <- Reading packet 2 (1220 bytes) for connection 4e7210b8, Initial 2025/04/30 11:09:19 server Long Header{Type: Initial, DestConnectionID: 4e7210b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 8µs} 2025/04/30 11:09:19 server newly acked packets (1): [3] 2025/04/30 11:09:19 server updated RTT: 34.005182ms (σ: 17.002591ms) 2025/04/30 11:09:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:19 server -> Sending packet 1 (736 bytes) for connection 98758f9f61a2f4a8, Handshake 2025/04/30 11:09:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:19 server -> Sending packet 2 (736 bytes) for connection 98758f9f61a2f4a8, Handshake 2025/04/30 11:09:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:19 server <- Reading packet 3 (1220 bytes) for connection 4e7210b8, Handshake 2025/04/30 11:09:19 server Long Header{Type: Handshake, DestConnectionID: 4e7210b8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:09:19 server Dropping Initial keys. 2025/04/30 11:09:19 server <- &wire.PingFrame{} 2025/04/30 11:09:19 server -> Sending packet 3 (36 bytes) for connection 98758f9f61a2f4a8, Handshake 2025/04/30 11:09:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:19 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:09:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:19 server -> Sending packet 4 (736 bytes) for connection 98758f9f61a2f4a8, Handshake 2025/04/30 11:09:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, PacketNumber: 4, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:19 server -> Sending packet 5 (736 bytes) for connection 98758f9f61a2f4a8, Handshake 2025/04/30 11:09:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4e7210b8, PacketNumber: 5, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:09:19 server <- Reading packet 7 (41 bytes) for connection 4e7210b8, Handshake 2025/04/30 11:09:19 server Long Header{Type: Handshake, DestConnectionID: 4e7210b8, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, Length: 28, Version: v1} 2025/04/30 11:09:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 784µs} 2025/04/30 11:09:19 server newly acked packets (1): [5] 2025/04/30 11:09:19 server updated RTT: 36.897ms (σ: 18.536ms) 2025/04/30 11:09:19 server Canceling loss detection timer. 2025/04/30 11:09:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:19 server -> Sending packet 16 (22 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:19 server Skipping packet number 15 2025/04/30 11:09:19 server -> Sending packet 17 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:19 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:19 server -> Sending packet 16 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:19 server -> Sending packet 17 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:19 Removing connection ID 9b3060a354b91dcc after it has been retired. 2025/04/30 11:09:19 Removing connection IDs [2e6fce5f 8709d709 ef1b4b43 80ffa927] for a closed connection after it has been retired. 2025/04/30 11:09:19 server Parsed a coalesced packet. Part 1: 73 bytes. Remaining: 1147 bytes. 2025/04/30 11:09:19 server <- Reading packet 8 (73 bytes) for connection 4e7210b8, Handshake 2025/04/30 11:09:19 server Long Header{Type: Handshake, DestConnectionID: 4e7210b8, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, Length: 60, Version: v1} 2025/04/30 11:09:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:19 server <- &wire.PingFrame{} 2025/04/30 11:09:19 Retiring connection ID 98758f9f61a2f4a8 in 5s. 2025/04/30 11:09:19 server Dropping Handshake keys. 2025/04/30 11:09:19 server <- Reading packet 9 (1147 bytes) for connection 4e7210b8, 1-RTT 2025/04/30 11:09:19 server Short Header{DestConnectionID: 4e7210b8, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:19 server -> Sending packet 2 (328 bytes) for connection 98758f9f61a2f4a8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 321.457µs} 2025/04/30 11:09:19 server -> &wire.NewTokenFrame{Token: 0xfc7823a39deae47b8b0f42af0832f9dbece7314c34b3b58d94706c7e140e227774cfa3bdcd654da866816a0522ff14f4328dff4d36683f018b7354d876db761338abb9cf1bf8d0110086f38339cafd267be503700c7f} 2025/04/30 11:09:19 Received request: GET /rzdfxxhmpn 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c2e14c6, StatelessResetToken: 0x48792978c4cb1f3bb5efaadb5ff90427} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 28aa8cb7, StatelessResetToken: 0x44e9baa6e0e2b33788e120c4bc54e105} 2025/04/30 11:09:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a56003b, StatelessResetToken: 0xd9c0a663f0c967e3bf831ff36193af01} 2025/04/30 11:09:19 server -> Sending packet 3 (1280 bytes) for connection 98758f9f61a2f4a8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c2e14c6, StatelessResetToken: 0x48792978c4cb1f3bb5efaadb5ff90427} 2025/04/30 11:09:19 server -> &wire.NewTokenFrame{Token: 0xfc7823a39deae47b8b0f42af0832f9dbece7314c34b3b58d94706c7e140e227774cfa3bdcd654da866816a0522ff14f4328dff4d36683f018b7354d876db761338abb9cf1bf8d0110086f38339cafd267be503700c7f} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a56003b, StatelessResetToken: 0xd9c0a663f0c967e3bf831ff36193af01} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 28aa8cb7, StatelessResetToken: 0x44e9baa6e0e2b33788e120c4bc54e105} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:19 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 955, Offset + Data length: 955} 2025/04/30 11:09:19 server -> Sending packet 4 (92 bytes) for connection 98758f9f61a2f4a8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:09:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:19 server -> Sending packet 6 (1280 bytes) for connection 98758f9f61a2f4a8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.NewTokenFrame{Token: 0xfc7823a39deae47b8b0f42af0832f9dbece7314c34b3b58d94706c7e140e227774cfa3bdcd654da866816a0522ff14f4328dff4d36683f018b7354d876db761338abb9cf1bf8d0110086f38339cafd267be503700c7f} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c2e14c6, StatelessResetToken: 0x48792978c4cb1f3bb5efaadb5ff90427} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a56003b, StatelessResetToken: 0xd9c0a663f0c967e3bf831ff36193af01} 2025/04/30 11:09:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 28aa8cb7, StatelessResetToken: 0x44e9baa6e0e2b33788e120c4bc54e105} 2025/04/30 11:09:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:19 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 955, Offset + Data length: 955} 2025/04/30 11:09:19 server Skipping packet number 5 2025/04/30 11:09:19 server -> Sending packet 7 (92 bytes) for connection 98758f9f61a2f4a8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:09:19 server -> Sending packet 8 (1366 bytes) for connection 98758f9f61a2f4a8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:19 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:19 server -> &wire.PingFrame{} 2025/04/30 11:09:19 server <- Reading packet 11 (42 bytes) for connection 4e7210b8, 1-RTT 2025/04/30 11:09:19 server Short Header{DestConnectionID: 4e7210b8, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:19 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:19 server newly acked packets (1): [6] 2025/04/30 11:09:19 server updated RTT: 36.313ms (σ: 15.068ms) 2025/04/30 11:09:19 server ECN capability confirmed. 2025/04/30 11:09:19 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:19 server <- Reading packet 12 (40 bytes) for connection 4e7210b8, 1-RTT 2025/04/30 11:09:19 server Short Header{DestConnectionID: 4e7210b8, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:19 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:19 server newly acked packets (1): [7] 2025/04/30 11:09:19 server updated RTT: 35.804ms (σ: 12.318ms) 2025/04/30 11:09:19 server Canceling loss detection timer. 2025/04/30 11:09:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:19 Replacing connection for connection IDs [4e7210b8 1c2e14c6 28aa8cb7 6a56003b] with a closed connection. 2025/04/30 11:09:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:19 server Connection 98758f9f61a2f4a8 closed. 2025/04/30 11:09:19 Tracking 46 connection IDs and 0 reset tokens. 2025/04/30 11:09:20 Removing connection ID bce86b40e1e58380 after it has been retired. 2025/04/30 11:09:20 server <- Received Initial packet. 2025/04/30 11:09:20 Created qlog file: /logs/qlog/90e8d3e68419b3ee.sqlog 2025/04/30 11:09:20 server Changing connection ID to a6728b1c. 2025/04/30 11:09:20 Adding connection IDs 90e8d3e68419b3ee and a6728b1c for a new connection. 2025/04/30 11:09:20 server <- Reading packet 0 (1220 bytes) for connection 90e8d3e68419b3ee, Initial 2025/04/30 11:09:20 server Long Header{Type: Initial, DestConnectionID: 90e8d3e68419b3ee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:20 Adding connection ID 3fb8dac3. 2025/04/30 11:09:20 Adding connection ID 4f5c7ff7. 2025/04/30 11:09:20 Adding connection ID 3b4d8d7d. 2025/04/30 11:09:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 90e8d3e68419b3ee 2025/04/30 11:09:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6728b1c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 443, Version: v1} 2025/04/30 11:09:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6728b1c, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3fb8dac3, StatelessResetToken: 0xa946ea02127dea8f80b38e4fabcedadc} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f5c7ff7, StatelessResetToken: 0xff48ad1025e088851e4d08fbb8825555} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3b4d8d7d, StatelessResetToken: 0x35e548a86d03611a8dac0511ca6056d3} 2025/04/30 11:09:20 server <- Reading packet 1 (77 bytes) for connection a6728b1c, Handshake 2025/04/30 11:09:20 server Long Header{Type: Handshake, DestConnectionID: a6728b1c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:20 server Dropping Initial keys. 2025/04/30 11:09:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:20 server newly acked packets (1): [0] 2025/04/30 11:09:20 server updated RTT: 32.64242ms (σ: 16.32121ms) 2025/04/30 11:09:20 server Canceling loss detection timer. 2025/04/30 11:09:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:20 Retiring connection ID 90e8d3e68419b3ee in 5s. 2025/04/30 11:09:20 server Dropping Handshake keys. 2025/04/30 11:09:20 server -> Sending packet 1 (251 bytes) for connection 90e8d3e68419b3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:20 server -> &wire.NewTokenFrame{Token: 0x58c7166832401054bc72540579ae2585db7cf6b3be31b04b69e2ad5bf46db7c1b6bbd1b0e5eaf1fa85962f297f108d311dd623c837f6313a5468557af924e759bff3998e7870c7a8ff396b2dd82f30efcc21a2a443e1} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:20 server -> Sending packet 19 (22 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:20 server Skipping packet number 18 2025/04/30 11:09:20 server -> Sending packet 20 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:20 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:20 server -> Sending packet 3 (91 bytes) for connection 90e8d3e68419b3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f5c7ff7, StatelessResetToken: 0xff48ad1025e088851e4d08fbb8825555} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3b4d8d7d, StatelessResetToken: 0x35e548a86d03611a8dac0511ca6056d3} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3fb8dac3, StatelessResetToken: 0xa946ea02127dea8f80b38e4fabcedadc} 2025/04/30 11:09:20 server Skipping packet number 2 2025/04/30 11:09:20 server -> Sending packet 4 (251 bytes) for connection 90e8d3e68419b3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:20 server -> &wire.NewTokenFrame{Token: 0x58c7166832401054bc72540579ae2585db7cf6b3be31b04b69e2ad5bf46db7c1b6bbd1b0e5eaf1fa85962f297f108d311dd623c837f6313a5468557af924e759bff3998e7870c7a8ff396b2dd82f30efcc21a2a443e1} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:20 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:20 server Dropping %!s(logging.PacketType=1) packet (72 bytes) because we already dropped the keys. 2025/04/30 11:09:20 server <- Reading packet 4 (1148 bytes) for connection a6728b1c, 1-RTT 2025/04/30 11:09:20 server Short Header{DestConnectionID: a6728b1c, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:20 server -> Sending packet 5 (24 bytes) for connection 90e8d3e68419b3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 133.819µs} 2025/04/30 11:09:20 Received request: GET /twrgkdwvqu 2025/04/30 11:09:20 server -> Sending packet 6 (1045 bytes) for connection 90e8d3e68419b3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:20 server <- Reading packet 6 (28 bytes) for connection a6728b1c, 1-RTT 2025/04/30 11:09:20 server Short Header{DestConnectionID: a6728b1c, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:20 Replacing connection for connection IDs [3fb8dac3 4f5c7ff7 3b4d8d7d a6728b1c] with a closed connection. 2025/04/30 11:09:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:20 server Connection 90e8d3e68419b3ee closed. 2025/04/30 11:09:20 server <- Received Initial packet. 2025/04/30 11:09:20 Created qlog file: /logs/qlog/5c608d5b85bbbfe4.sqlog 2025/04/30 11:09:20 server Changing connection ID to e6162de5. 2025/04/30 11:09:20 Adding connection IDs 5c608d5b85bbbfe4 and e6162de5 for a new connection. 2025/04/30 11:09:20 server <- Reading packet 0 (1220 bytes) for connection 5c608d5b85bbbfe4, Initial 2025/04/30 11:09:20 server Long Header{Type: Initial, DestConnectionID: 5c608d5b85bbbfe4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:20 Adding connection ID ad8007aa. 2025/04/30 11:09:20 Adding connection ID a3ba0b06. 2025/04/30 11:09:20 Adding connection ID f421316a. 2025/04/30 11:09:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5c608d5b85bbbfe4 2025/04/30 11:09:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6162de5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 441, Version: v1} 2025/04/30 11:09:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e6162de5, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f421316a, StatelessResetToken: 0xdcae9394b1930fc5e56f2095360345c9} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad8007aa, StatelessResetToken: 0x75cc9616b929bb871d2e5fe60ae10eb4} 2025/04/30 11:09:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a3ba0b06, StatelessResetToken: 0x7f700818d5919d2acb75a99f3d59ad22} 2025/04/30 11:09:20 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:20 server -> Sending packet 1 (1280 bytes) for connection 5c608d5b85bbbfe4, Initial 2025/04/30 11:09:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6162de5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:20 server -> Sending packet 2 (1280 bytes) for connection 5c608d5b85bbbfe4, Initial 2025/04/30 11:09:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6162de5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:20 server Canceling loss detection timer. 2025/04/30 11:09:20 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:09:20 server <- Reading packet 2 (1220 bytes) for connection e6162de5, Initial 2025/04/30 11:09:20 server Long Header{Type: Initial, DestConnectionID: e6162de5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 792µs} 2025/04/30 11:09:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:20 server -> Sending packet 19 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:20 server -> Sending packet 20 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:20 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:21 server -> Sending packet 1 (734 bytes) for connection 5c608d5b85bbbfe4, Handshake 2025/04/30 11:09:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e6162de5, PacketNumber: 1, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:09:21 server -> Sending packet 2 (734 bytes) for connection 5c608d5b85bbbfe4, Handshake 2025/04/30 11:09:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e6162de5, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:09:21 server <- Reading packet 3 (77 bytes) for connection e6162de5, Handshake 2025/04/30 11:09:21 server Long Header{Type: Handshake, DestConnectionID: e6162de5, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:21 server Dropping Initial keys. 2025/04/30 11:09:21 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 16µs} 2025/04/30 11:09:21 server newly acked packets (1): [2] 2025/04/30 11:09:21 server updated RTT: 32.607125ms (σ: 16.303562ms) 2025/04/30 11:09:21 server Canceling loss detection timer. 2025/04/30 11:09:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:21 Retiring connection ID 5c608d5b85bbbfe4 in 5s. 2025/04/30 11:09:21 server Dropping Handshake keys. 2025/04/30 11:09:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:21 server -> Sending packet 2 (323 bytes) for connection 5c608d5b85bbbfe4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f421316a, StatelessResetToken: 0xdcae9394b1930fc5e56f2095360345c9} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad8007aa, StatelessResetToken: 0x75cc9616b929bb871d2e5fe60ae10eb4} 2025/04/30 11:09:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a3ba0b06, StatelessResetToken: 0x7f700818d5919d2acb75a99f3d59ad22} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:21 server -> &wire.NewTokenFrame{Token: 0x8331c3ae4f012b68fd6a072566de280190c6ef1bc25c56abcb2996874f1022fb5a86f16dc97e74f6f7121f763cfbce3de4b391e2d2e84b2059ed7d857ab7571e5aec3ab376bfa5545561c46a3a7c5bb852662d3e9851} 2025/04/30 11:09:21 server -> Sending packet 3 (323 bytes) for connection 5c608d5b85bbbfe4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad8007aa, StatelessResetToken: 0x75cc9616b929bb871d2e5fe60ae10eb4} 2025/04/30 11:09:21 server -> &wire.NewTokenFrame{Token: 0x8331c3ae4f012b68fd6a072566de280190c6ef1bc25c56abcb2996874f1022fb5a86f16dc97e74f6f7121f763cfbce3de4b391e2d2e84b2059ed7d857ab7571e5aec3ab376bfa5545561c46a3a7c5bb852662d3e9851} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a3ba0b06, StatelessResetToken: 0x7f700818d5919d2acb75a99f3d59ad22} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f421316a, StatelessResetToken: 0xdcae9394b1930fc5e56f2095360345c9} 2025/04/30 11:09:21 server <- Reading packet 4 (1220 bytes) for connection e6162de5, 1-RTT 2025/04/30 11:09:21 server Short Header{DestConnectionID: e6162de5, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:21 server <- &wire.PingFrame{} 2025/04/30 11:09:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:21 server -> Sending packet 4 (24 bytes) for connection 5c608d5b85bbbfe4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 113.501µs} 2025/04/30 11:09:21 Received request: GET /ibcbglwakc 2025/04/30 11:09:21 server -> Sending packet 5 (1045 bytes) for connection 5c608d5b85bbbfe4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:21 server <- Reading packet 5 (1252 bytes) for connection e6162de5, 1-RTT 2025/04/30 11:09:21 server Short Header{DestConnectionID: e6162de5, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:21 server <- &wire.PingFrame{} 2025/04/30 11:09:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:21 server <- Reading packet 6 (40 bytes) for connection e6162de5, 1-RTT 2025/04/30 11:09:21 server Short Header{DestConnectionID: e6162de5, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:21 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:21 server newly acked packets (1): [5] 2025/04/30 11:09:21 server updated RTT: 32.468ms (σ: 12.504ms) 2025/04/30 11:09:21 server ECN capability confirmed. 2025/04/30 11:09:21 server setting loss timer for packet 3 (1-RTT) to 36.5265ms (in 2025-04-30 11:09:21.163697903 +0000 UTC m=+15.253259015) 2025/04/30 11:09:21 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:21 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:09:21 server -> Sending packet 6 (27 bytes) for connection 5c608d5b85bbbfe4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 90.519µs} 2025/04/30 11:09:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:21 server <- Reading packet 7 (28 bytes) for connection e6162de5, 1-RTT 2025/04/30 11:09:21 server Short Header{DestConnectionID: e6162de5, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:21 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:21 Replacing connection for connection IDs [e6162de5 ad8007aa a3ba0b06 f421316a] with a closed connection. 2025/04/30 11:09:21 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:21 server Connection 5c608d5b85bbbfe4 closed. 2025/04/30 11:09:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:21 server -> Sending packet 27 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:21 server -> Sending packet 28 (22 bytes) for connection 0a82055c510d2701, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:21 server -> Sending packet 26 (22 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:21 server Skipping packet number 25 2025/04/30 11:09:21 server -> Sending packet 27 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:21 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:21 server <- Received Initial packet. 2025/04/30 11:09:21 Created qlog file: /logs/qlog/7db3ff93b9e1c924.sqlog 2025/04/30 11:09:21 server Changing connection ID to 16b81c76. 2025/04/30 11:09:21 Adding connection IDs 7db3ff93b9e1c924 and 16b81c76 for a new connection. 2025/04/30 11:09:21 server <- Reading packet 0 (1220 bytes) for connection 7db3ff93b9e1c924, Initial 2025/04/30 11:09:21 server Long Header{Type: Initial, DestConnectionID: 7db3ff93b9e1c924, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:21 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:21 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:21 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:21 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:21 Adding connection ID 98fc64b6. 2025/04/30 11:09:21 Adding connection ID f4994f0c. 2025/04/30 11:09:21 Adding connection ID 5d88e0cc. 2025/04/30 11:09:21 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7db3ff93b9e1c924 2025/04/30 11:09:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16b81c76, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 445, Version: v1} 2025/04/30 11:09:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16b81c76, PacketNumber: 0, PacketNumberLen: 2, Length: 717, Version: v1} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 11:09:21 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 98fc64b6, StatelessResetToken: 0xd5fe7ee722114d446308ef784020d13e} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5d88e0cc, StatelessResetToken: 0x844e09b2276a93aa27bc403d3bdaf926} 2025/04/30 11:09:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f4994f0c, StatelessResetToken: 0x0ef0d84a016425726b3c2275c3d28682} 2025/04/30 11:09:21 Removing connection ID db0078fb53c2f0d2 after it has been retired. 2025/04/30 11:09:21 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:21 server -> Sending packet 1 (1280 bytes) for connection 7db3ff93b9e1c924, Initial 2025/04/30 11:09:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16b81c76, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:21 server -> Sending packet 2 (1280 bytes) for connection 7db3ff93b9e1c924, Initial 2025/04/30 11:09:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16b81c76, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:21 server Canceling loss detection timer. 2025/04/30 11:09:21 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:09:21 Removing connection IDs [08957c1b f6ee3aa3 8b8ea635 ab3218ad] for a closed connection after it has been retired. 2025/04/30 11:09:21 Tracking 55 connection IDs and 0 reset tokens. 2025/04/30 11:09:21 server <- Reading packet 3 (1220 bytes) for connection 16b81c76, Initial 2025/04/30 11:09:21 server Long Header{Type: Initial, DestConnectionID: 16b81c76, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:21 server <- &wire.PingFrame{} 2025/04/30 11:09:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:21 server -> Sending packet 1 (730 bytes) for connection 7db3ff93b9e1c924, Handshake 2025/04/30 11:09:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16b81c76, PacketNumber: 1, PacketNumberLen: 2, Length: 717, Version: v1} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 11:09:21 server -> Sending packet 2 (730 bytes) for connection 7db3ff93b9e1c924, Handshake 2025/04/30 11:09:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16b81c76, PacketNumber: 2, PacketNumberLen: 2, Length: 717, Version: v1} 2025/04/30 11:09:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 11:09:21 server -> Sending packet 3 (39 bytes) for connection 7db3ff93b9e1c924, Initial 2025/04/30 11:09:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16b81c76, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:09:21 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:09:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:22 server -> Sending packet 28 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:22 server -> Sending packet 29 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:22 server <- Reading packet 4 (77 bytes) for connection 16b81c76, Handshake 2025/04/30 11:09:22 server Long Header{Type: Handshake, DestConnectionID: 16b81c76, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:22 server Dropping Initial keys. 2025/04/30 11:09:22 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:09:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:22 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:22 Retiring connection ID 7db3ff93b9e1c924 in 5s. 2025/04/30 11:09:22 server Dropping Handshake keys. 2025/04/30 11:09:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:22 server -> Sending packet 2 (320 bytes) for connection 7db3ff93b9e1c924, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 98fc64b6, StatelessResetToken: 0xd5fe7ee722114d446308ef784020d13e} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5d88e0cc, StatelessResetToken: 0x844e09b2276a93aa27bc403d3bdaf926} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f4994f0c, StatelessResetToken: 0x0ef0d84a016425726b3c2275c3d28682} 2025/04/30 11:09:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:22 server -> &wire.NewTokenFrame{Token: 0x919276cdd749f5199f82a388c1cd8514fd8de33e952bbcefe4214873da62917d32e9dfcca4709c354434979b67485244b801f25b365d776fde388a5f8955a779e68bc221e4d643290f9a1b806fec6ce26be55d920540} 2025/04/30 11:09:22 server -> Sending packet 3 (320 bytes) for connection 7db3ff93b9e1c924, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 98fc64b6, StatelessResetToken: 0xd5fe7ee722114d446308ef784020d13e} 2025/04/30 11:09:22 server -> &wire.NewTokenFrame{Token: 0x919276cdd749f5199f82a388c1cd8514fd8de33e952bbcefe4214873da62917d32e9dfcca4709c354434979b67485244b801f25b365d776fde388a5f8955a779e68bc221e4d643290f9a1b806fec6ce26be55d920540} 2025/04/30 11:09:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5d88e0cc, StatelessResetToken: 0x844e09b2276a93aa27bc403d3bdaf926} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f4994f0c, StatelessResetToken: 0x0ef0d84a016425726b3c2275c3d28682} 2025/04/30 11:09:22 server -> Sending packet 4 (1366 bytes) for connection 7db3ff93b9e1c924, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.PingFrame{} 2025/04/30 11:09:22 server Dropping %!s(logging.PacketType=1) packet (39 bytes) because we already dropped the keys. 2025/04/30 11:09:22 server <- Reading packet 7 (33 bytes) for connection 16b81c76, 1-RTT 2025/04/30 11:09:22 server Short Header{DestConnectionID: 16b81c76, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:22 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:22 server newly acked packets (1): [3] 2025/04/30 11:09:22 server updated RTT: 31.156979ms (σ: 15.578489ms) 2025/04/30 11:09:22 server ECN capability confirmed. 2025/04/30 11:09:22 server Canceling loss detection timer. 2025/04/30 11:09:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:22 server -> Sending packet 22 (22 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:22 server Skipping packet number 21 2025/04/30 11:09:22 server -> Sending packet 23 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:22 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:22 Removing connection ID 4b8bf91a4cde15d8 after it has been retired. 2025/04/30 11:09:22 Removing connection IDs [be301142 91c4a913 fba49083 ab00671d] for a closed connection after it has been retired. 2025/04/30 11:09:22 server <- Reading packet 8 (1220 bytes) for connection 16b81c76, 1-RTT 2025/04/30 11:09:22 server Short Header{DestConnectionID: 16b81c76, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:22 server <- &wire.PingFrame{} 2025/04/30 11:09:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:22 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:22 server -> Sending packet 5 (24 bytes) for connection 7db3ff93b9e1c924, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 160.658µs} 2025/04/30 11:09:22 Received request: GET /obbpxkefkn 2025/04/30 11:09:22 server -> Sending packet 6 (1045 bytes) for connection 7db3ff93b9e1c924, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:22 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:22 server <- Reading packet 9 (36 bytes) for connection 16b81c76, 1-RTT 2025/04/30 11:09:22 server Short Header{DestConnectionID: 16b81c76, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:22 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 256µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:22 server newly acked packets (1): [6] 2025/04/30 11:09:22 server updated RTT: 31.191ms (σ: 11.754ms) 2025/04/30 11:09:22 server lost packet 4 (time threshold) 2025/04/30 11:09:22 server Canceling loss detection timer. 2025/04/30 11:09:22 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:22 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:22 Replacing connection for connection IDs [16b81c76 98fc64b6 f4994f0c 5d88e0cc] with a closed connection. 2025/04/30 11:09:22 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:22 server Connection 7db3ff93b9e1c924 closed. 2025/04/30 11:09:22 Removing connection ID 2c44a2609674b94e after it has been retired. 2025/04/30 11:09:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:23 server -> Sending packet 25 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:23 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:23 server -> Sending packet 26 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:23 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:23 server -> Sending packet 27 (1045 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:23 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:23 server Skipping packet number 26 2025/04/30 11:09:23 server -> Sending packet 28 (320 bytes) for connection e166b91b6570df72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:23 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb3a72fa, StatelessResetToken: 0x83eb247cb43801447a076284f6cf1884} 2025/04/30 11:09:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09b9aff6, StatelessResetToken: 0x42481600ec8342292e15a27c6b4a1027} 2025/04/30 11:09:23 server -> &wire.NewTokenFrame{Token: 0xd03570193f63bf254c67d84faee23cc8019c8eacdd6e6dccc0ebe2e6b1feef86429c6ef78b016beff6de1cf4cc74625c3ff9c867cb3cddecd0f3cce9a70f667abea7f630b7f5a341b7db46d135471f7486539ff086d0} 2025/04/30 11:09:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e5dee2c4, StatelessResetToken: 0xcd8c8d8e0a8288e5ee8a2b321760d41b} 2025/04/30 11:09:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:23 Removing connection ID 4aabec3c5358fc61 after it has been retired. 2025/04/30 11:09:23 Tracking 48 connection IDs and 0 reset tokens. 2025/04/30 11:09:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:24 server -> Sending packet 22 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:24 server -> Sending packet 23 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:24 server <- Received Initial packet. 2025/04/30 11:09:24 Created qlog file: /logs/qlog/b2cee70548575d30.sqlog 2025/04/30 11:09:24 server Changing connection ID to 2c26f70a. 2025/04/30 11:09:24 Adding connection IDs b2cee70548575d30 and 2c26f70a for a new connection. 2025/04/30 11:09:24 server <- Reading packet 3 (1220 bytes) for connection b2cee70548575d30, Initial 2025/04/30 11:09:24 server Long Header{Type: Initial, DestConnectionID: b2cee70548575d30, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:24 Adding connection ID ff1d66e2. 2025/04/30 11:09:24 Adding connection ID a6baeae6. 2025/04/30 11:09:24 Adding connection ID 5e44dc81. 2025/04/30 11:09:24 server <- &wire.PingFrame{} 2025/04/30 11:09:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b2cee70548575d30 2025/04/30 11:09:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c26f70a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 443, Version: v1} 2025/04/30 11:09:24 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c26f70a, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a6baeae6, StatelessResetToken: 0x2b315d572e7e90858ceebd7620cb0103} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e44dc81, StatelessResetToken: 0xfb0c616ea38753646407e12aca654d27} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff1d66e2, StatelessResetToken: 0x0a79de230312280103774566ab7eb91b} 2025/04/30 11:09:24 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:24 server -> Sending packet 1 (1280 bytes) for connection b2cee70548575d30, Initial 2025/04/30 11:09:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c26f70a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:24 server -> Sending packet 2 (1280 bytes) for connection b2cee70548575d30, Initial 2025/04/30 11:09:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c26f70a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:24 server Canceling loss detection timer. 2025/04/30 11:09:24 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:09:24 server <- Reading packet 4 (1220 bytes) for connection 2c26f70a, Initial 2025/04/30 11:09:24 server Long Header{Type: Initial, DestConnectionID: 2c26f70a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:24 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:09:24 server newly acked packets (1): [2] 2025/04/30 11:09:24 server updated RTT: 33.75597ms (σ: 16.877985ms) 2025/04/30 11:09:24 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:24 server -> Sending packet 1 (732 bytes) for connection b2cee70548575d30, Handshake 2025/04/30 11:09:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c26f70a, PacketNumber: 1, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:09:24 server -> Sending packet 2 (732 bytes) for connection b2cee70548575d30, Handshake 2025/04/30 11:09:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c26f70a, PacketNumber: 2, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:09:24 server <- Reading packet 5 (77 bytes) for connection 2c26f70a, Handshake 2025/04/30 11:09:24 server Long Header{Type: Handshake, DestConnectionID: 2c26f70a, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:24 server Dropping Initial keys. 2025/04/30 11:09:24 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:09:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:24 Retiring connection ID b2cee70548575d30 in 5s. 2025/04/30 11:09:24 server Dropping Handshake keys. 2025/04/30 11:09:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:24 server -> Sending packet 2 (323 bytes) for connection b2cee70548575d30, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a6baeae6, StatelessResetToken: 0x2b315d572e7e90858ceebd7620cb0103} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff1d66e2, StatelessResetToken: 0x0a79de230312280103774566ab7eb91b} 2025/04/30 11:09:24 server -> &wire.NewTokenFrame{Token: 0x9c7411bc3d6802587f1477c50ebc8a440cbe1cdd3363d805de30a88bb0da5cd918111267915ecae065bd225ff92dcd9100308e84f18b07f98a3c1a98aba5c77d59b461d8b87f74cc798a4d4935f16ec3bcff72f526ae} 2025/04/30 11:09:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e44dc81, StatelessResetToken: 0xfb0c616ea38753646407e12aca654d27} 2025/04/30 11:09:24 server -> Sending packet 3 (323 bytes) for connection b2cee70548575d30, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a6baeae6, StatelessResetToken: 0x2b315d572e7e90858ceebd7620cb0103} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e44dc81, StatelessResetToken: 0xfb0c616ea38753646407e12aca654d27} 2025/04/30 11:09:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:24 server -> &wire.NewTokenFrame{Token: 0x9c7411bc3d6802587f1477c50ebc8a440cbe1cdd3363d805de30a88bb0da5cd918111267915ecae065bd225ff92dcd9100308e84f18b07f98a3c1a98aba5c77d59b461d8b87f74cc798a4d4935f16ec3bcff72f526ae} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff1d66e2, StatelessResetToken: 0x0a79de230312280103774566ab7eb91b} 2025/04/30 11:09:24 server <- Reading packet 6 (1220 bytes) for connection 2c26f70a, 1-RTT 2025/04/30 11:09:24 server Short Header{DestConnectionID: 2c26f70a, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:24 server <- &wire.PingFrame{} 2025/04/30 11:09:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:24 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:24 server -> Sending packet 4 (24 bytes) for connection b2cee70548575d30, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 121.165µs} 2025/04/30 11:09:24 Received request: GET /sehedtgueh 2025/04/30 11:09:24 server -> Sending packet 5 (1045 bytes) for connection b2cee70548575d30, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:24 server <- Reading packet 7 (33 bytes) for connection 2c26f70a, 1-RTT 2025/04/30 11:09:24 server Short Header{DestConnectionID: 2c26f70a, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:24 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:24 server newly acked packets (1): [3] 2025/04/30 11:09:24 server updated RTT: 33.45ms (σ: 13.267ms) 2025/04/30 11:09:24 server ECN capability confirmed. 2025/04/30 11:09:24 server <- Reading packet 8 (40 bytes) for connection 2c26f70a, 1-RTT 2025/04/30 11:09:24 server Short Header{DestConnectionID: 2c26f70a, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:24 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:24 server newly acked packets (1): [5] 2025/04/30 11:09:24 server updated RTT: 33.204ms (σ: 10.441ms) 2025/04/30 11:09:24 server Canceling loss detection timer. 2025/04/30 11:09:24 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:24 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:24 server -> Sending packet 6 (27 bytes) for connection b2cee70548575d30, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 85.95µs} 2025/04/30 11:09:24 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:24 server <- Reading packet 9 (1252 bytes) for connection 2c26f70a, 1-RTT 2025/04/30 11:09:24 server Short Header{DestConnectionID: 2c26f70a, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:24 server <- &wire.PingFrame{} 2025/04/30 11:09:24 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:24 server <- Reading packet 10 (36 bytes) for connection 2c26f70a, 1-RTT 2025/04/30 11:09:24 server Short Header{DestConnectionID: 2c26f70a, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:24 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:24 server newly acked packets (1): [6] 2025/04/30 11:09:24 server updated RTT: 33.017ms (σ: 8.203ms) 2025/04/30 11:09:24 server Canceling loss detection timer. 2025/04/30 11:09:24 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:24 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:24 Replacing connection for connection IDs [2c26f70a ff1d66e2 a6baeae6 5e44dc81] with a closed connection. 2025/04/30 11:09:24 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:24 server Connection b2cee70548575d30 closed. 2025/04/30 11:09:24 Removing connection ID 98758f9f61a2f4a8 after it has been retired. 2025/04/30 11:09:24 server <- Received Initial packet. 2025/04/30 11:09:24 Created qlog file: /logs/qlog/e972eaf412e5b260.sqlog 2025/04/30 11:09:24 server Changing connection ID to a66ad122. 2025/04/30 11:09:24 Adding connection IDs e972eaf412e5b260 and a66ad122 for a new connection. 2025/04/30 11:09:24 server <- Reading packet 0 (1220 bytes) for connection e972eaf412e5b260, Initial 2025/04/30 11:09:24 server Long Header{Type: Initial, DestConnectionID: e972eaf412e5b260, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:24 Adding connection ID 3ab1b419. 2025/04/30 11:09:24 Adding connection ID f115db60. 2025/04/30 11:09:24 Adding connection ID 81403b1f. 2025/04/30 11:09:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e972eaf412e5b260 2025/04/30 11:09:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a66ad122, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:09:24 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a66ad122, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3ab1b419, StatelessResetToken: 0x3c77964b9733de8412ccf9c77fc946b8} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f115db60, StatelessResetToken: 0x8ddbc6f19c1245991e4dc5074187fd2b} 2025/04/30 11:09:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81403b1f, StatelessResetToken: 0x8138d4caaa297e70bacee98904573c45} 2025/04/30 11:09:24 Removing connection IDs [4e7210b8 1c2e14c6 28aa8cb7 6a56003b] for a closed connection after it has been retired. 2025/04/30 11:09:24 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:09:24 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:24 server <- Reading packet 3 (72 bytes) for connection a66ad122, Handshake 2025/04/30 11:09:24 server Long Header{Type: Handshake, DestConnectionID: a66ad122, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:24 server Dropping Initial keys. 2025/04/30 11:09:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:24 Retiring connection ID e972eaf412e5b260 in 5s. 2025/04/30 11:09:24 server Dropping Handshake keys. 2025/04/30 11:09:24 server <- Reading packet 4 (1148 bytes) for connection a66ad122, 1-RTT 2025/04/30 11:09:24 server Short Header{DestConnectionID: a66ad122, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:24 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:24 server -> Sending packet 1 (1366 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.PingFrame{} 2025/04/30 11:09:24 server <- Reading packet 2 (1252 bytes) for connection a66ad122, 1-RTT 2025/04/30 11:09:24 server Short Header{DestConnectionID: a66ad122, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:24 server <- &wire.PingFrame{} 2025/04/30 11:09:24 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:24 server newly acked packets (1): [0] 2025/04/30 11:09:24 server updated RTT: 33.709011ms (σ: 16.854505ms) 2025/04/30 11:09:24 server Canceling loss detection timer. 2025/04/30 11:09:24 Received request: GET /yathgvduoi 2025/04/30 11:09:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:24 server -> Sending packet 2 (1280 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 558.948µs} 2025/04/30 11:09:24 server -> &wire.NewTokenFrame{Token: 0x80d7c65cbfe34bbb76425ae2312ba9fb353b1492018a3c9a279e87c1ef9fe19ee8b77f22e9b4f6b752a8a5d235520aeae7a033197817f4bb404763268ac7da82e7406f75db05c858e46ca262ccdf5ff6d5fa6d14b51f} 2025/04/30 11:09:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:24 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 11:09:24 server -> Sending packet 3 (25 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:24 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1022, Data length: 2, Offset + Data length: 1024} 2025/04/30 11:09:25 server <- Reading packet 5 (34 bytes) for connection a66ad122, 1-RTT 2025/04/30 11:09:25 server Short Header{DestConnectionID: a66ad122, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:25 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:25 server newly acked packets (1): [1] 2025/04/30 11:09:25 server updated RTT: 36.614ms (σ: 18.451ms) 2025/04/30 11:09:25 server ECN capability confirmed. 2025/04/30 11:09:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:25 server -> Sending packet 5 (1272 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:25 server -> &wire.NewTokenFrame{Token: 0x80d7c65cbfe34bbb76425ae2312ba9fb353b1492018a3c9a279e87c1ef9fe19ee8b77f22e9b4f6b752a8a5d235520aeae7a033197817f4bb404763268ac7da82e7406f75db05c858e46ca262ccdf5ff6d5fa6d14b51f} 2025/04/30 11:09:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:25 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 11:09:25 server Skipping packet number 4 2025/04/30 11:09:25 server -> Sending packet 6 (25 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1022, Data length: 2, Offset + Data length: 1024} 2025/04/30 11:09:25 server <- Reading packet 6 (35 bytes) for connection a66ad122, 1-RTT 2025/04/30 11:09:25 server Short Header{DestConnectionID: a66ad122, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:25 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:25 server newly acked packets (1): [6] 2025/04/30 11:09:25 server updated RTT: 36.026ms (σ: 15.012ms) 2025/04/30 11:09:25 server setting loss timer for packet 5 (1-RTT) to 40.52925ms (in 2025-04-30 11:09:25.125809206 +0000 UTC m=+19.215370308) 2025/04/30 11:09:25 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:25.125809206 +0000 UTC m=+19.215370308 2025/04/30 11:09:25 server lost packet 5 (time threshold) 2025/04/30 11:09:25 server Canceling loss detection timer. 2025/04/30 11:09:25 server -> Sending packet 7 (1272 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.NewTokenFrame{Token: 0x80d7c65cbfe34bbb76425ae2312ba9fb353b1492018a3c9a279e87c1ef9fe19ee8b77f22e9b4f6b752a8a5d235520aeae7a033197817f4bb404763268ac7da82e7406f75db05c858e46ca262ccdf5ff6d5fa6d14b51f} 2025/04/30 11:09:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:25 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 11:09:25 Removing connection ID 90e8d3e68419b3ee after it has been retired. 2025/04/30 11:09:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:25 server -> Sending packet 9 (1272 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.NewTokenFrame{Token: 0x80d7c65cbfe34bbb76425ae2312ba9fb353b1492018a3c9a279e87c1ef9fe19ee8b77f22e9b4f6b752a8a5d235520aeae7a033197817f4bb404763268ac7da82e7406f75db05c858e46ca262ccdf5ff6d5fa6d14b51f} 2025/04/30 11:09:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:25 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 11:09:25 server -> Sending packet 10 (1272 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:25 server -> &wire.NewTokenFrame{Token: 0x80d7c65cbfe34bbb76425ae2312ba9fb353b1492018a3c9a279e87c1ef9fe19ee8b77f22e9b4f6b752a8a5d235520aeae7a033197817f4bb404763268ac7da82e7406f75db05c858e46ca262ccdf5ff6d5fa6d14b51f} 2025/04/30 11:09:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:25 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 11:09:25 server -> Sending packet 11 (1409 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.PingFrame{} 2025/04/30 11:09:25 server <- Reading packet 9 (42 bytes) for connection a66ad122, 1-RTT 2025/04/30 11:09:25 server Short Header{DestConnectionID: a66ad122, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:25 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 256µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:25 server newly acked packets (1): [10] 2025/04/30 11:09:25 server updated RTT: 35.637ms (σ: 12.036ms) 2025/04/30 11:09:25 server Canceling loss detection timer. 2025/04/30 11:09:25 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:25 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:25 server -> Sending packet 12 (31 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 143.797µs} 2025/04/30 11:09:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:25 Removing connection IDs [3fb8dac3 4f5c7ff7 3b4d8d7d a6728b1c] for a closed connection after it has been retired. 2025/04/30 11:09:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:25 server -> Sending packet 14 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:25 server -> Sending packet 15 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:25 server -> Sending packet 17 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:25 server -> Sending packet 18 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:25 server <- Received Initial packet. 2025/04/30 11:09:25 Created qlog file: /logs/qlog/c91bc30ced3ce180.sqlog 2025/04/30 11:09:25 server Changing connection ID to 6695cf14. 2025/04/30 11:09:25 Adding connection IDs c91bc30ced3ce180 and 6695cf14 for a new connection. 2025/04/30 11:09:25 server <- Reading packet 0 (1220 bytes) for connection c91bc30ced3ce180, Initial 2025/04/30 11:09:25 server Long Header{Type: Initial, DestConnectionID: c91bc30ced3ce180, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:25 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:25 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:25 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:25 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:25 Adding connection ID 4e77d884. 2025/04/30 11:09:25 Adding connection ID 3d2f8839. 2025/04/30 11:09:25 Adding connection ID b05ab06e. 2025/04/30 11:09:25 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c91bc30ced3ce180 2025/04/30 11:09:25 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6695cf14, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 437, Version: v1} 2025/04/30 11:09:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:25 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6695cf14, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:09:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4e77d884, StatelessResetToken: 0x135315fed45f9ba415aec43565539cfc} 2025/04/30 11:09:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3d2f8839, StatelessResetToken: 0x85efc880c5b24f40cf62283d2827f83b} 2025/04/30 11:09:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b05ab06e, StatelessResetToken: 0xfdfbb92ba3817c029946a45e3e7cc37e} 2025/04/30 11:09:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:25 server -> Sending packet 25 (22 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:25 server Skipping packet number 24 2025/04/30 11:09:25 server -> Sending packet 26 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:25 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:25 server <- Reading packet 3 (72 bytes) for connection 6695cf14, Handshake 2025/04/30 11:09:25 server Long Header{Type: Handshake, DestConnectionID: 6695cf14, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:25 server Dropping Initial keys. 2025/04/30 11:09:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:25 Retiring connection ID c91bc30ced3ce180 in 5s. 2025/04/30 11:09:25 server Dropping Handshake keys. 2025/04/30 11:09:25 server <- Reading packet 4 (1148 bytes) for connection 6695cf14, 1-RTT 2025/04/30 11:09:25 server Short Header{DestConnectionID: 6695cf14, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:25 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:25 server -> Sending packet 1 (1366 bytes) for connection c91bc30ced3ce180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.PingFrame{} 2025/04/30 11:09:25 server -> Sending packet 2 (253 bytes) for connection c91bc30ced3ce180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 407.437µs} 2025/04/30 11:09:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:25 Received request: GET /czkkfjqzho 2025/04/30 11:09:25 server -> &wire.NewTokenFrame{Token: 0x88a6a83528d1cfbcaa055bbe1e5c00cb58163fc963fc6e038c28cdc92b0176b5b1c8119dd478ee200255491fcb4b11e0e9ea2a161e0531ccf9900bc2f3a54a7918c0762e6fce41befcda21cb2378b77fec8b119cd9d6} 2025/04/30 11:09:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:25 server -> Sending packet 3 (1045 bytes) for connection c91bc30ced3ce180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:25 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:25 server <- Reading packet 5 (34 bytes) for connection 6695cf14, 1-RTT 2025/04/30 11:09:25 server Short Header{DestConnectionID: 6695cf14, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:25 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:25 server newly acked packets (2): [0 1] 2025/04/30 11:09:25 server updated RTT: 57.032878ms (σ: 28.516439ms) 2025/04/30 11:09:25 server ECN capability confirmed. 2025/04/30 11:09:25 Tracking 53 connection IDs and 0 reset tokens. 2025/04/30 11:09:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:26 server -> Sending packet 5 (248 bytes) for connection c91bc30ced3ce180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:26 server -> &wire.NewTokenFrame{Token: 0x88a6a83528d1cfbcaa055bbe1e5c00cb58163fc963fc6e038c28cdc92b0176b5b1c8119dd478ee200255491fcb4b11e0e9ea2a161e0531ccf9900bc2f3a54a7918c0762e6fce41befcda21cb2378b77fec8b119cd9d6} 2025/04/30 11:09:26 server Skipping packet number 4 2025/04/30 11:09:26 server -> Sending packet 6 (1045 bytes) for connection c91bc30ced3ce180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:26 server -> Sending packet 20 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:26 server -> Sending packet 21 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:26 server <- Reading packet 6 (35 bytes) for connection 6695cf14, 1-RTT 2025/04/30 11:09:26 server Short Header{DestConnectionID: 6695cf14, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:26 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:26 server newly acked packets (1): [5] 2025/04/30 11:09:26 server updated RTT: 53.822ms (σ: 27.806ms) 2025/04/30 11:09:26 server <- Reading packet 7 (57 bytes) for connection 6695cf14, 1-RTT 2025/04/30 11:09:26 server Short Header{DestConnectionID: 6695cf14, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:26 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 23.296ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:26 server newly acked packets (1): [6] 2025/04/30 11:09:26 server updated RTT: 51.094ms (σ: 26.31ms) 2025/04/30 11:09:26 server Canceling loss detection timer. 2025/04/30 11:09:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:26 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:26 server -> Sending packet 7 (27 bytes) for connection c91bc30ced3ce180, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, DelayTime: 151.772µs} 2025/04/30 11:09:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:26 server <- Reading packet 8 (36 bytes) for connection 6695cf14, 1-RTT 2025/04/30 11:09:26 server Short Header{DestConnectionID: 6695cf14, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:26 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:26 server newly acked packets (1): [7] 2025/04/30 11:09:26 server updated RTT: 48.585ms (σ: 24.75ms) 2025/04/30 11:09:26 server Canceling loss detection timer. 2025/04/30 11:09:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:26 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:26 Replacing connection for connection IDs [4e77d884 3d2f8839 b05ab06e 6695cf14] with a closed connection. 2025/04/30 11:09:26 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:26 server Connection c91bc30ced3ce180 closed. 2025/04/30 11:09:26 Removing connection ID 5c608d5b85bbbfe4 after it has been retired. 2025/04/30 11:09:26 Removing connection IDs [e6162de5 ad8007aa a3ba0b06 f421316a] for a closed connection after it has been retired. 2025/04/30 11:09:26 server <- Received Initial packet. 2025/04/30 11:09:26 Created qlog file: /logs/qlog/707e56276f56efe7.sqlog 2025/04/30 11:09:26 server Changing connection ID to e279a0c0. 2025/04/30 11:09:26 Adding connection IDs 707e56276f56efe7 and e279a0c0 for a new connection. 2025/04/30 11:09:26 server <- Reading packet 0 (1220 bytes) for connection 707e56276f56efe7, Initial 2025/04/30 11:09:26 server Long Header{Type: Initial, DestConnectionID: 707e56276f56efe7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:26 Adding connection ID e67755a8. 2025/04/30 11:09:26 Adding connection ID 9fad1007. 2025/04/30 11:09:26 Adding connection ID b83bdcc4. 2025/04/30 11:09:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 707e56276f56efe7 2025/04/30 11:09:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e279a0c0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 442, Version: v1} 2025/04/30 11:09:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e279a0c0, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9fad1007, StatelessResetToken: 0xf26693b5ba762c54533b001914b597be} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b83bdcc4, StatelessResetToken: 0x83550f43082a10591c785d2fbb2b6773} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e67755a8, StatelessResetToken: 0x5647178d36a94d381dbe37ac6fe94468} 2025/04/30 11:09:26 server <- Reading packet 1 (1220 bytes) for connection 707e56276f56efe7, Initial 2025/04/30 11:09:26 server Long Header{Type: Initial, DestConnectionID: 707e56276f56efe7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:26 server <- &wire.PingFrame{} 2025/04/30 11:09:26 server -> Sending packet 1 (37 bytes) for connection 707e56276f56efe7, Initial 2025/04/30 11:09:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e279a0c0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:26 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:26 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:26 server -> Sending packet 2 (1280 bytes) for connection 707e56276f56efe7, Initial 2025/04/30 11:09:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e279a0c0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:26 server -> Sending packet 3 (1280 bytes) for connection 707e56276f56efe7, Initial 2025/04/30 11:09:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e279a0c0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:26 server <- Reading packet 2 (1220 bytes) for connection e279a0c0, Initial 2025/04/30 11:09:26 server Long Header{Type: Initial, DestConnectionID: e279a0c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:26 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:09:26 server newly acked packets (1): [3] 2025/04/30 11:09:26 server updated RTT: 33.81073ms (σ: 16.905365ms) 2025/04/30 11:09:26 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:26 server -> Sending packet 1 (733 bytes) for connection 707e56276f56efe7, Handshake 2025/04/30 11:09:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e279a0c0, PacketNumber: 1, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:09:26 server -> Sending packet 2 (733 bytes) for connection 707e56276f56efe7, Handshake 2025/04/30 11:09:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e279a0c0, PacketNumber: 2, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:09:26 server <- Reading packet 3 (77 bytes) for connection e279a0c0, Handshake 2025/04/30 11:09:26 server Long Header{Type: Handshake, DestConnectionID: e279a0c0, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:26 server Dropping Initial keys. 2025/04/30 11:09:26 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 16µs} 2025/04/30 11:09:26 server newly acked packets (1): [2] 2025/04/30 11:09:26 server updated RTT: 33.663ms (σ: 12.972ms) 2025/04/30 11:09:26 server Canceling loss detection timer. 2025/04/30 11:09:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:26 Retiring connection ID 707e56276f56efe7 in 5s. 2025/04/30 11:09:26 server Dropping Handshake keys. 2025/04/30 11:09:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:26 server -> Sending packet 2 (323 bytes) for connection 707e56276f56efe7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.NewTokenFrame{Token: 0xf0615f22b292b5a94a5ea7ad633295322ee954bdfa38852df0d7b994b9f141d57af6387d33d7634c6671c857dfb4c2797eb15c5facffcd7bc55aa1ed5eda2893ee728d0b0c7ec2c443063b8f8a62b2137712e7c140dd} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9fad1007, StatelessResetToken: 0xf26693b5ba762c54533b001914b597be} 2025/04/30 11:09:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b83bdcc4, StatelessResetToken: 0x83550f43082a10591c785d2fbb2b6773} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e67755a8, StatelessResetToken: 0x5647178d36a94d381dbe37ac6fe94468} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:26 server -> Sending packet 3 (323 bytes) for connection 707e56276f56efe7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b83bdcc4, StatelessResetToken: 0x83550f43082a10591c785d2fbb2b6773} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e67755a8, StatelessResetToken: 0x5647178d36a94d381dbe37ac6fe94468} 2025/04/30 11:09:26 server -> &wire.NewTokenFrame{Token: 0xf0615f22b292b5a94a5ea7ad633295322ee954bdfa38852df0d7b994b9f141d57af6387d33d7634c6671c857dfb4c2797eb15c5facffcd7bc55aa1ed5eda2893ee728d0b0c7ec2c443063b8f8a62b2137712e7c140dd} 2025/04/30 11:09:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9fad1007, StatelessResetToken: 0xf26693b5ba762c54533b001914b597be} 2025/04/30 11:09:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:26 server <- Reading packet 5 (33 bytes) for connection e279a0c0, 1-RTT 2025/04/30 11:09:26 server Short Header{DestConnectionID: e279a0c0, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:26 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:26 server newly acked packets (1): [3] 2025/04/30 11:09:26 server updated RTT: 33.373ms (σ: 10.307ms) 2025/04/30 11:09:26 server ECN capability confirmed. 2025/04/30 11:09:26 server Canceling loss detection timer. 2025/04/30 11:09:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:26 server -> Sending packet 23 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:26 server -> Sending packet 24 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:26 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:27 Removing connection ID 7db3ff93b9e1c924 after it has been retired. 2025/04/30 11:09:27 server <- Reading packet 7 (1220 bytes) for connection e279a0c0, 1-RTT 2025/04/30 11:09:27 server Short Header{DestConnectionID: e279a0c0, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:27 server <- &wire.PingFrame{} 2025/04/30 11:09:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:27 server -> Sending packet 4 (1366 bytes) for connection 707e56276f56efe7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:27 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:27 server -> &wire.PingFrame{} 2025/04/30 11:09:27 Received request: GET /aqfrkocshk 2025/04/30 11:09:27 server -> Sending packet 5 (26 bytes) for connection 707e56276f56efe7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:27 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:27 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 208.177µs} 2025/04/30 11:09:27 server -> Sending packet 6 (1045 bytes) for connection 707e56276f56efe7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:27 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:27 Removing connection IDs [16b81c76 98fc64b6 f4994f0c 5d88e0cc] for a closed connection after it has been retired. 2025/04/30 11:09:27 server <- Reading packet 8 (40 bytes) for connection e279a0c0, 1-RTT 2025/04/30 11:09:27 server Short Header{DestConnectionID: e279a0c0, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:27 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:27 server newly acked packets (1): [6] 2025/04/30 11:09:27 server updated RTT: 33.316ms (σ: 7.843ms) 2025/04/30 11:09:27 server setting loss timer for packet 4 (1-RTT) to 37.4805ms (in 2025-04-30 11:09:27.674057968 +0000 UTC m=+21.763619100) 2025/04/30 11:09:27 server Canceling loss detection timer. 2025/04/30 11:09:27 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:27 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:27 server -> Sending packet 7 (29 bytes) for connection 707e56276f56efe7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:27 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:27 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 185.906µs} 2025/04/30 11:09:27 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:27 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:27.674057968 +0000 UTC m=+21.763619100 2025/04/30 11:09:27 server lost packet 4 (time threshold) 2025/04/30 11:09:27 server <- Reading packet 9 (1220 bytes) for connection e279a0c0, 1-RTT 2025/04/30 11:09:27 server Short Header{DestConnectionID: e279a0c0, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:27 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:27 server newly acked packets (1): [7] 2025/04/30 11:09:27 server updated RTT: 33.131ms (σ: 6.251ms) 2025/04/30 11:09:27 server Canceling loss detection timer. 2025/04/30 11:09:27 server <- &wire.PingFrame{} 2025/04/30 11:09:27 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:27 server Ignoring all packets below 9. 2025/04/30 11:09:27 server <- Reading packet 10 (28 bytes) for connection e279a0c0, 1-RTT 2025/04/30 11:09:27 server Short Header{DestConnectionID: e279a0c0, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:27 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:27 Replacing connection for connection IDs [e279a0c0 e67755a8 9fad1007 b83bdcc4] with a closed connection. 2025/04/30 11:09:27 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:27 server Connection 707e56276f56efe7 closed. 2025/04/30 11:09:27 Tracking 48 connection IDs and 0 reset tokens. 2025/04/30 11:09:28 server <- Received Initial packet. 2025/04/30 11:09:28 Created qlog file: /logs/qlog/8cf6fd59caff8cf5.sqlog 2025/04/30 11:09:28 server Changing connection ID to ea612ce9. 2025/04/30 11:09:28 Adding connection IDs 8cf6fd59caff8cf5 and ea612ce9 for a new connection. 2025/04/30 11:09:28 server <- Reading packet 0 (1220 bytes) for connection 8cf6fd59caff8cf5, Initial 2025/04/30 11:09:28 server Long Header{Type: Initial, DestConnectionID: 8cf6fd59caff8cf5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:28 Adding connection ID b926e16d. 2025/04/30 11:09:28 Adding connection ID f1c139c9. 2025/04/30 11:09:28 Adding connection ID af12d406. 2025/04/30 11:09:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8cf6fd59caff8cf5 2025/04/30 11:09:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ea612ce9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 442, Version: v1} 2025/04/30 11:09:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ea612ce9, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b926e16d, StatelessResetToken: 0x2bb1ebd496a498406e6aa0c1cd1328d3} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: af12d406, StatelessResetToken: 0xdbd38af4e277ba4fdcd0ca80df73edad} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f1c139c9, StatelessResetToken: 0x76072e1d3565aeeddfcffb5c225c0bd3} 2025/04/30 11:09:28 server <- Reading packet 1 (77 bytes) for connection ea612ce9, Handshake 2025/04/30 11:09:28 server Long Header{Type: Handshake, DestConnectionID: ea612ce9, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:28 server Dropping Initial keys. 2025/04/30 11:09:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:28 server newly acked packets (1): [0] 2025/04/30 11:09:28 server updated RTT: 32.666731ms (σ: 16.333365ms) 2025/04/30 11:09:28 server Canceling loss detection timer. 2025/04/30 11:09:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:28 Retiring connection ID 8cf6fd59caff8cf5 in 5s. 2025/04/30 11:09:28 server Dropping Handshake keys. 2025/04/30 11:09:28 server -> Sending packet 1 (251 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.NewTokenFrame{Token: 0x6d6009f0a8d5db3e4a362b00408d738f3a6077e229f40696193dc7e0c1196d65ac71e28d62fa96be1ffcd77be63721a580e5e834a7748da76c2e84bae7cdec3156e224d2e70c29d5bd71725936c488d76e4699b0fbfc} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:28 server <- Reading packet 2 (1252 bytes) for connection ea612ce9, 1-RTT 2025/04/30 11:09:28 server Short Header{DestConnectionID: ea612ce9, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:28 server <- &wire.PingFrame{} 2025/04/30 11:09:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:28 server newly acked packets (1): [0] 2025/04/30 11:09:28 server updated RTT: 32.787ms (σ: 12.493ms) 2025/04/30 11:09:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:28 server -> Sending packet 2 (24 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 123.339µs} 2025/04/30 11:09:28 Received request: GET /kapiowcgxe 2025/04/30 11:09:28 server -> Sending packet 3 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:28 server -> Sending packet 31 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server -> Sending packet 32 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:28 server -> Sending packet 5 (251 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.NewTokenFrame{Token: 0x6d6009f0a8d5db3e4a362b00408d738f3a6077e229f40696193dc7e0c1196d65ac71e28d62fa96be1ffcd77be63721a580e5e834a7748da76c2e84bae7cdec3156e224d2e70c29d5bd71725936c488d76e4699b0fbfc} 2025/04/30 11:09:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:28 server Skipping packet number 4 2025/04/30 11:09:28 server -> Sending packet 6 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server <- Reading packet 5 (51 bytes) for connection ea612ce9, 1-RTT 2025/04/30 11:09:28 server Short Header{DestConnectionID: ea612ce9, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:28 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:28 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:28 server -> Sending packet 7 (26 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 118.671µs} 2025/04/30 11:09:28 server <- Reading packet 6 (44 bytes) for connection ea612ce9, 1-RTT 2025/04/30 11:09:28 server Short Header{DestConnectionID: ea612ce9, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:28 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:28 server newly acked packets (1): [5] 2025/04/30 11:09:28 server ECN capability confirmed. 2025/04/30 11:09:28 server lost packet 6 (time threshold) 2025/04/30 11:09:28 server Canceling loss detection timer. 2025/04/30 11:09:28 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:28 server -> Sending packet 8 (1366 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.PingFrame{} 2025/04/30 11:09:28 server -> Sending packet 9 (1052 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 197.487µs} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server <- Reading packet 7 (1332 bytes) for connection ea612ce9, 1-RTT 2025/04/30 11:09:28 server Short Header{DestConnectionID: ea612ce9, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:28 server <- &wire.PingFrame{} 2025/04/30 11:09:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:28 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:28 server -> Sending packet 10 (27 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 25.23161ms} 2025/04/30 11:09:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:28 server -> Sending packet 12 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server -> Sending packet 13 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:28 server -> Sending packet 15 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server -> Sending packet 16 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:28 server <- Received Initial packet. 2025/04/30 11:09:28 Created qlog file: /logs/qlog/e81a12e321a126d4.sqlog 2025/04/30 11:09:28 server Changing connection ID to f11308ef. 2025/04/30 11:09:28 Adding connection IDs e81a12e321a126d4 and f11308ef for a new connection. 2025/04/30 11:09:28 server <- Reading packet 0 (1220 bytes) for connection e81a12e321a126d4, Initial 2025/04/30 11:09:28 server Long Header{Type: Initial, DestConnectionID: e81a12e321a126d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:28 Adding connection ID 5e4087da. 2025/04/30 11:09:28 Adding connection ID b02a380c. 2025/04/30 11:09:28 Adding connection ID 26e57c73. 2025/04/30 11:09:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e81a12e321a126d4 2025/04/30 11:09:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f11308ef, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:09:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f11308ef, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b02a380c, StatelessResetToken: 0xb56995e037d7b391b40599c997878846} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5e4087da, StatelessResetToken: 0x450c335a28c4f9482adce466ca055fe7} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 26e57c73, StatelessResetToken: 0xd1716c00c79bc1f856bc581757afd734} 2025/04/30 11:09:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:28 server -> Sending packet 26 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:28 server -> Sending packet 27 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:28 server <- Reading packet 1 (1220 bytes) for connection e81a12e321a126d4, Initial 2025/04/30 11:09:28 server Long Header{Type: Initial, DestConnectionID: e81a12e321a126d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:28 server <- &wire.PingFrame{} 2025/04/30 11:09:28 server -> Sending packet 1 (37 bytes) for connection e81a12e321a126d4, Initial 2025/04/30 11:09:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f11308ef, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:28 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:28 server -> Sending packet 2 (1280 bytes) for connection e81a12e321a126d4, Initial 2025/04/30 11:09:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f11308ef, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:28 server -> Sending packet 3 (1280 bytes) for connection e81a12e321a126d4, Initial 2025/04/30 11:09:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f11308ef, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:28 server <- Reading packet 2 (1220 bytes) for connection f11308ef, Handshake 2025/04/30 11:09:28 server Long Header{Type: Handshake, DestConnectionID: f11308ef, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:09:28 server Dropping Initial keys. 2025/04/30 11:09:28 server <- &wire.PingFrame{} 2025/04/30 11:09:28 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:09:28 server -> Sending packet 1 (748 bytes) for connection e81a12e321a126d4, Handshake 2025/04/30 11:09:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f11308ef, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:09:28 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:09:28 server -> Sending packet 2 (743 bytes) for connection e81a12e321a126d4, Handshake 2025/04/30 11:09:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f11308ef, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:09:28 server Dropping %!s(logging.PacketType=0) packet (1220 bytes) because we already dropped the keys. 2025/04/30 11:09:28 server <- Reading packet 4 (77 bytes) for connection f11308ef, Handshake 2025/04/30 11:09:28 server Long Header{Type: Handshake, DestConnectionID: f11308ef, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:28 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:09:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:28 Retiring connection ID e81a12e321a126d4 in 5s. 2025/04/30 11:09:28 server Dropping Handshake keys. 2025/04/30 11:09:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:28 server -> Sending packet 2 (320 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:28 server -> &wire.NewTokenFrame{Token: 0xec12e6cb803bb34f1f85db173aa8aa038a494eb94d94bf5e269d271fa654b684c05f110949b941a475b00e87e069d723bf5648855407d43c677fcfb74fc7dbdb96a99be0277569db1573ea4a61bf44deaf80637a7ea7} 2025/04/30 11:09:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b02a380c, StatelessResetToken: 0xb56995e037d7b391b40599c997878846} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 26e57c73, StatelessResetToken: 0xd1716c00c79bc1f856bc581757afd734} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5e4087da, StatelessResetToken: 0x450c335a28c4f9482adce466ca055fe7} 2025/04/30 11:09:28 server -> Sending packet 3 (320 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.NewTokenFrame{Token: 0xec12e6cb803bb34f1f85db173aa8aa038a494eb94d94bf5e269d271fa654b684c05f110949b941a475b00e87e069d723bf5648855407d43c677fcfb74fc7dbdb96a99be0277569db1573ea4a61bf44deaf80637a7ea7} 2025/04/30 11:09:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 26e57c73, StatelessResetToken: 0xd1716c00c79bc1f856bc581757afd734} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5e4087da, StatelessResetToken: 0x450c335a28c4f9482adce466ca055fe7} 2025/04/30 11:09:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b02a380c, StatelessResetToken: 0xb56995e037d7b391b40599c997878846} 2025/04/30 11:09:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:28 server -> Sending packet 4 (1366 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:28 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:28 server -> &wire.PingFrame{} 2025/04/30 11:09:28 server <- Reading packet 6 (33 bytes) for connection f11308ef, 1-RTT 2025/04/30 11:09:28 server Short Header{DestConnectionID: f11308ef, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:28 server newly acked packets (1): [3] 2025/04/30 11:09:28 server updated RTT: 31.281101ms (σ: 15.64055ms) 2025/04/30 11:09:28 server ECN capability confirmed. 2025/04/30 11:09:28 server Canceling loss detection timer. 2025/04/30 11:09:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:29 server -> Sending packet 18 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 server -> Sending packet 19 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 server <- Reading packet 8 (1220 bytes) for connection f11308ef, 1-RTT 2025/04/30 11:09:29 server Short Header{DestConnectionID: f11308ef, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:29 server <- &wire.PingFrame{} 2025/04/30 11:09:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:29 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:29 server -> Sending packet 5 (26 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 140.151µs} 2025/04/30 11:09:29 Received request: GET /nbcxxcfxms 2025/04/30 11:09:29 server -> Sending packet 6 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 Removing connection ID b2cee70548575d30 after it has been retired. 2025/04/30 11:09:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:29 server -> Sending packet 8 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 server -> Sending packet 9 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 Removing connection IDs [2c26f70a ff1d66e2 a6baeae6 5e44dc81] for a closed connection after it has been retired. 2025/04/30 11:09:29 server <- Received Initial packet. 2025/04/30 11:09:29 Created qlog file: /logs/qlog/1094b7cab0c2d6dd.sqlog 2025/04/30 11:09:29 server Changing connection ID to af9f2dbb. 2025/04/30 11:09:29 Adding connection IDs 1094b7cab0c2d6dd and af9f2dbb for a new connection. 2025/04/30 11:09:29 server <- Reading packet 0 (1220 bytes) for connection 1094b7cab0c2d6dd, Initial 2025/04/30 11:09:29 server Long Header{Type: Initial, DestConnectionID: 1094b7cab0c2d6dd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:29 Adding connection ID 141ed2f5. 2025/04/30 11:09:29 Adding connection ID d7031c87. 2025/04/30 11:09:29 Adding connection ID 88cec231. 2025/04/30 11:09:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1094b7cab0c2d6dd 2025/04/30 11:09:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 429, Version: v1} 2025/04/30 11:09:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:09:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 141ed2f5, StatelessResetToken: 0x581adb3385d74b064b3d36ebc3e9fc59} 2025/04/30 11:09:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 88cec231, StatelessResetToken: 0x0d8f5ddb5235e0a1bed95972407e203c} 2025/04/30 11:09:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d7031c87, StatelessResetToken: 0x3e186b837bfef0acdb22acae01a13919} 2025/04/30 11:09:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:29 server -> Sending packet 11 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 server -> Sending packet 12 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 server <- Reading packet 1 (1220 bytes) for connection 1094b7cab0c2d6dd, Initial 2025/04/30 11:09:29 server Long Header{Type: Initial, DestConnectionID: 1094b7cab0c2d6dd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:29 server <- &wire.PingFrame{} 2025/04/30 11:09:29 server -> Sending packet 1 (37 bytes) for connection 1094b7cab0c2d6dd, Initial 2025/04/30 11:09:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:29 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:29 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:29 server -> Sending packet 2 (1280 bytes) for connection 1094b7cab0c2d6dd, Initial 2025/04/30 11:09:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:29 server -> Sending packet 3 (1280 bytes) for connection 1094b7cab0c2d6dd, Initial 2025/04/30 11:09:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:29 Tracking 58 connection IDs and 0 reset tokens. 2025/04/30 11:09:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:29 server -> Sending packet 21 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 server -> Sending packet 22 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:29 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:29 Removing connection ID e972eaf412e5b260 after it has been retired. 2025/04/30 11:09:29 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:29 server -> Sending packet 1 (746 bytes) for connection 1094b7cab0c2d6dd, Handshake 2025/04/30 11:09:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:09:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:09:29 server -> Sending packet 2 (746 bytes) for connection 1094b7cab0c2d6dd, Handshake 2025/04/30 11:09:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:09:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:09:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:30 server -> Sending packet 14 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:30 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:30 server -> Sending packet 15 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:30 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:30 server -> Sending packet 25 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:30 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:30 server -> Sending packet 26 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:30 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:30 server <- Reading packet 4 (1220 bytes) for connection af9f2dbb, Initial 2025/04/30 11:09:30 server Long Header{Type: Initial, DestConnectionID: af9f2dbb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:30 server <- &wire.PingFrame{} 2025/04/30 11:09:30 server -> Sending packet 4 (39 bytes) for connection 1094b7cab0c2d6dd, Initial 2025/04/30 11:09:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:09:30 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:09:30 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:09:30 server -> Sending packet 5 (1280 bytes) for connection 1094b7cab0c2d6dd, Initial 2025/04/30 11:09:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:30 server -> Sending packet 6 (1280 bytes) for connection 1094b7cab0c2d6dd, Initial 2025/04/30 11:09:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af9f2dbb, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:30 server Parsed a coalesced packet. Part 1: 41 bytes. Remaining: 1179 bytes. 2025/04/30 11:09:30 server <- Reading packet 5 (41 bytes) for connection af9f2dbb, Initial 2025/04/30 11:09:30 server Long Header{Type: Initial, DestConnectionID: af9f2dbb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 27, Version: v1} 2025/04/30 11:09:30 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 24µs} 2025/04/30 11:09:30 server Parsed a coalesced packet. Part 2: 1179 bytes. Remaining: 0 bytes. 2025/04/30 11:09:30 server <- Reading packet 6 (1179 bytes) for connection af9f2dbb, Handshake 2025/04/30 11:09:30 server Long Header{Type: Handshake, DestConnectionID: af9f2dbb, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 1166, Version: v1} 2025/04/30 11:09:30 server Dropping Initial keys. 2025/04/30 11:09:30 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:09:30 server newly acked packets (1): [2] 2025/04/30 11:09:30 server updated RTT: 633.839518ms (σ: 316.919759ms) 2025/04/30 11:09:30 server Canceling loss detection timer. 2025/04/30 11:09:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:30 Retiring connection ID 1094b7cab0c2d6dd in 5s. 2025/04/30 11:09:30 server Dropping Handshake keys. 2025/04/30 11:09:30 server -> Sending packet 1 (251 bytes) for connection 1094b7cab0c2d6dd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:30 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:30 server -> &wire.NewTokenFrame{Token: 0x5ec302033c2b32a7205db9bd47f1073517fbab9ab24fe1476256545edad4b0bde5ccba3def4b2e13cdfa085fc8e62c7db2000cfb4b58aa0d4bb0888fe55fbdc8a68a8cecdbe5484589119b3be3d98b4ad2839fe082e4} 2025/04/30 11:09:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:30 server <- Reading packet 7 (1252 bytes) for connection af9f2dbb, 1-RTT 2025/04/30 11:09:30 server Short Header{DestConnectionID: af9f2dbb, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:30 server <- &wire.PingFrame{} 2025/04/30 11:09:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:30 server -> Sending packet 2 (24 bytes) for connection 1094b7cab0c2d6dd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:30 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:30 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 84.207µs} 2025/04/30 11:09:30 Received request: GET /iodnhutohp 2025/04/30 11:09:30 server -> Sending packet 3 (1045 bytes) for connection 1094b7cab0c2d6dd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:30 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:30 server <- Reading packet 9 (36 bytes) for connection af9f2dbb, 1-RTT 2025/04/30 11:09:30 server Short Header{DestConnectionID: af9f2dbb, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:30 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:30 server newly acked packets (1): [3] 2025/04/30 11:09:30 server updated RTT: 558.569ms (σ: 388.228ms) 2025/04/30 11:09:30 server ECN capability confirmed. 2025/04/30 11:09:30 server lost packet 0 (time threshold) 2025/04/30 11:09:30 server setting loss timer for packet 1 (1-RTT) to 628.390125ms (in 2025-04-30 11:09:31.245820544 +0000 UTC m=+25.335381656) 2025/04/30 11:09:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:30 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:30 Replacing connection for connection IDs [d7031c87 88cec231 af9f2dbb 141ed2f5] with a closed connection. 2025/04/30 11:09:30 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:30 server Connection 1094b7cab0c2d6dd closed. 2025/04/30 11:09:30 Removing connection ID c91bc30ced3ce180 after it has been retired. 2025/04/30 11:09:30 server <- Received Initial packet. 2025/04/30 11:09:30 Created qlog file: /logs/qlog/5a1ab884d5684c79.sqlog 2025/04/30 11:09:30 server Changing connection ID to 768b1ab1. 2025/04/30 11:09:30 Adding connection IDs 5a1ab884d5684c79 and 768b1ab1 for a new connection. 2025/04/30 11:09:30 server <- Reading packet 0 (1220 bytes) for connection 5a1ab884d5684c79, Initial 2025/04/30 11:09:30 server Long Header{Type: Initial, DestConnectionID: 5a1ab884d5684c79, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:30 Adding connection ID 93d1e803. 2025/04/30 11:09:30 Adding connection ID 148b50f3. 2025/04/30 11:09:30 Adding connection ID 99aadb63. 2025/04/30 11:09:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5a1ab884d5684c79 2025/04/30 11:09:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 768b1ab1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:09:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 768b1ab1, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:09:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:09:30 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99aadb63, StatelessResetToken: 0xdc9898044e0a41182e4015bf7d7d96b9} 2025/04/30 11:09:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 148b50f3, StatelessResetToken: 0xf15d86d394fe32ba8562c83aa3d2f439} 2025/04/30 11:09:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 93d1e803, StatelessResetToken: 0x98a43ba13f710d548bfd9b8beb45a6e4} 2025/04/30 11:09:31 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:09:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:31 server -> Sending packet 17 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:31 server -> Sending packet 18 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:31 Removing connection IDs [4e77d884 3d2f8839 b05ab06e 6695cf14] for a closed connection after it has been retired. 2025/04/30 11:09:31 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:31 server <- Reading packet 3 (72 bytes) for connection 768b1ab1, Handshake 2025/04/30 11:09:31 server Long Header{Type: Handshake, DestConnectionID: 768b1ab1, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:31 server Dropping Initial keys. 2025/04/30 11:09:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:31 Retiring connection ID 5a1ab884d5684c79 in 5s. 2025/04/30 11:09:31 server Dropping Handshake keys. 2025/04/30 11:09:31 server <- Reading packet 4 (1148 bytes) for connection 768b1ab1, 1-RTT 2025/04/30 11:09:31 server Short Header{DestConnectionID: 768b1ab1, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:31 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:31 server -> Sending packet 1 (1366 bytes) for connection 5a1ab884d5684c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 Received request: GET /sehejagmbg 2025/04/30 11:09:31 server -> &wire.PingFrame{} 2025/04/30 11:09:31 server <- Reading packet 2 (1252 bytes) for connection 768b1ab1, 1-RTT 2025/04/30 11:09:31 server Short Header{DestConnectionID: 768b1ab1, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:31 server <- &wire.PingFrame{} 2025/04/30 11:09:31 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:31 server newly acked packets (1): [0] 2025/04/30 11:09:31 server updated RTT: 33.509319ms (σ: 16.754659ms) 2025/04/30 11:09:31 server Canceling loss detection timer. 2025/04/30 11:09:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:31 server -> Sending packet 2 (1280 bytes) for connection 5a1ab884d5684c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 458.632µs} 2025/04/30 11:09:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:31 server -> &wire.NewTokenFrame{Token: 0x22593e39f146b46bbee8b8ac10114b69ae5e042bbfa2ae6a7bc6492b8782d68241e32c095e618cc58dfa48f3299af61ee431c64b6b3669f0378112a0a8a16a57caa1aac08e4a2eec05e7ff5ae632ce725cf3775a4774} 2025/04/30 11:09:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:31 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1023, Offset + Data length: 1023} 2025/04/30 11:09:31 server -> Sending packet 3 (24 bytes) for connection 5a1ab884d5684c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1023, Data length: 1, Offset + Data length: 1024} 2025/04/30 11:09:31 server <- Reading packet 5 (1332 bytes) for connection 768b1ab1, 1-RTT 2025/04/30 11:09:31 server Short Header{DestConnectionID: 768b1ab1, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:31 server <- &wire.PingFrame{} 2025/04/30 11:09:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:31 server <- Reading packet 6 (34 bytes) for connection 768b1ab1, 1-RTT 2025/04/30 11:09:31 server Short Header{DestConnectionID: 768b1ab1, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:31 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 25.344ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:31 server newly acked packets (1): [2] 2025/04/30 11:09:31 server updated RTT: 36.598ms (σ: 18.745ms) 2025/04/30 11:09:31 server ECN capability confirmed. 2025/04/30 11:09:31 server setting loss timer for packet 1 (1-RTT) to 65.506554ms (in 2025-04-30 11:09:31.212645555 +0000 UTC m=+25.302206667) 2025/04/30 11:09:31 server Ignoring all packets below 5. 2025/04/30 11:09:31 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:31 server -> Sending packet 4 (25 bytes) for connection 5a1ab884d5684c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 1.100256ms} 2025/04/30 11:09:31 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:31.212645555 +0000 UTC m=+25.302206667 2025/04/30 11:09:31 server lost packet 1 (time threshold) 2025/04/30 11:09:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:31 server -> Sending packet 6 (24 bytes) for connection 5a1ab884d5684c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1023, Data length: 1, Offset + Data length: 1024} 2025/04/30 11:09:31 server -> Sending packet 7 (24 bytes) for connection 5a1ab884d5684c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1023, Data length: 1, Offset + Data length: 1024} 2025/04/30 11:09:31 server <- Reading packet 7 (40 bytes) for connection 768b1ab1, 1-RTT 2025/04/30 11:09:31 server Short Header{DestConnectionID: 768b1ab1, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:31 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:31 server newly acked packets (1): [7] 2025/04/30 11:09:31 server updated RTT: 35.894ms (σ: 15.465ms) 2025/04/30 11:09:31 server Canceling loss detection timer. 2025/04/30 11:09:31 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:31 server -> Sending packet 8 (27 bytes) for connection 5a1ab884d5684c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 121.466µs} 2025/04/30 11:09:31 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:31 server <- Reading packet 8 (28 bytes) for connection 768b1ab1, 1-RTT 2025/04/30 11:09:31 server Short Header{DestConnectionID: 768b1ab1, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:31 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:31 Replacing connection for connection IDs [768b1ab1 93d1e803 148b50f3 99aadb63] with a closed connection. 2025/04/30 11:09:31 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:31 server Connection 5a1ab884d5684c79 closed. 2025/04/30 11:09:31 server <- Received Initial packet. 2025/04/30 11:09:31 Created qlog file: /logs/qlog/ca1e66d920c5a18a.sqlog 2025/04/30 11:09:31 server Changing connection ID to e6036499. 2025/04/30 11:09:31 Adding connection IDs ca1e66d920c5a18a and e6036499 for a new connection. 2025/04/30 11:09:31 server <- Reading packet 0 (1220 bytes) for connection ca1e66d920c5a18a, Initial 2025/04/30 11:09:31 server Long Header{Type: Initial, DestConnectionID: ca1e66d920c5a18a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:31 Adding connection ID 924196af. 2025/04/30 11:09:31 Adding connection ID 9435e8b3. 2025/04/30 11:09:31 Adding connection ID 7fad39ec. 2025/04/30 11:09:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ca1e66d920c5a18a 2025/04/30 11:09:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6036499, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 438, Version: v1} 2025/04/30 11:09:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e6036499, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:09:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 924196af, StatelessResetToken: 0x6ab6a2e495ba41aafc9982d9f3b890f9} 2025/04/30 11:09:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7fad39ec, StatelessResetToken: 0xa8e6628f2405ed6b0f6419dd301f185a} 2025/04/30 11:09:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9435e8b3, StatelessResetToken: 0x8a08bdd1228f8beed47df492383eebcb} 2025/04/30 11:09:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:31 server -> Sending packet 24 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:31 server -> Sending packet 25 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:31 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:31 Removing connection ID 707e56276f56efe7 after it has been retired. 2025/04/30 11:09:31 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:31 server -> Sending packet 1 (1280 bytes) for connection ca1e66d920c5a18a, Initial 2025/04/30 11:09:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6036499, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:31 server -> Sending packet 2 (1280 bytes) for connection ca1e66d920c5a18a, Initial 2025/04/30 11:09:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6036499, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:31 server Canceling loss detection timer. 2025/04/30 11:09:31 server Amplification window limited. Received 1220 bytes, already sent out 3840 bytes 2025/04/30 11:09:31 Tracking 61 connection IDs and 0 reset tokens. 2025/04/30 11:09:32 server <- Reading packet 3 (1220 bytes) for connection e6036499, Initial 2025/04/30 11:09:32 server Long Header{Type: Initial, DestConnectionID: e6036499, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:09:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:32 server <- &wire.PingFrame{} 2025/04/30 11:09:32 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:32 server -> Sending packet 1 (737 bytes) for connection ca1e66d920c5a18a, Handshake 2025/04/30 11:09:32 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e6036499, PacketNumber: 1, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:09:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:09:32 server -> Sending packet 2 (737 bytes) for connection ca1e66d920c5a18a, Handshake 2025/04/30 11:09:32 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e6036499, PacketNumber: 2, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:09:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:09:32 server -> Sending packet 3 (39 bytes) for connection ca1e66d920c5a18a, Initial 2025/04/30 11:09:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6036499, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:09:32 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:09:32 server Queueing packet (1220 bytes) for later decryption 2025/04/30 11:09:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:32 server -> Sending packet 29 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:32 server -> Sending packet 30 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:32 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:32 Removing connection ID abeb4108. 2025/04/30 11:09:32 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:32 Removing connection ID 09b9aff6. 2025/04/30 11:09:32 Removing connection ID bb3a72fa. 2025/04/30 11:09:32 Removing connection ID e5dee2c4. 2025/04/30 11:09:32 server Connection e166b91b6570df72 closed. 2025/04/30 11:09:32 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:09:32 server -> Sending packet 4 (1280 bytes) for connection ca1e66d920c5a18a, Initial 2025/04/30 11:09:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6036499, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:32 server -> Sending packet 5 (1280 bytes) for connection ca1e66d920c5a18a, Initial 2025/04/30 11:09:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e6036499, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:32 Removing connection IDs [e279a0c0 e67755a8 9fad1007 b83bdcc4] for a closed connection after it has been retired. 2025/04/30 11:09:32 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:32 server <- Reading packet 6 (72 bytes) for connection e6036499, Handshake 2025/04/30 11:09:32 server Long Header{Type: Handshake, DestConnectionID: e6036499, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:32 server Dropping Initial keys. 2025/04/30 11:09:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:32 Retiring connection ID ca1e66d920c5a18a in 5s. 2025/04/30 11:09:32 server Dropping Handshake keys. 2025/04/30 11:09:32 server <- Reading packet 7 (1148 bytes) for connection e6036499, 1-RTT 2025/04/30 11:09:32 server Short Header{DestConnectionID: e6036499, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:32 Received request: GET /tfimxmafom 2025/04/30 11:09:32 server -> Sending packet 2 (325 bytes) for connection ca1e66d920c5a18a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 379.484µs} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9435e8b3, StatelessResetToken: 0x8a08bdd1228f8beed47df492383eebcb} 2025/04/30 11:09:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 924196af, StatelessResetToken: 0x6ab6a2e495ba41aafc9982d9f3b890f9} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7fad39ec, StatelessResetToken: 0xa8e6628f2405ed6b0f6419dd301f185a} 2025/04/30 11:09:32 server -> &wire.NewTokenFrame{Token: 0xde9e0cb6e000552b4e61a71adc508463691e50f2cfd13aa0196456045265d00f268b9db6ff3ff1a85b25f6f16e790def0e3257928c3fb882ef8488dc72be990f471a437988b23138152a50ed083795add883b2d8263a} 2025/04/30 11:09:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:32 server -> Sending packet 3 (320 bytes) for connection ca1e66d920c5a18a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9435e8b3, StatelessResetToken: 0x8a08bdd1228f8beed47df492383eebcb} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 924196af, StatelessResetToken: 0x6ab6a2e495ba41aafc9982d9f3b890f9} 2025/04/30 11:09:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:32 server -> &wire.NewTokenFrame{Token: 0xde9e0cb6e000552b4e61a71adc508463691e50f2cfd13aa0196456045265d00f268b9db6ff3ff1a85b25f6f16e790def0e3257928c3fb882ef8488dc72be990f471a437988b23138152a50ed083795add883b2d8263a} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7fad39ec, StatelessResetToken: 0xa8e6628f2405ed6b0f6419dd301f185a} 2025/04/30 11:09:32 server -> Sending packet 4 (1366 bytes) for connection ca1e66d920c5a18a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.PingFrame{} 2025/04/30 11:09:32 server <- Reading packet 5 (1220 bytes) for connection e6036499, 1-RTT 2025/04/30 11:09:32 server Short Header{DestConnectionID: e6036499, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:32 server <- &wire.PingFrame{} 2025/04/30 11:09:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:32 server Queueing ACK because packet 5 was missing before. 2025/04/30 11:09:32 server -> Sending packet 5 (1053 bytes) for connection ca1e66d920c5a18a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 557.275µs} 2025/04/30 11:09:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:32 server <- Reading packet 8 (33 bytes) for connection e6036499, 1-RTT 2025/04/30 11:09:32 server Short Header{DestConnectionID: e6036499, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:32 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:32 server newly acked packets (1): [3] 2025/04/30 11:09:32 server updated RTT: 31.309798ms (σ: 15.654899ms) 2025/04/30 11:09:32 server ECN capability confirmed. 2025/04/30 11:09:32 server <- Reading packet 9 (33 bytes) for connection e6036499, 1-RTT 2025/04/30 11:09:32 server Short Header{DestConnectionID: e6036499, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:32 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:32 server newly acked packets (2): [4 5] 2025/04/30 11:09:32 server updated RTT: 31.521ms (σ: 12.166ms) 2025/04/30 11:09:32 server Canceling loss detection timer. 2025/04/30 11:09:32 server Ignoring all packets below 8. 2025/04/30 11:09:32 server -> Sending packet 6 (22 bytes) for connection ca1e66d920c5a18a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:32 server <- Reading packet 10 (1252 bytes) for connection e6036499, 1-RTT 2025/04/30 11:09:32 server Short Header{DestConnectionID: e6036499, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:32 server <- &wire.PingFrame{} 2025/04/30 11:09:32 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:32 server <- Reading packet 11 (28 bytes) for connection e6036499, 1-RTT 2025/04/30 11:09:32 server Short Header{DestConnectionID: e6036499, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:32 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:32 Replacing connection for connection IDs [e6036499 924196af 9435e8b3 7fad39ec] with a closed connection. 2025/04/30 11:09:32 server Connection ca1e66d920c5a18a closed. 2025/04/30 11:09:32 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:32 server -> Sending packet 28 (22 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:32 server Skipping packet number 27 2025/04/30 11:09:32 server -> Sending packet 29 (323 bytes) for connection 4aabec3c5358fc61, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.NewTokenFrame{Token: 0xe07b6f3f1f8633a5cdbb377abe0d086795467958b3c23ff20f7beb7662a2638dfb1e43644905156a2a8b91bb8a6387d5143c7c137442a9bc58cfeb53205eb2689d050d361b80200488146f1e8c8580a2f15e3bdbcca7} 2025/04/30 11:09:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03c9eb4, StatelessResetToken: 0xa3030212e4ba5a268f9df79342648c66} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee13fff7, StatelessResetToken: 0xe930b54e1b90d06397f53467405faaf2} 2025/04/30 11:09:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92c7a606, StatelessResetToken: 0x32aa36a07752bfaa70c9725cc8e9a0e2} 2025/04/30 11:09:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:32 server -> Sending packet 20 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:32 server -> Sending packet 21 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:32 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:33 Removing connection ID 8cf6fd59caff8cf5 after it has been retired. 2025/04/30 11:09:33 server <- Received Initial packet. 2025/04/30 11:09:33 Created qlog file: /logs/qlog/95dd632c2a95a3de.sqlog 2025/04/30 11:09:33 server Changing connection ID to cabb2e3e. 2025/04/30 11:09:33 Adding connection IDs 95dd632c2a95a3de and cabb2e3e for a new connection. 2025/04/30 11:09:33 server <- Reading packet 0 (1220 bytes) for connection 95dd632c2a95a3de, Initial 2025/04/30 11:09:33 server Long Header{Type: Initial, DestConnectionID: 95dd632c2a95a3de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:33 Adding connection ID 44873f83. 2025/04/30 11:09:33 Adding connection ID b27ddbfb. 2025/04/30 11:09:33 Adding connection ID ddfe9f6c. 2025/04/30 11:09:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 95dd632c2a95a3de 2025/04/30 11:09:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cabb2e3e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 429, Version: v1} 2025/04/30 11:09:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cabb2e3e, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:09:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ddfe9f6c, StatelessResetToken: 0xfca137a5ad766c2eeb24ca5ec73056e0} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b27ddbfb, StatelessResetToken: 0xc40eb77f890d717ac0a63b22e4ebebee} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44873f83, StatelessResetToken: 0x0baa3f6291a48dada9f110d9fda27af7} 2025/04/30 11:09:33 server <- Reading packet 1 (77 bytes) for connection cabb2e3e, Handshake 2025/04/30 11:09:33 server Long Header{Type: Handshake, DestConnectionID: cabb2e3e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:33 server Dropping Initial keys. 2025/04/30 11:09:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:09:33 server newly acked packets (1): [0] 2025/04/30 11:09:33 server updated RTT: 32.874114ms (σ: 16.437057ms) 2025/04/30 11:09:33 server Canceling loss detection timer. 2025/04/30 11:09:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:33 Retiring connection ID 95dd632c2a95a3de in 5s. 2025/04/30 11:09:33 server Dropping Handshake keys. 2025/04/30 11:09:33 server -> Sending packet 1 (251 bytes) for connection 95dd632c2a95a3de, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.NewTokenFrame{Token: 0x7315fc6765f93c5bb357268d067290b3b456f64e115a9ad2ed6f25e858f907f4fbd2450a14125f3d8261a9f359d596988de0694b4290a0377ad1ab1424c814aa4cdedb86994b35b2c5a570e30615dfd40579e6c771e6} 2025/04/30 11:09:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:33 server <- Reading packet 3 (34 bytes) for connection cabb2e3e, 1-RTT 2025/04/30 11:09:33 server Short Header{DestConnectionID: cabb2e3e, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:33 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:33 server newly acked packets (2): [0 1] 2025/04/30 11:09:33 server updated RTT: 35.818ms (σ: 18.217ms) 2025/04/30 11:09:33 server ECN capability confirmed. 2025/04/30 11:09:33 server Canceling loss detection timer. 2025/04/30 11:09:33 server <- Reading packet 4 (1220 bytes) for connection cabb2e3e, 1-RTT 2025/04/30 11:09:33 server Short Header{DestConnectionID: cabb2e3e, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:33 server <- &wire.PingFrame{} 2025/04/30 11:09:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:33 server -> Sending packet 2 (24 bytes) for connection 95dd632c2a95a3de, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 187.979µs} 2025/04/30 11:09:33 Received request: GET /mgpiudgngs 2025/04/30 11:09:33 server -> Sending packet 3 (1045 bytes) for connection 95dd632c2a95a3de, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:33 server <- Reading packet 5 (36 bytes) for connection cabb2e3e, 1-RTT 2025/04/30 11:09:33 server Short Header{DestConnectionID: cabb2e3e, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:33 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 256µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:33 server newly acked packets (1): [3] 2025/04/30 11:09:33 server updated RTT: 35.313ms (σ: 14.671ms) 2025/04/30 11:09:33 server Canceling loss detection timer. 2025/04/30 11:09:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:33 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:33 Replacing connection for connection IDs [cabb2e3e 44873f83 b27ddbfb ddfe9f6c] with a closed connection. 2025/04/30 11:09:33 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:33 server Connection 95dd632c2a95a3de closed. 2025/04/30 11:09:33 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:33 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:33 Removing connection ID a8116e92. 2025/04/30 11:09:33 Removing connection ID 24584cda. 2025/04/30 11:09:33 Removing connection ID 9c06baa6. 2025/04/30 11:09:33 Removing connection ID 8d847f53. 2025/04/30 11:09:33 server Connection 0a82055c510d2701 closed. 2025/04/30 11:09:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:33 server -> Sending packet 29 (22 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:33 server Skipping packet number 28 2025/04/30 11:09:33 server -> Sending packet 30 (323 bytes) for connection 40a8c09cd5519a55, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 129625ff, StatelessResetToken: 0x86c82120752b6280d821d761d90e337e} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81b16964, StatelessResetToken: 0x4515324e120567409acf08d7e83a8b09} 2025/04/30 11:09:33 server -> &wire.NewTokenFrame{Token: 0x05960034300329e475299116b211468f58d2dac5dcd6f512b5611e418fce439f8ba17d6b7a44adb487535a744b5b47f8405cbdf06bc8d1007332383e76a8c1ca4a1d94bd7f237f4c32461bf99f63ba4846479d65a347} 2025/04/30 11:09:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7b61f025, StatelessResetToken: 0x6cc19f8af7af445b7229ead0a2da219a} 2025/04/30 11:09:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:33 server <- Received Initial packet. 2025/04/30 11:09:33 Created qlog file: /logs/qlog/8efce2cec543f169.sqlog 2025/04/30 11:09:33 server Changing connection ID to d28552cc. 2025/04/30 11:09:33 Adding connection IDs 8efce2cec543f169 and d28552cc for a new connection. 2025/04/30 11:09:33 server <- Reading packet 0 (1220 bytes) for connection 8efce2cec543f169, Initial 2025/04/30 11:09:33 server Long Header{Type: Initial, DestConnectionID: 8efce2cec543f169, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:33 Adding connection ID a500ced0. 2025/04/30 11:09:33 Adding connection ID 5555e83d. 2025/04/30 11:09:33 Adding connection ID f2109247. 2025/04/30 11:09:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8efce2cec543f169 2025/04/30 11:09:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d28552cc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:09:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d28552cc, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:09:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f2109247, StatelessResetToken: 0x8bd97038f14797a735954d96387cf237} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5555e83d, StatelessResetToken: 0x64524c9189de73ce91f6cd11cd79825d} 2025/04/30 11:09:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a500ced0, StatelessResetToken: 0xa7a02b956e248cdc098181adc5db0524} 2025/04/30 11:09:33 server <- Reading packet 1 (77 bytes) for connection d28552cc, Handshake 2025/04/30 11:09:33 server Long Header{Type: Handshake, DestConnectionID: d28552cc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:33 server Dropping Initial keys. 2025/04/30 11:09:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:33 server newly acked packets (1): [0] 2025/04/30 11:09:33 server updated RTT: 32.452489ms (σ: 16.226244ms) 2025/04/30 11:09:33 server Canceling loss detection timer. 2025/04/30 11:09:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:33 Retiring connection ID 8efce2cec543f169 in 5s. 2025/04/30 11:09:33 server Dropping Handshake keys. 2025/04/30 11:09:33 server -> Sending packet 1 (251 bytes) for connection 8efce2cec543f169, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:33 server -> &wire.NewTokenFrame{Token: 0x28150eadb1e73362900b40c34ddbaf5544c92d4b9d3953fddefd2882b03a4db7c87cdc335d26d9be11b39e48d4f8d097472bd15822ba96e3db0542326c278c7261b0b28c140b64338a859b8c33f5aff446a165e6346b} 2025/04/30 11:09:33 server <- Reading packet 2 (1252 bytes) for connection d28552cc, 1-RTT 2025/04/30 11:09:33 server Short Header{DestConnectionID: d28552cc, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:33 server <- &wire.PingFrame{} 2025/04/30 11:09:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:33 server newly acked packets (1): [0] 2025/04/30 11:09:33 server updated RTT: 32.575ms (σ: 12.416ms) 2025/04/30 11:09:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:33 server -> Sending packet 2 (24 bytes) for connection 8efce2cec543f169, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 101.158µs} 2025/04/30 11:09:33 Received request: GET /gmtxzzozqh 2025/04/30 11:09:33 server -> Sending packet 3 (1045 bytes) for connection 8efce2cec543f169, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:33 server <- Reading packet 4 (38 bytes) for connection d28552cc, 1-RTT 2025/04/30 11:09:33 server Short Header{DestConnectionID: d28552cc, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:33 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:33 server newly acked packets (2): [1 3] 2025/04/30 11:09:33 server updated RTT: 32.444ms (σ: 9.573ms) 2025/04/30 11:09:33 server ECN capability confirmed. 2025/04/30 11:09:33 server Canceling loss detection timer. 2025/04/30 11:09:33 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:33 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:33 server -> Sending packet 4 (29 bytes) for connection 8efce2cec543f169, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:33 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:33 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 116.597µs} 2025/04/30 11:09:33 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:33 server <- Reading packet 5 (28 bytes) for connection d28552cc, 1-RTT 2025/04/30 11:09:33 server Short Header{DestConnectionID: d28552cc, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:33 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:33 Replacing connection for connection IDs [f2109247 d28552cc a500ced0 5555e83d] with a closed connection. 2025/04/30 11:09:33 server Connection 8efce2cec543f169 closed. 2025/04/30 11:09:33 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:33 Tracking 58 connection IDs and 0 reset tokens. 2025/04/30 11:09:33 Removing connection ID e81a12e321a126d4 after it has been retired. 2025/04/30 11:09:34 server <- Received Initial packet. 2025/04/30 11:09:34 Created qlog file: /logs/qlog/a2d2ecf9ac29600b.sqlog 2025/04/30 11:09:34 server Changing connection ID to 578551c2. 2025/04/30 11:09:34 Adding connection IDs a2d2ecf9ac29600b and 578551c2 for a new connection. 2025/04/30 11:09:34 server <- Reading packet 0 (1220 bytes) for connection a2d2ecf9ac29600b, Initial 2025/04/30 11:09:34 server Long Header{Type: Initial, DestConnectionID: a2d2ecf9ac29600b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:34 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:34 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:34 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:34 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:34 Adding connection ID b58fb1c6. 2025/04/30 11:09:34 Adding connection ID 4edc1e98. 2025/04/30 11:09:34 Adding connection ID 879a187c. 2025/04/30 11:09:34 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a2d2ecf9ac29600b 2025/04/30 11:09:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 578551c2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:09:34 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:34 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 578551c2, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:09:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b58fb1c6, StatelessResetToken: 0xb318462638a500884d27b0d1ece2fc8b} 2025/04/30 11:09:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4edc1e98, StatelessResetToken: 0x2d602db392a756400e83467ec6a5da1d} 2025/04/30 11:09:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 879a187c, StatelessResetToken: 0x0912c82bf643213dea1d57031a2344de} 2025/04/30 11:09:34 server <- Reading packet 1 (77 bytes) for connection 578551c2, Handshake 2025/04/30 11:09:34 server Long Header{Type: Handshake, DestConnectionID: 578551c2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:34 server Dropping Initial keys. 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:34 server newly acked packets (1): [0] 2025/04/30 11:09:34 server updated RTT: 32.52723ms (σ: 16.263615ms) 2025/04/30 11:09:34 server Canceling loss detection timer. 2025/04/30 11:09:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:34 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:34 Retiring connection ID a2d2ecf9ac29600b in 5s. 2025/04/30 11:09:34 server Dropping Handshake keys. 2025/04/30 11:09:34 server -> Sending packet 1 (251 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:34 server -> &wire.NewTokenFrame{Token: 0x749c157ba6bbb4f93accf1983120ed3621aa2a743140585a7eee145f29075eec1f3e3cd69f21bee7ae8d786e7ee30ed499783f975be202dfa4b914284e97bd96abe0725e0a7b4df026cc40b7c3d52a6dc1d564ec643d} 2025/04/30 11:09:34 server <- Reading packet 2 (1252 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:34 server Short Header{DestConnectionID: 578551c2, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:34 server <- &wire.PingFrame{} 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:34 server newly acked packets (1): [0] 2025/04/30 11:09:34 server updated RTT: 32.644ms (σ: 12.432ms) 2025/04/30 11:09:34 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:34 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:34 server -> Sending packet 2 (24 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 110.045µs} 2025/04/30 11:09:34 Received request: GET /vxcdfhqtbp 2025/04/30 11:09:34 server -> Sending packet 3 (1045 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:34 server -> Sending packet 5 (251 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:34 server -> &wire.NewTokenFrame{Token: 0x749c157ba6bbb4f93accf1983120ed3621aa2a743140585a7eee145f29075eec1f3e3cd69f21bee7ae8d786e7ee30ed499783f975be202dfa4b914284e97bd96abe0725e0a7b4df026cc40b7c3d52a6dc1d564ec643d} 2025/04/30 11:09:34 server Skipping packet number 4 2025/04/30 11:09:34 server -> Sending packet 6 (1045 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:34 server <- Reading packet 4 (37 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:34 server Short Header{DestConnectionID: 578551c2, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:34 server newly acked packets (1): [5] 2025/04/30 11:09:34 server updated RTT: 32.447ms (σ: 9.716ms) 2025/04/30 11:09:34 server ECN capability confirmed. 2025/04/30 11:09:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:34 server -> Sending packet 8 (1045 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:34 server -> Sending packet 9 (1045 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:34 server -> Sending packet 10 (1366 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.PingFrame{} 2025/04/30 11:09:34 server <- Reading packet 6 (39 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:34 server Short Header{DestConnectionID: 578551c2, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:34 server <- Reading packet 7 (41 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:34 server Short Header{DestConnectionID: 578551c2, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:09:34 server newly acked packets (1): [10] 2025/04/30 11:09:34 server updated RTT: 32.568ms (σ: 7.529ms) 2025/04/30 11:09:34 server setting loss timer for packet 9 (1-RTT) to 37.592302ms (in 2025-04-30 11:09:34.408461116 +0000 UTC m=+28.498022238) 2025/04/30 11:09:34 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:34.408461116 +0000 UTC m=+28.498022238 2025/04/30 11:09:34 server lost packet 9 (time threshold) 2025/04/30 11:09:34 server Canceling loss detection timer. 2025/04/30 11:09:34 server -> Sending packet 11 (1045 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:34 server <- Reading packet 8 (42 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:34 server Short Header{DestConnectionID: 578551c2, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:09:34 server newly acked packets (1): [11] 2025/04/30 11:09:34 server updated RTT: 32.432ms (σ: 5.917ms) 2025/04/30 11:09:34 server Canceling loss detection timer. 2025/04/30 11:09:34 server -> Sending packet 12 (22 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:34 server -> Sending packet 14 (22 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:34 server -> Sending packet 15 (22 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:34 server -> Sending packet 16 (1409 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.PingFrame{} 2025/04/30 11:09:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:34 server -> Sending packet 18 (22 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:34 server -> Sending packet 19 (22 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:34 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:34 Removing connection ID 7b61f025. 2025/04/30 11:09:34 Removing connection ID 81b16964. 2025/04/30 11:09:34 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:34 Removing connection ID e2b5986f. 2025/04/30 11:09:34 Removing connection ID 129625ff. 2025/04/30 11:09:34 server Connection 40a8c09cd5519a55 closed. 2025/04/30 11:09:34 server <- Reading packet 12 (45 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:34 server Short Header{DestConnectionID: 578551c2, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 0, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:09:34 server <- Reading packet 13 (46 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:34 server Short Header{DestConnectionID: 578551c2, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 19, LowestAcked: 0, AckRanges: {{Largest: 19, Smallest: 18}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 11:09:34 server newly acked packets (1): [19] 2025/04/30 11:09:34 server updated RTT: 35.369ms (σ: 10.312ms) 2025/04/30 11:09:34 server lost packet 16 (time threshold) 2025/04/30 11:09:34 server Canceling loss detection timer. 2025/04/30 11:09:34 server -> Sending packet 20 (1387 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:34 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:34 server -> &wire.PingFrame{} 2025/04/30 11:09:34 server <- Reading packet 14 (46 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:34 server Short Header{DestConnectionID: 578551c2, PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:34 server <- &wire.AckFrame{LargestAcked: 20, LowestAcked: 0, AckRanges: {{Largest: 20, Smallest: 18}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 11:09:34 server newly acked packets (1): [20] 2025/04/30 11:09:34 server updated RTT: 34.926ms (σ: 8.619ms) 2025/04/30 11:09:35 server <- Reading packet 15 (51 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:35 server Short Header{DestConnectionID: 578551c2, PacketNumber: 15, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:35 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:35 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:35 server -> Sending packet 21 (1419 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:35 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:35 server -> &wire.PingFrame{} 2025/04/30 11:09:35 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:35 server -> Sending packet 22 (31 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:35 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:35 server -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 2, AckRanges: {{Largest: 15, Smallest: 12}, {Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25.399575ms} 2025/04/30 11:09:35 server <- Reading packet 16 (46 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:35 server Short Header{DestConnectionID: 578551c2, PacketNumber: 16, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:35 server <- &wire.AckFrame{LargestAcked: 21, LowestAcked: 0, AckRanges: {{Largest: 21, Smallest: 18}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 11, ECT1: 0, CE: 0} 2025/04/30 11:09:35 server newly acked packets (1): [21] 2025/04/30 11:09:35 server updated RTT: 34.544ms (σ: 7.227ms) 2025/04/30 11:09:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:35 server -> Sending packet 27 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:35 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:35 server -> Sending packet 28 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:35 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 11:09:35 server -> Sending packet 28 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:35 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:35 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:35 server -> Sending packet 29 (22 bytes) for connection 2c1d54cba4781927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:35 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:35 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:35 Removing connection ID 1094b7cab0c2d6dd after it has been retired. 2025/04/30 11:09:35 Removing connection IDs [d7031c87 88cec231 af9f2dbb 141ed2f5] for a closed connection after it has been retired. 2025/04/30 11:09:35 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:35 Removing connection ID f1c791c3. 2025/04/30 11:09:35 Removing connection ID 24faf897. 2025/04/30 11:09:35 Removing connection ID 8954127e. 2025/04/30 11:09:35 Removing connection ID 6038a102. 2025/04/30 11:09:35 server Connection 2c1d54cba4781927 closed. 2025/04/30 11:09:35 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:35 Tracking 49 connection IDs and 0 reset tokens. 2025/04/30 11:09:36 Removing connection ID 5a1ab884d5684c79 after it has been retired. 2025/04/30 11:09:36 Removing connection IDs [768b1ab1 93d1e803 148b50f3 99aadb63] for a closed connection after it has been retired. 2025/04/30 11:09:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:36 server -> Sending packet 23 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:36 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:36 server -> Sending packet 24 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:36 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:37 Removing connection ID ca1e66d920c5a18a after it has been retired. 2025/04/30 11:09:37 Removing connection IDs [e6036499 924196af 9435e8b3 7fad39ec] for a closed connection after it has been retired. 2025/04/30 11:09:37 Tracking 39 connection IDs and 0 reset tokens. 2025/04/30 11:09:38 server <- Reading packet 18 (51 bytes) for connection 578551c2, 1-RTT 2025/04/30 11:09:38 server Short Header{DestConnectionID: 578551c2, PacketNumber: 18, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:38 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:38 server -> Sending packet 23 (1435 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:38 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:38 server -> &wire.PingFrame{} 2025/04/30 11:09:38 server -> Sending packet 24 (32 bytes) for connection a2d2ecf9ac29600b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:38 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:38 server -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 2, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 16, Smallest: 12}, {Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 184.632µs} 2025/04/30 11:09:38 Removing connection ID 95dd632c2a95a3de after it has been retired. 2025/04/30 11:09:38 Removing connection IDs [cabb2e3e 44873f83 b27ddbfb ddfe9f6c] for a closed connection after it has been retired. 2025/04/30 11:09:38 Removing connection ID 8efce2cec543f169 after it has been retired. 2025/04/30 11:09:38 Removing connection IDs [f2109247 d28552cc a500ced0 5555e83d] for a closed connection after it has been retired. 2025/04/30 11:09:39 Removing connection ID a2d2ecf9ac29600b after it has been retired. 2025/04/30 11:09:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:39 server -> Sending packet 32 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:39 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:39 server -> Sending packet 33 (22 bytes) for connection e972eaf412e5b260, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:39 server Short Header{DestConnectionID: (empty), PacketNumber: 33, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:39 Tracking 28 connection IDs and 0 reset tokens. 2025/04/30 11:09:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:40 server -> Sending packet 34 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:40 server Short Header{DestConnectionID: (empty), PacketNumber: 34, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:40 server -> Sending packet 35 (1045 bytes) for connection bce86b40e1e58380, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:40 server Short Header{DestConnectionID: (empty), PacketNumber: 35, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:41 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:41 Removing connection ID 1f948bce. 2025/04/30 11:09:41 Removing connection ID 077ada9c. 2025/04/30 11:09:41 Removing connection ID e57b6d49. 2025/04/30 11:09:41 Removing connection ID 0b7a1c4d. 2025/04/30 11:09:41 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:41 server Connection bce86b40e1e58380 closed. 2025/04/30 11:09:41 Tracking 24 connection IDs and 0 reset tokens. 2025/04/30 11:09:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:42 server -> Sending packet 30 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:42 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:42 server -> Sending packet 31 (1045 bytes) for connection 8cf6fd59caff8cf5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:42 server Short Header{DestConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 11:09:42 server -> Sending packet 28 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:42 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:42 server -> Sending packet 29 (22 bytes) for connection 2c44a2609674b94e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:42 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:42 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:42 Removing connection ID caee89f8. 2025/04/30 11:09:42 Removing connection ID b10b115f. 2025/04/30 11:09:42 Removing connection ID 76786c33. 2025/04/30 11:09:42 Removing connection ID bb4d7db5. 2025/04/30 11:09:42 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:42 server Connection 2c44a2609674b94e closed. 2025/04/30 11:09:43 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:43 Removing connection ID 3ed18a74. 2025/04/30 11:09:43 Removing connection ID 92c7a606. 2025/04/30 11:09:43 Removing connection ID ee13fff7. 2025/04/30 11:09:43 Removing connection ID d03c9eb4. 2025/04/30 11:09:43 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:43 server Connection 4aabec3c5358fc61 closed. 2025/04/30 11:09:43 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:09:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:09:44 server -> Sending packet 26 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:44 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:44 server -> Sending packet 27 (1045 bytes) for connection e81a12e321a126d4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:44 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:45 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:09:47 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:09:49 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:09:50 server <- Received Initial packet. 2025/04/30 11:09:50 Created qlog file: /logs/qlog/a466bebbf027f4a7.sqlog 2025/04/30 11:09:50 server Changing connection ID to 0b75ed6d. 2025/04/30 11:09:50 Adding connection IDs a466bebbf027f4a7 and 0b75ed6d for a new connection. 2025/04/30 11:09:50 server <- Reading packet 0 (1220 bytes) for connection a466bebbf027f4a7, Initial 2025/04/30 11:09:50 server Long Header{Type: Initial, DestConnectionID: a466bebbf027f4a7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:50 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:50 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:50 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:50 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:50 Adding connection ID a238aca0. 2025/04/30 11:09:50 Adding connection ID eefba729. 2025/04/30 11:09:50 Adding connection ID 5618f207. 2025/04/30 11:09:50 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a466bebbf027f4a7 2025/04/30 11:09:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b75ed6d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 443, Version: v1} 2025/04/30 11:09:50 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:50 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b75ed6d, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:09:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5618f207, StatelessResetToken: 0x3dbee2413928ecd79f6092159a3d9569} 2025/04/30 11:09:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a238aca0, StatelessResetToken: 0xac0f441bc48c72a6b9b4027df99540bc} 2025/04/30 11:09:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eefba729, StatelessResetToken: 0xaadda70c0832b1736f4fad138c529aa8} 2025/04/30 11:09:50 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:50 Removing connection ID 3ab1b419. 2025/04/30 11:09:50 Removing connection ID f115db60. 2025/04/30 11:09:50 Removing connection ID 81403b1f. 2025/04/30 11:09:50 Removing connection ID a66ad122. 2025/04/30 11:09:50 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:50 server Connection e972eaf412e5b260 closed. 2025/04/30 11:09:50 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:50 server <- Reading packet 3 (72 bytes) for connection 0b75ed6d, Handshake 2025/04/30 11:09:50 server Long Header{Type: Handshake, DestConnectionID: 0b75ed6d, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:50 server Dropping Initial keys. 2025/04/30 11:09:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:50 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:50 Retiring connection ID a466bebbf027f4a7 in 5s. 2025/04/30 11:09:50 server Dropping Handshake keys. 2025/04/30 11:09:50 server <- Reading packet 4 (1148 bytes) for connection 0b75ed6d, 1-RTT 2025/04/30 11:09:50 server Short Header{DestConnectionID: 0b75ed6d, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:50 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:50 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:50 server -> Sending packet 1 (1366 bytes) for connection a466bebbf027f4a7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.PingFrame{} 2025/04/30 11:09:50 server -> Sending packet 2 (253 bytes) for connection a466bebbf027f4a7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 338.789µs} 2025/04/30 11:09:50 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:50 server -> &wire.NewTokenFrame{Token: 0x28486241bbc4c9f52661bae662a4ba96d9c46505cebdf9c4303e15ab3cecf090da53a0e8be6c68055afe5764b53373c77830bc1598000f052046b2f9b82d2ab791edf99fc03fb7061ed4c4b450880c636247e8763870} 2025/04/30 11:09:50 Received request: GET /ivnoifothz 2025/04/30 11:09:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:50 server -> Sending packet 3 (1045 bytes) for connection a466bebbf027f4a7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:50 server <- Reading packet 5 (34 bytes) for connection 0b75ed6d, 1-RTT 2025/04/30 11:09:50 server Short Header{DestConnectionID: 0b75ed6d, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:50 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:50 server newly acked packets (2): [0 1] 2025/04/30 11:09:50 server updated RTT: 56.969631ms (σ: 28.484815ms) 2025/04/30 11:09:50 server ECN capability confirmed. 2025/04/30 11:09:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:50 server -> Sending packet 5 (248 bytes) for connection a466bebbf027f4a7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.NewTokenFrame{Token: 0x28486241bbc4c9f52661bae662a4ba96d9c46505cebdf9c4303e15ab3cecf090da53a0e8be6c68055afe5764b53373c77830bc1598000f052046b2f9b82d2ab791edf99fc03fb7061ed4c4b450880c636247e8763870} 2025/04/30 11:09:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:50 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:50 server Skipping packet number 4 2025/04/30 11:09:50 server -> Sending packet 6 (1045 bytes) for connection a466bebbf027f4a7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:50 server <- Reading packet 6 (40 bytes) for connection 0b75ed6d, 1-RTT 2025/04/30 11:09:50 server Short Header{DestConnectionID: 0b75ed6d, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:50 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:50 server newly acked packets (1): [6] 2025/04/30 11:09:50 server updated RTT: 53.86ms (σ: 27.579ms) 2025/04/30 11:09:50 server setting loss timer for packet 5 (1-RTT) to 60.5925ms (in 2025-04-30 11:09:50.603219417 +0000 UTC m=+44.692780529) 2025/04/30 11:09:50 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:50 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:50 server -> Sending packet 7 (27 bytes) for connection a466bebbf027f4a7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 146.031µs} 2025/04/30 11:09:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:50 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:50.603219417 +0000 UTC m=+44.692780529 2025/04/30 11:09:50 server lost packet 5 (time threshold) 2025/04/30 11:09:50 server -> Sending packet 8 (248 bytes) for connection a466bebbf027f4a7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:50 server -> &wire.NewTokenFrame{Token: 0x28486241bbc4c9f52661bae662a4ba96d9c46505cebdf9c4303e15ab3cecf090da53a0e8be6c68055afe5764b53373c77830bc1598000f052046b2f9b82d2ab791edf99fc03fb7061ed4c4b450880c636247e8763870} 2025/04/30 11:09:50 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:50 server <- Reading packet 7 (36 bytes) for connection 0b75ed6d, 1-RTT 2025/04/30 11:09:50 server Short Header{DestConnectionID: 0b75ed6d, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:50 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:50 server newly acked packets (1): [7] 2025/04/30 11:09:50 server updated RTT: 50.975ms (σ: 26.453ms) 2025/04/30 11:09:50 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:50 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:50 Replacing connection for connection IDs [0b75ed6d a238aca0 eefba729 5618f207] with a closed connection. 2025/04/30 11:09:50 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:50 server Connection a466bebbf027f4a7 closed. 2025/04/30 11:09:50 server <- Received Initial packet. 2025/04/30 11:09:50 Created qlog file: /logs/qlog/d3064b9f30a77229.sqlog 2025/04/30 11:09:50 server Changing connection ID to 4b6db297. 2025/04/30 11:09:50 Adding connection IDs d3064b9f30a77229 and 4b6db297 for a new connection. 2025/04/30 11:09:50 server <- Reading packet 0 (1220 bytes) for connection d3064b9f30a77229, Initial 2025/04/30 11:09:50 server Long Header{Type: Initial, DestConnectionID: d3064b9f30a77229, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:50 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:50 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:50 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:50 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:50 Adding connection ID ba117e93. 2025/04/30 11:09:50 Adding connection ID a435093e. 2025/04/30 11:09:50 Adding connection ID 1439714e. 2025/04/30 11:09:50 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d3064b9f30a77229 2025/04/30 11:09:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b6db297, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:09:50 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:50 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b6db297, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:09:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:09:50 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ba117e93, StatelessResetToken: 0x3d87a0b0406c3e1d62be6ab97611e8d1} 2025/04/30 11:09:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a435093e, StatelessResetToken: 0x2fc4d197cef35c5d5e2b13e7e36604aa} 2025/04/30 11:09:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1439714e, StatelessResetToken: 0x73b678b65cc9bfa14df315921051fe24} 2025/04/30 11:09:50 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:09:51 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:51 server -> Sending packet 1 (1280 bytes) for connection d3064b9f30a77229, Initial 2025/04/30 11:09:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b6db297, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:51 server -> Sending packet 2 (1280 bytes) for connection d3064b9f30a77229, Initial 2025/04/30 11:09:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b6db297, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:51 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:51 server -> Sending packet 1 (742 bytes) for connection d3064b9f30a77229, Handshake 2025/04/30 11:09:51 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b6db297, PacketNumber: 1, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:09:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:09:51 server -> Sending packet 2 (742 bytes) for connection d3064b9f30a77229, Handshake 2025/04/30 11:09:51 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b6db297, PacketNumber: 2, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:09:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:09:51 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:51 server <- Reading packet 5 (72 bytes) for connection 4b6db297, Handshake 2025/04/30 11:09:51 server Long Header{Type: Handshake, DestConnectionID: 4b6db297, SrcConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:51 server Dropping Initial keys. 2025/04/30 11:09:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:51 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:51 Retiring connection ID d3064b9f30a77229 in 5s. 2025/04/30 11:09:51 server Dropping Handshake keys. 2025/04/30 11:09:51 server <- Reading packet 6 (1148 bytes) for connection 4b6db297, 1-RTT 2025/04/30 11:09:51 server Short Header{DestConnectionID: 4b6db297, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:51 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:51 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:51 server -> Sending packet 2 (325 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 319.242µs} 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a435093e, StatelessResetToken: 0x2fc4d197cef35c5d5e2b13e7e36604aa} 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ba117e93, StatelessResetToken: 0x3d87a0b0406c3e1d62be6ab97611e8d1} 2025/04/30 11:09:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:51 server -> &wire.NewTokenFrame{Token: 0x9182beb3ba74a709648fed97ca929c1452b5d6c6b25ecace91c734c30a4ac2603a61f0de4f8d5da4b22a24da371453d53425eac76445a852f3a0a7d4889509e34f45496631024c050dc24fa0443613452f2f55b1cd4e} 2025/04/30 11:09:51 Received request: GET /bjpmelgsip 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1439714e, StatelessResetToken: 0x73b678b65cc9bfa14df315921051fe24} 2025/04/30 11:09:51 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:51 server -> Sending packet 3 (320 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:51 server -> &wire.NewTokenFrame{Token: 0x9182beb3ba74a709648fed97ca929c1452b5d6c6b25ecace91c734c30a4ac2603a61f0de4f8d5da4b22a24da371453d53425eac76445a852f3a0a7d4889509e34f45496631024c050dc24fa0443613452f2f55b1cd4e} 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1439714e, StatelessResetToken: 0x73b678b65cc9bfa14df315921051fe24} 2025/04/30 11:09:51 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ba117e93, StatelessResetToken: 0x3d87a0b0406c3e1d62be6ab97611e8d1} 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a435093e, StatelessResetToken: 0x2fc4d197cef35c5d5e2b13e7e36604aa} 2025/04/30 11:09:51 server -> Sending packet 4 (1366 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.PingFrame{} 2025/04/30 11:09:51 server <- Reading packet 2 (1252 bytes) for connection 4b6db297, 1-RTT 2025/04/30 11:09:51 server Short Header{DestConnectionID: 4b6db297, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:51 server <- &wire.PingFrame{} 2025/04/30 11:09:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:51 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:51 server Queueing ACK because packet 2 was missing before. 2025/04/30 11:09:51 server -> Sending packet 5 (1053 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 579.175µs} 2025/04/30 11:09:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:51 server Dropping %!s(logging.PacketType=1) packet (38 bytes) because we already dropped the keys. 2025/04/30 11:09:51 server <- Reading packet 8 (35 bytes) for connection 4b6db297, 1-RTT 2025/04/30 11:09:51 server Short Header{DestConnectionID: 4b6db297, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:51 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:51 server newly acked packets (1): [3] 2025/04/30 11:09:51 server updated RTT: 31.451462ms (σ: 15.725731ms) 2025/04/30 11:09:51 server ECN capability confirmed. 2025/04/30 11:09:51 server <- Reading packet 9 (33 bytes) for connection 4b6db297, 1-RTT 2025/04/30 11:09:51 server Short Header{DestConnectionID: 4b6db297, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:51 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:51 server newly acked packets (2): [4 5] 2025/04/30 11:09:51 server updated RTT: 31.64ms (σ: 12.173ms) 2025/04/30 11:09:51 server Canceling loss detection timer. 2025/04/30 11:09:51 server Ignoring all packets below 7. 2025/04/30 11:09:51 server -> Sending packet 6 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:51 server <- Reading packet 10 (1332 bytes) for connection 4b6db297, 1-RTT 2025/04/30 11:09:51 server Short Header{DestConnectionID: 4b6db297, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:51 server <- &wire.PingFrame{} 2025/04/30 11:09:51 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:51 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:51 server -> Sending packet 7 (25 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, DelayTime: 25.25356ms} 2025/04/30 11:09:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:51 server -> Sending packet 9 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:51 server -> Sending packet 10 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:51 server -> Sending packet 12 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:51 server -> Sending packet 13 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:51 server -> Sending packet 14 (1409 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.PingFrame{} 2025/04/30 11:09:51 server <- Received Initial packet. 2025/04/30 11:09:51 Created qlog file: /logs/qlog/5297003b8e503d74.sqlog 2025/04/30 11:09:51 server Changing connection ID to e1ceec2a. 2025/04/30 11:09:51 Adding connection IDs 5297003b8e503d74 and e1ceec2a for a new connection. 2025/04/30 11:09:51 server <- Reading packet 1 (1220 bytes) for connection 5297003b8e503d74, Initial 2025/04/30 11:09:51 server Long Header{Type: Initial, DestConnectionID: 5297003b8e503d74, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:51 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:51 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:51 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:51 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:51 Adding connection ID 6188e03b. 2025/04/30 11:09:51 Adding connection ID 913a9081. 2025/04/30 11:09:51 Adding connection ID 6f4fd94c. 2025/04/30 11:09:51 server <- &wire.PingFrame{} 2025/04/30 11:09:51 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5297003b8e503d74 2025/04/30 11:09:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e1ceec2a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:09:51 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:09:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:51 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e1ceec2a, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:09:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:09:51 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 913a9081, StatelessResetToken: 0xf7ccac43d3a420166b8a6e3a34532b95} 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6188e03b, StatelessResetToken: 0x093240a404baca78c551a277892228c1} 2025/04/30 11:09:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f4fd94c, StatelessResetToken: 0xbd8290223c4e66c7b048899dcfc0c7fd} 2025/04/30 11:09:51 Tracking 27 connection IDs and 0 reset tokens. 2025/04/30 11:09:51 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:09:52 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:52 server <- Reading packet 4 (72 bytes) for connection e1ceec2a, Handshake 2025/04/30 11:09:52 server Long Header{Type: Handshake, DestConnectionID: e1ceec2a, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:09:52 server Dropping Initial keys. 2025/04/30 11:09:52 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:52 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:52 Retiring connection ID 5297003b8e503d74 in 5s. 2025/04/30 11:09:52 server Dropping Handshake keys. 2025/04/30 11:09:52 server <- Reading packet 5 (1148 bytes) for connection e1ceec2a, 1-RTT 2025/04/30 11:09:52 server Short Header{DestConnectionID: e1ceec2a, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:52 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:52 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:52 server -> Sending packet 1 (1366 bytes) for connection 5297003b8e503d74, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:52 Received request: GET /yswofkmnis 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.PingFrame{} 2025/04/30 11:09:52 server <- Reading packet 3 (1252 bytes) for connection e1ceec2a, 1-RTT 2025/04/30 11:09:52 server Short Header{DestConnectionID: e1ceec2a, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:52 server <- &wire.PingFrame{} 2025/04/30 11:09:52 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:52 server newly acked packets (1): [0] 2025/04/30 11:09:52 server updated RTT: 33.565386ms (σ: 16.782693ms) 2025/04/30 11:09:52 server Canceling loss detection timer. 2025/04/30 11:09:52 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:52 server -> Sending packet 2 (1280 bytes) for connection 5297003b8e503d74, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 442.241µs} 2025/04/30 11:09:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:52 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:52 server -> &wire.NewTokenFrame{Token: 0x7bfdb8b6e9eac6b5b8f3d6a6fe2f5bd7168e7ca6986d9e0aa347b5bb31449cb00c58ffe2ad1cdb7e76a8b78593dd3891197747cd669f417cbcbc62a7379ee732da709a4b265b294f28bbccea7e90fcae59a9e1341a6d} 2025/04/30 11:09:52 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1023, Offset + Data length: 1023} 2025/04/30 11:09:52 server -> Sending packet 3 (24 bytes) for connection 5297003b8e503d74, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1023, Data length: 1, Offset + Data length: 1024} 2025/04/30 11:09:52 server <- Reading packet 8 (28 bytes) for connection e1ceec2a, 1-RTT 2025/04/30 11:09:52 server Short Header{DestConnectionID: e1ceec2a, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:52 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:52 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:52 Replacing connection for connection IDs [e1ceec2a 6188e03b 913a9081 6f4fd94c] with a closed connection. 2025/04/30 11:09:52 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:52 server Connection 5297003b8e503d74 closed. 2025/04/30 11:09:52 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:09:52 server -> Sending packet 16 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:52 server -> Sending packet 17 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:52 server <- Received Initial packet. 2025/04/30 11:09:52 Created qlog file: /logs/qlog/ac891a9b8408bd9d.sqlog 2025/04/30 11:09:52 server Changing connection ID to 2ec60d2d. 2025/04/30 11:09:52 Adding connection IDs ac891a9b8408bd9d and 2ec60d2d for a new connection. 2025/04/30 11:09:52 server <- Reading packet 0 (1220 bytes) for connection ac891a9b8408bd9d, Initial 2025/04/30 11:09:52 server Long Header{Type: Initial, DestConnectionID: ac891a9b8408bd9d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:52 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:52 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:52 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:52 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:52 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:52 Adding connection ID aa264518. 2025/04/30 11:09:52 Adding connection ID 1d8668fe. 2025/04/30 11:09:52 Adding connection ID bf6eb90f. 2025/04/30 11:09:52 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ac891a9b8408bd9d 2025/04/30 11:09:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2ec60d2d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:09:52 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:52 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2ec60d2d, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:09:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bf6eb90f, StatelessResetToken: 0xc5be5b760c9d7431b24ba0f8b02211a7} 2025/04/30 11:09:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1d8668fe, StatelessResetToken: 0xbff5d17d06a3865fdd96145c28e0b635} 2025/04/30 11:09:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: aa264518, StatelessResetToken: 0x2fb6cb11909f06c320b5a3d8092ab7ca} 2025/04/30 11:09:52 server <- Reading packet 1 (77 bytes) for connection 2ec60d2d, Handshake 2025/04/30 11:09:52 server Long Header{Type: Handshake, DestConnectionID: 2ec60d2d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:52 server Dropping Initial keys. 2025/04/30 11:09:52 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:52 server newly acked packets (1): [0] 2025/04/30 11:09:52 server updated RTT: 32.536796ms (σ: 16.268398ms) 2025/04/30 11:09:52 server Canceling loss detection timer. 2025/04/30 11:09:52 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:52 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:52 Retiring connection ID ac891a9b8408bd9d in 5s. 2025/04/30 11:09:52 server Dropping Handshake keys. 2025/04/30 11:09:52 server -> Sending packet 1 (251 bytes) for connection ac891a9b8408bd9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:52 server -> &wire.NewTokenFrame{Token: 0x72bce757e094e6d451bcecd63c3e9fefcfe09557d1862a6622f6435fc50349fb800cb6448d9312db03fe1d63781cdff1cbc29c0d6c86051635d8832ebbd2c97012da57ffad6325cc75894220a802b0947c64c090dfec} 2025/04/30 11:09:52 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:52 server <- Reading packet 2 (1252 bytes) for connection 2ec60d2d, 1-RTT 2025/04/30 11:09:52 server Short Header{DestConnectionID: 2ec60d2d, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:52 server <- &wire.PingFrame{} 2025/04/30 11:09:52 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:52 server newly acked packets (1): [0] 2025/04/30 11:09:52 server updated RTT: 32.661ms (σ: 12.451ms) 2025/04/30 11:09:52 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:52 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:52 server -> Sending packet 2 (24 bytes) for connection ac891a9b8408bd9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 131.254µs} 2025/04/30 11:09:52 Received request: GET /agxwkubkbw 2025/04/30 11:09:52 server -> Sending packet 3 (1045 bytes) for connection ac891a9b8408bd9d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:52 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:52 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:52 server <- Reading packet 4 (38 bytes) for connection 2ec60d2d, 1-RTT 2025/04/30 11:09:52 server Short Header{DestConnectionID: 2ec60d2d, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:52 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:52 server newly acked packets (2): [1 3] 2025/04/30 11:09:52 server updated RTT: 32.54ms (σ: 9.578ms) 2025/04/30 11:09:52 server ECN capability confirmed. 2025/04/30 11:09:52 server Canceling loss detection timer. 2025/04/30 11:09:52 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:52 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:52 server <- Reading packet 5 (28 bytes) for connection 2ec60d2d, 1-RTT 2025/04/30 11:09:52 server Short Header{DestConnectionID: 2ec60d2d, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:52 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:52 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:52 Replacing connection for connection IDs [1d8668fe bf6eb90f 2ec60d2d aa264518] with a closed connection. 2025/04/30 11:09:52 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:52 server Connection ac891a9b8408bd9d closed. 2025/04/30 11:09:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:09:53 server -> Sending packet 19 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:53 server -> Sending packet 20 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:53 server <- Received Initial packet. 2025/04/30 11:09:53 Created qlog file: /logs/qlog/3914497427ce28f4.sqlog 2025/04/30 11:09:53 server Changing connection ID to 545168ca. 2025/04/30 11:09:53 Adding connection IDs 3914497427ce28f4 and 545168ca for a new connection. 2025/04/30 11:09:53 server <- Reading packet 1 (1220 bytes) for connection 3914497427ce28f4, Initial 2025/04/30 11:09:53 server Long Header{Type: Initial, DestConnectionID: 3914497427ce28f4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:53 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:53 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:53 Adding connection ID e8a17409. 2025/04/30 11:09:53 Adding connection ID 814243dc. 2025/04/30 11:09:53 Adding connection ID 2ba6bb26. 2025/04/30 11:09:53 server <- &wire.PingFrame{} 2025/04/30 11:09:53 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3914497427ce28f4 2025/04/30 11:09:53 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 545168ca, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 445, Version: v1} 2025/04/30 11:09:53 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:53 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 545168ca, PacketNumber: 0, PacketNumberLen: 2, Length: 717, Version: v1} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 695, Offset + Data length: 695} 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 814243dc, StatelessResetToken: 0x63f3099fb2c5cb0268d952386d1d52a4} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e8a17409, StatelessResetToken: 0x715688c820f7e31338637b798ca41421} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2ba6bb26, StatelessResetToken: 0x03cd2030ae2e8ac14003e46a8ebee925} 2025/04/30 11:09:53 server <- Reading packet 2 (77 bytes) for connection 545168ca, Handshake 2025/04/30 11:09:53 server Long Header{Type: Handshake, DestConnectionID: 545168ca, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:53 server Dropping Initial keys. 2025/04/30 11:09:53 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:09:53 server newly acked packets (1): [0] 2025/04/30 11:09:53 server updated RTT: 32.619077ms (σ: 16.309538ms) 2025/04/30 11:09:53 server Canceling loss detection timer. 2025/04/30 11:09:53 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:53 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 Retiring connection ID 3914497427ce28f4 in 5s. 2025/04/30 11:09:53 server Dropping Handshake keys. 2025/04/30 11:09:53 server -> Sending packet 1 (251 bytes) for connection 3914497427ce28f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:53 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:53 server -> &wire.NewTokenFrame{Token: 0xb18d683e8cd64bde760001d5ef7cc815d2afb34ee18d79d4a42d77bd6fbf1cf30e75d818acb1665652b3113a65d263da30fd91d7d043f8a035d0ac5440f4967fa4e5b7bea4c858b185f4b4e21864da8c76b70ece12b1} 2025/04/30 11:09:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:53 server -> Sending packet 3 (91 bytes) for connection 3914497427ce28f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e8a17409, StatelessResetToken: 0x715688c820f7e31338637b798ca41421} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2ba6bb26, StatelessResetToken: 0x03cd2030ae2e8ac14003e46a8ebee925} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 814243dc, StatelessResetToken: 0x63f3099fb2c5cb0268d952386d1d52a4} 2025/04/30 11:09:53 server Skipping packet number 2 2025/04/30 11:09:53 server -> Sending packet 4 (251 bytes) for connection 3914497427ce28f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:53 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:53 server -> &wire.NewTokenFrame{Token: 0xb18d683e8cd64bde760001d5ef7cc815d2afb34ee18d79d4a42d77bd6fbf1cf30e75d818acb1665652b3113a65d263da30fd91d7d043f8a035d0ac5440f4967fa4e5b7bea4c858b185f4b4e21864da8c76b70ece12b1} 2025/04/30 11:09:53 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:09:53 server Dropping %!s(logging.PacketType=1) packet (72 bytes) because we already dropped the keys. 2025/04/30 11:09:53 server <- Reading packet 5 (1148 bytes) for connection 545168ca, 1-RTT 2025/04/30 11:09:53 server Short Header{DestConnectionID: 545168ca, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:53 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:53 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:53 server -> Sending packet 5 (24 bytes) for connection 3914497427ce28f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 122.608µs} 2025/04/30 11:09:53 Received request: GET /sckeezakbt 2025/04/30 11:09:53 server -> Sending packet 6 (1045 bytes) for connection 3914497427ce28f4, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:53 server <- Reading packet 6 (40 bytes) for connection 545168ca, 1-RTT 2025/04/30 11:09:53 server Short Header{DestConnectionID: 545168ca, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:53 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:53 server newly acked packets (1): [6] 2025/04/30 11:09:53 server updated RTT: 32.497ms (σ: 12.475ms) 2025/04/30 11:09:53 server ECN capability confirmed. 2025/04/30 11:09:53 server lost packet 3 (reordering threshold) 2025/04/30 11:09:53 server setting loss timer for packet 4 (1-RTT) to 36.559125ms (in 2025-04-30 11:09:53.213832124 +0000 UTC m=+47.303393236) 2025/04/30 11:09:53 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:53 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:53 server <- Reading packet 7 (28 bytes) for connection 545168ca, 1-RTT 2025/04/30 11:09:53 server Short Header{DestConnectionID: 545168ca, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:53 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:53 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:53 Replacing connection for connection IDs [814243dc 2ba6bb26 545168ca e8a17409] with a closed connection. 2025/04/30 11:09:53 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:53 server Connection 3914497427ce28f4 closed. 2025/04/30 11:09:53 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:53 Removing connection ID ea612ce9. 2025/04/30 11:09:53 Removing connection ID b926e16d. 2025/04/30 11:09:53 Removing connection ID f1c139c9. 2025/04/30 11:09:53 Removing connection ID af12d406. 2025/04/30 11:09:53 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:53 server Connection 8cf6fd59caff8cf5 closed. 2025/04/30 11:09:53 server <- Received Initial packet. 2025/04/30 11:09:53 Created qlog file: /logs/qlog/e943641ae2f66315.sqlog 2025/04/30 11:09:53 server Changing connection ID to 124bd627. 2025/04/30 11:09:53 Adding connection IDs e943641ae2f66315 and 124bd627 for a new connection. 2025/04/30 11:09:53 server <- Reading packet 0 (1220 bytes) for connection e943641ae2f66315, Initial 2025/04/30 11:09:53 server Long Header{Type: Initial, DestConnectionID: e943641ae2f66315, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:53 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:53 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:53 Adding connection ID b5519b55. 2025/04/30 11:09:53 Adding connection ID 8556dce0. 2025/04/30 11:09:53 Adding connection ID fadf3186. 2025/04/30 11:09:53 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e943641ae2f66315 2025/04/30 11:09:53 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 124bd627, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:09:53 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:53 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 124bd627, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b5519b55, StatelessResetToken: 0xea1c200e6c1d3ef47d3fa88e4368979e} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8556dce0, StatelessResetToken: 0x7259a0945b77d0a884509cf8f97b7262} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fadf3186, StatelessResetToken: 0x05f8608b2b85feacf9389891add6f445} 2025/04/30 11:09:53 server <- Reading packet 1 (77 bytes) for connection 124bd627, Handshake 2025/04/30 11:09:53 server Long Header{Type: Handshake, DestConnectionID: 124bd627, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:53 server Dropping Initial keys. 2025/04/30 11:09:53 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:53 server newly acked packets (1): [0] 2025/04/30 11:09:53 server updated RTT: 32.48043ms (σ: 16.240215ms) 2025/04/30 11:09:53 server Canceling loss detection timer. 2025/04/30 11:09:53 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:53 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 Retiring connection ID e943641ae2f66315 in 5s. 2025/04/30 11:09:53 server Dropping Handshake keys. 2025/04/30 11:09:53 server -> Sending packet 1 (251 bytes) for connection e943641ae2f66315, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:53 server -> &wire.NewTokenFrame{Token: 0x2dc4c0c5d5bd8a6f75f7ae06d170d63da1744e76079cfd5265f6875aaf603a85a7a00c6b1c7a4fbfb5189942356666069bbd094a4ff655c247bb714e3d20e30545dea25c0108ca839f1ee48af8ee3ab83f841509a4d4} 2025/04/30 11:09:53 server <- Reading packet 2 (1252 bytes) for connection 124bd627, 1-RTT 2025/04/30 11:09:53 server Short Header{DestConnectionID: 124bd627, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:53 server <- &wire.PingFrame{} 2025/04/30 11:09:53 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:53 server newly acked packets (1): [0] 2025/04/30 11:09:53 server updated RTT: 32.601ms (σ: 12.423ms) 2025/04/30 11:09:53 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:53 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:53 server -> Sending packet 2 (24 bytes) for connection e943641ae2f66315, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 111.257µs} 2025/04/30 11:09:53 Received request: GET /fumdvzhjzf 2025/04/30 11:09:53 server -> Sending packet 3 (1045 bytes) for connection e943641ae2f66315, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:53 server <- Reading packet 4 (38 bytes) for connection 124bd627, 1-RTT 2025/04/30 11:09:53 server Short Header{DestConnectionID: 124bd627, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:53 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:53 server newly acked packets (2): [1 3] 2025/04/30 11:09:53 server updated RTT: 32.463ms (σ: 9.592ms) 2025/04/30 11:09:53 server ECN capability confirmed. 2025/04/30 11:09:53 server Canceling loss detection timer. 2025/04/30 11:09:53 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:53 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:53 server -> Sending packet 4 (29 bytes) for connection e943641ae2f66315, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 145.6µs} 2025/04/30 11:09:53 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:53 server <- Reading packet 5 (28 bytes) for connection 124bd627, 1-RTT 2025/04/30 11:09:53 server Short Header{DestConnectionID: 124bd627, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:53 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:53 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:53 Replacing connection for connection IDs [124bd627 b5519b55 8556dce0 fadf3186] with a closed connection. 2025/04/30 11:09:53 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:53 server Connection e943641ae2f66315 closed. 2025/04/30 11:09:53 Tracking 38 connection IDs and 0 reset tokens. 2025/04/30 11:09:53 server <- Received Initial packet. 2025/04/30 11:09:53 Created qlog file: /logs/qlog/b178af8135a7154f.sqlog 2025/04/30 11:09:53 server Changing connection ID to dfbcec0f. 2025/04/30 11:09:53 Adding connection IDs b178af8135a7154f and dfbcec0f for a new connection. 2025/04/30 11:09:53 server <- Reading packet 0 (1220 bytes) for connection b178af8135a7154f, Initial 2025/04/30 11:09:53 server Long Header{Type: Initial, DestConnectionID: b178af8135a7154f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:53 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:53 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:53 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:53 Adding connection ID 51084069. 2025/04/30 11:09:53 Adding connection ID ce27e85a. 2025/04/30 11:09:53 Adding connection ID 183cfdab. 2025/04/30 11:09:53 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b178af8135a7154f 2025/04/30 11:09:53 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 437, Version: v1} 2025/04/30 11:09:53 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:53 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:09:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:09:53 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 183cfdab, StatelessResetToken: 0x63ca351842e0d9fe75aa2f377df56d45} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ce27e85a, StatelessResetToken: 0x1b7099a3f172924500927e69db974325} 2025/04/30 11:09:53 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 51084069, StatelessResetToken: 0x2db947c08e8ff71c49d1d0f1c1609e35} 2025/04/30 11:09:54 server <- Reading packet 1 (1220 bytes) for connection b178af8135a7154f, Initial 2025/04/30 11:09:54 server Long Header{Type: Initial, DestConnectionID: b178af8135a7154f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:54 server <- &wire.PingFrame{} 2025/04/30 11:09:54 server -> Sending packet 1 (37 bytes) for connection b178af8135a7154f, Initial 2025/04/30 11:09:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:09:54 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:54 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:54 server -> Sending packet 2 (1280 bytes) for connection b178af8135a7154f, Initial 2025/04/30 11:09:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:54 server -> Sending packet 3 (1280 bytes) for connection b178af8135a7154f, Initial 2025/04/30 11:09:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:54 server Destroying connection: timeout: no recent network activity 2025/04/30 11:09:54 Removing connection ID f11308ef. 2025/04/30 11:09:54 Removing connection ID 5e4087da. 2025/04/30 11:09:54 Removing connection ID b02a380c. 2025/04/30 11:09:54 Removing connection ID 26e57c73. 2025/04/30 11:09:54 Error accepting stream: timeout: no recent network activity 2025/04/30 11:09:54 server Connection e81a12e321a126d4 closed. 2025/04/30 11:09:54 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:54 server -> Sending packet 1 (738 bytes) for connection b178af8135a7154f, Handshake 2025/04/30 11:09:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, PacketNumber: 1, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:09:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:09:54 server -> Sending packet 2 (738 bytes) for connection b178af8135a7154f, Handshake 2025/04/30 11:09:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, PacketNumber: 2, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:09:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:09:54 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:09:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:09:54 server -> Sending packet 22 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:54 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:54 server -> Sending packet 23 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:54 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:54 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:09:54 server -> Sending packet 4 (1280 bytes) for connection b178af8135a7154f, Initial 2025/04/30 11:09:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:54 server -> Sending packet 5 (1280 bytes) for connection b178af8135a7154f, Initial 2025/04/30 11:09:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dfbcec0f, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:55 server Parsed a coalesced packet. Part 1: 73 bytes. Remaining: 1147 bytes. 2025/04/30 11:09:55 server <- Reading packet 8 (73 bytes) for connection dfbcec0f, Handshake 2025/04/30 11:09:55 server Long Header{Type: Handshake, DestConnectionID: dfbcec0f, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, Length: 60, Version: v1} 2025/04/30 11:09:55 server Dropping Initial keys. 2025/04/30 11:09:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:55 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:55 server <- &wire.PingFrame{} 2025/04/30 11:09:55 Retiring connection ID b178af8135a7154f in 5s. 2025/04/30 11:09:55 server Dropping Handshake keys. 2025/04/30 11:09:55 server <- Reading packet 9 (1147 bytes) for connection dfbcec0f, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: dfbcec0f, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:55 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:55 server -> Sending packet 2 (325 bytes) for connection b178af8135a7154f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 333.729µs} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 183cfdab, StatelessResetToken: 0x63ca351842e0d9fe75aa2f377df56d45} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 51084069, StatelessResetToken: 0x2db947c08e8ff71c49d1d0f1c1609e35} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ce27e85a, StatelessResetToken: 0x1b7099a3f172924500927e69db974325} 2025/04/30 11:09:55 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:55 Received request: GET /ggmpmerwla 2025/04/30 11:09:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:55 server -> &wire.NewTokenFrame{Token: 0xc99b38a642b55a7b6a51c495bb9cca0b3bfacfdd76d339646bc2fccba3b5de8ba16cdeeb237cf842905430e10ffa9a4fc3b00a1beeabf50419ee778e077c5fbecb7f2968f07a4a9f2e556a77f0e7a164a50078493f57} 2025/04/30 11:09:55 server -> Sending packet 3 (1280 bytes) for connection b178af8135a7154f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.NewTokenFrame{Token: 0xc99b38a642b55a7b6a51c495bb9cca0b3bfacfdd76d339646bc2fccba3b5de8ba16cdeeb237cf842905430e10ffa9a4fc3b00a1beeabf50419ee778e077c5fbecb7f2968f07a4a9f2e556a77f0e7a164a50078493f57} 2025/04/30 11:09:55 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 51084069, StatelessResetToken: 0x2db947c08e8ff71c49d1d0f1c1609e35} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 183cfdab, StatelessResetToken: 0x63ca351842e0d9fe75aa2f377df56d45} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ce27e85a, StatelessResetToken: 0x1b7099a3f172924500927e69db974325} 2025/04/30 11:09:55 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 958, Offset + Data length: 958} 2025/04/30 11:09:55 server -> Sending packet 4 (1366 bytes) for connection b178af8135a7154f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.PingFrame{} 2025/04/30 11:09:55 server <- Reading packet 5 (1252 bytes) for connection dfbcec0f, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: dfbcec0f, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.PingFrame{} 2025/04/30 11:09:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:55 server Queueing ACK because packet 5 was missing before. 2025/04/30 11:09:55 server -> Sending packet 5 (97 bytes) for connection b178af8135a7154f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}}, DelayTime: 703.226µs} 2025/04/30 11:09:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 958, Data length: 66, Offset + Data length: 1024} 2025/04/30 11:09:55 server <- Reading packet 10 (44 bytes) for connection dfbcec0f, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: dfbcec0f, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:55 server newly acked packets (1): [3] 2025/04/30 11:09:55 server updated RTT: 32.254518ms (σ: 16.127259ms) 2025/04/30 11:09:55 server ECN capability confirmed. 2025/04/30 11:09:55 server <- &wire.MaxDataFrame{MaximumData: 16778174} 2025/04/30 11:09:55 server <- &wire.MaxStreamDataFrame{StreamID: 0, MaximumStreamData: 66494} 2025/04/30 11:09:55 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:55 server <- Reading packet 12 (1332 bytes) for connection dfbcec0f, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: dfbcec0f, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.PingFrame{} 2025/04/30 11:09:55 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:09:55 server -> Sending packet 6 (28 bytes) for connection b178af8135a7154f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 5, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 9}, {Largest: 5, Smallest: 5}}, DelayTime: 81.762µs} 2025/04/30 11:09:55 server <- Reading packet 13 (28 bytes) for connection dfbcec0f, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: dfbcec0f, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:55 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:55 Replacing connection for connection IDs [dfbcec0f 51084069 ce27e85a 183cfdab] with a closed connection. 2025/04/30 11:09:55 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:55 server Connection b178af8135a7154f closed. 2025/04/30 11:09:55 Removing connection ID a466bebbf027f4a7 after it has been retired. 2025/04/30 11:09:55 server <- Received Initial packet. 2025/04/30 11:09:55 Created qlog file: /logs/qlog/683a0c97b5792aac.sqlog 2025/04/30 11:09:55 server Changing connection ID to 563fc169. 2025/04/30 11:09:55 Adding connection IDs 683a0c97b5792aac and 563fc169 for a new connection. 2025/04/30 11:09:55 server <- Reading packet 0 (1220 bytes) for connection 683a0c97b5792aac, Initial 2025/04/30 11:09:55 server Long Header{Type: Initial, DestConnectionID: 683a0c97b5792aac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:55 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:55 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:55 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:55 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:55 Adding connection ID 8bcacdb2. 2025/04/30 11:09:55 Adding connection ID e99d49c6. 2025/04/30 11:09:55 Adding connection ID 8092203e. 2025/04/30 11:09:55 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 683a0c97b5792aac 2025/04/30 11:09:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 563fc169, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 442, Version: v1} 2025/04/30 11:09:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 563fc169, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:09:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8092203e, StatelessResetToken: 0xa1657fd931f4f337aff3c5abd30ba802} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e99d49c6, StatelessResetToken: 0x555ae0e3370197e93bc2a67dc201f0ac} 2025/04/30 11:09:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8bcacdb2, StatelessResetToken: 0xce22ae6d9cc35f0245214780bf4749c6} 2025/04/30 11:09:55 server <- Reading packet 1 (77 bytes) for connection 563fc169, Handshake 2025/04/30 11:09:55 server Long Header{Type: Handshake, DestConnectionID: 563fc169, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:55 server Dropping Initial keys. 2025/04/30 11:09:55 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:55 server newly acked packets (1): [0] 2025/04/30 11:09:55 server updated RTT: 32.706348ms (σ: 16.353174ms) 2025/04/30 11:09:55 server Canceling loss detection timer. 2025/04/30 11:09:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:55 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:55 Retiring connection ID 683a0c97b5792aac in 5s. 2025/04/30 11:09:55 server Dropping Handshake keys. 2025/04/30 11:09:55 server -> Sending packet 1 (251 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:55 server -> &wire.NewTokenFrame{Token: 0x36ecb2cd63b01dc305f8cb40ee4f0c68b5f93bf9456d244c4f37893e90a8eef159403b48300090f980280d609c0c92e844331ed07191402a7e56a755266a9037744f2b87d62c2ee7e30843df6f23ffada3d767a4e46e} 2025/04/30 11:09:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:55 server <- Reading packet 3 (34 bytes) for connection 563fc169, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: 563fc169, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:09:55 Removing connection IDs [0b75ed6d a238aca0 eefba729 5618f207] for a closed connection after it has been retired. 2025/04/30 11:09:55 server newly acked packets (2): [0 1] 2025/04/30 11:09:55 server updated RTT: 35.656ms (σ: 18.165ms) 2025/04/30 11:09:55 server ECN capability confirmed. 2025/04/30 11:09:55 server Canceling loss detection timer. 2025/04/30 11:09:55 server <- Reading packet 4 (1220 bytes) for connection 563fc169, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: 563fc169, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.PingFrame{} 2025/04/30 11:09:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:55 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:55 server -> Sending packet 2 (24 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 156.912µs} 2025/04/30 11:09:55 Received request: GET /egpxleoejo 2025/04/30 11:09:55 server -> Sending packet 3 (1045 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:55 server <- Reading packet 5 (40 bytes) for connection 563fc169, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: 563fc169, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:55 server newly acked packets (1): [3] 2025/04/30 11:09:55 server updated RTT: 35.147ms (σ: 14.641ms) 2025/04/30 11:09:55 server Canceling loss detection timer. 2025/04/30 11:09:55 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:55 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:55 server -> Sending packet 4 (27 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 131.023µs} 2025/04/30 11:09:55 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:55 server -> Sending packet 6 (22 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:55 server -> Sending packet 7 (22 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:55 server -> Sending packet 8 (1366 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.PingFrame{} 2025/04/30 11:09:55 Tracking 39 connection IDs and 0 reset tokens. 2025/04/30 11:09:55 server <- Reading packet 8 (1220 bytes) for connection 563fc169, 1-RTT 2025/04/30 11:09:55 server Short Header{DestConnectionID: 563fc169, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:55 server <- &wire.PingFrame{} 2025/04/30 11:09:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:55 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:55 server -> Sending packet 9 (26 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:55 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:55 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 3}}, DelayTime: 157.693µs} 2025/04/30 11:09:56 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:09:56 server -> Sending packet 11 (22 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:56 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:56 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:56 server -> Sending packet 12 (22 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:56 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:56 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:56 server <- Reading packet 10 (40 bytes) for connection 563fc169, 1-RTT 2025/04/30 11:09:56 server Short Header{DestConnectionID: 563fc169, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:56 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 8, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:09:56 server newly acked packets (2): [8 12] 2025/04/30 11:09:56 server updated RTT: 37.777ms (σ: 16.242ms) 2025/04/30 11:09:56 server Canceling loss detection timer. 2025/04/30 11:09:56 server -> Sending packet 13 (1409 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:56 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:56 server -> &wire.PingFrame{} 2025/04/30 11:09:56 Removing connection ID d3064b9f30a77229 after it has been retired. 2025/04/30 11:09:56 server <- Reading packet 12 (1220 bytes) for connection 563fc169, 1-RTT 2025/04/30 11:09:56 server Short Header{DestConnectionID: 563fc169, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:56 server <- &wire.PingFrame{} 2025/04/30 11:09:56 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:56 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:09:56 server -> Sending packet 14 (30 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:56 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:56 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 3, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 3}}, DelayTime: 157.302µs} 2025/04/30 11:09:57 Removing connection ID 5297003b8e503d74 after it has been retired. 2025/04/30 11:09:57 Removing connection IDs [e1ceec2a 6188e03b 913a9081 6f4fd94c] for a closed connection after it has been retired. 2025/04/30 11:09:57 Removing connection ID ac891a9b8408bd9d after it has been retired. 2025/04/30 11:09:57 server <- Reading packet 13 (1220 bytes) for connection 563fc169, 1-RTT 2025/04/30 11:09:57 server Short Header{DestConnectionID: 563fc169, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:57 server <- &wire.PingFrame{} 2025/04/30 11:09:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:57 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:57 Removing connection IDs [1d8668fe bf6eb90f 2ec60d2d aa264518] for a closed connection after it has been retired. 2025/04/30 11:09:57 server Sending ACK because the ACK timer expired. 2025/04/30 11:09:57 server -> Sending packet 15 (31 bytes) for connection 683a0c97b5792aac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:57 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:57 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 3, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 3}}, DelayTime: 25.325988ms} 2025/04/30 11:09:57 server <- Reading packet 14 (38 bytes) for connection 563fc169, 1-RTT 2025/04/30 11:09:57 server Short Header{DestConnectionID: 563fc169, PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:57 server <- &wire.AckFrame{LargestAcked: 15, LowestAcked: 13, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 13}}, DelayTime: 0s, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 11:09:57 server newly acked packets (1): [13] 2025/04/30 11:09:57 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:57 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:57 Replacing connection for connection IDs [563fc169 8bcacdb2 e99d49c6 8092203e] with a closed connection. 2025/04/30 11:09:57 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:57 server Connection 683a0c97b5792aac closed. 2025/04/30 11:09:57 Tracking 28 connection IDs and 0 reset tokens. 2025/04/30 11:09:58 Removing connection ID 3914497427ce28f4 after it has been retired. 2025/04/30 11:09:58 server <- Received Initial packet. 2025/04/30 11:09:58 Created qlog file: /logs/qlog/014df16c5ae7ba23.sqlog 2025/04/30 11:09:58 server Changing connection ID to d69f9d53. 2025/04/30 11:09:58 Adding connection IDs 014df16c5ae7ba23 and d69f9d53 for a new connection. 2025/04/30 11:09:58 server <- Reading packet 1 (1220 bytes) for connection 014df16c5ae7ba23, Initial 2025/04/30 11:09:58 server Long Header{Type: Initial, DestConnectionID: 014df16c5ae7ba23, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:58 Adding connection ID 61bf3485. 2025/04/30 11:09:58 Adding connection ID adad3b7e. 2025/04/30 11:09:58 Adding connection ID ce766aac. 2025/04/30 11:09:58 server <- &wire.PingFrame{} 2025/04/30 11:09:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 014df16c5ae7ba23 2025/04/30 11:09:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d69f9d53, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 429, Version: v1} 2025/04/30 11:09:58 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:09:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d69f9d53, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:09:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: adad3b7e, StatelessResetToken: 0xe6ca1243720962a8b0d722c5bb8fa989} 2025/04/30 11:09:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 61bf3485, StatelessResetToken: 0xb6a12cc01286e37ce9f83188be76152c} 2025/04/30 11:09:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ce766aac, StatelessResetToken: 0x04a2473a98fc6a1dad9b8a7a7583ac5e} 2025/04/30 11:09:58 server <- Reading packet 2 (77 bytes) for connection d69f9d53, Handshake 2025/04/30 11:09:58 server Long Header{Type: Handshake, DestConnectionID: d69f9d53, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:58 server Dropping Initial keys. 2025/04/30 11:09:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:58 server newly acked packets (1): [0] 2025/04/30 11:09:58 server updated RTT: 32.577496ms (σ: 16.288748ms) 2025/04/30 11:09:58 server Canceling loss detection timer. 2025/04/30 11:09:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:58 Retiring connection ID 014df16c5ae7ba23 in 5s. 2025/04/30 11:09:58 server Dropping Handshake keys. 2025/04/30 11:09:58 server -> Sending packet 1 (251 bytes) for connection 014df16c5ae7ba23, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:58 server -> &wire.NewTokenFrame{Token: 0x06e15da83e5423c7eef99275d73281f877ede4a898b9c5c354c75592ecb0260af28cf263d7178da7c9be9f0e8a7fb81c8d74c008d06b545c516a61fb497035c2d7a431d9df434117c98452d58931b69c361c545c2346} 2025/04/30 11:09:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:58 server <- Reading packet 3 (1252 bytes) for connection d69f9d53, 1-RTT 2025/04/30 11:09:58 server Short Header{DestConnectionID: d69f9d53, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:58 server <- &wire.PingFrame{} 2025/04/30 11:09:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:58 server newly acked packets (1): [0] 2025/04/30 11:09:58 server updated RTT: 32.695ms (σ: 12.453ms) 2025/04/30 11:09:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:58 server -> Sending packet 2 (24 bytes) for connection 014df16c5ae7ba23, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 127.678µs} 2025/04/30 11:09:58 Received request: GET /xchmbnufwa 2025/04/30 11:09:58 server -> Sending packet 3 (1045 bytes) for connection 014df16c5ae7ba23, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:09:58 server -> Sending packet 25 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:58 server -> Sending packet 26 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:09:58 server <- Reading packet 5 (36 bytes) for connection d69f9d53, 1-RTT 2025/04/30 11:09:58 server Short Header{DestConnectionID: d69f9d53, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:58 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:58 server newly acked packets (1): [3] 2025/04/30 11:09:58 server updated RTT: 32.562ms (σ: 9.604ms) 2025/04/30 11:09:58 server ECN capability confirmed. 2025/04/30 11:09:58 server setting loss timer for packet 1 (1-RTT) to 36.63225ms (in 2025-04-30 11:09:58.123624611 +0000 UTC m=+52.213185724) 2025/04/30 11:09:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:58 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:58 Replacing connection for connection IDs [61bf3485 adad3b7e ce766aac d69f9d53] with a closed connection. 2025/04/30 11:09:58 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:58 server Connection 014df16c5ae7ba23 closed. 2025/04/30 11:09:58 Removing connection IDs [814243dc 2ba6bb26 545168ca e8a17409] for a closed connection after it has been retired. 2025/04/30 11:09:58 server <- Received Initial packet. 2025/04/30 11:09:58 Created qlog file: /logs/qlog/5412330b0aa0b20f.sqlog 2025/04/30 11:09:58 server Changing connection ID to a75e25be. 2025/04/30 11:09:58 Adding connection IDs 5412330b0aa0b20f and a75e25be for a new connection. 2025/04/30 11:09:58 server <- Reading packet 0 (1220 bytes) for connection 5412330b0aa0b20f, Initial 2025/04/30 11:09:58 server Long Header{Type: Initial, DestConnectionID: 5412330b0aa0b20f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:58 Adding connection ID 107618a4. 2025/04/30 11:09:58 Adding connection ID b35717e8. 2025/04/30 11:09:58 Adding connection ID 8ccdd632. 2025/04/30 11:09:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5412330b0aa0b20f 2025/04/30 11:09:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a75e25be, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:09:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a75e25be, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:09:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 107618a4, StatelessResetToken: 0x0e1278718aba7239343efc683397af89} 2025/04/30 11:09:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8ccdd632, StatelessResetToken: 0x8f2a87cd8c0b14070657c1a7a30b34e1} 2025/04/30 11:09:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b35717e8, StatelessResetToken: 0x242b50a2cb317718a9ef0116f82cfca6} 2025/04/30 11:09:58 server <- Reading packet 1 (77 bytes) for connection a75e25be, Handshake 2025/04/30 11:09:58 server Long Header{Type: Handshake, DestConnectionID: a75e25be, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:09:58 server Dropping Initial keys. 2025/04/30 11:09:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:09:58 server newly acked packets (1): [0] 2025/04/30 11:09:58 server updated RTT: 32.585062ms (σ: 16.292531ms) 2025/04/30 11:09:58 server Canceling loss detection timer. 2025/04/30 11:09:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:58 Retiring connection ID 5412330b0aa0b20f in 5s. 2025/04/30 11:09:58 server Dropping Handshake keys. 2025/04/30 11:09:58 server -> Sending packet 1 (251 bytes) for connection 5412330b0aa0b20f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.NewTokenFrame{Token: 0x7fbf9e72300566887f2c76d9e4adc28bf1ea365f475c1769c312deb13d2ca4008f106d48f0595a0354ac93156cd800d5ccf210ae69b71f8f90222210058c6e2044020cfe4b83026a96aee6f8405bc004f5c5ae169131} 2025/04/30 11:09:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:09:58 server <- Reading packet 2 (1252 bytes) for connection a75e25be, 1-RTT 2025/04/30 11:09:58 server Short Header{DestConnectionID: a75e25be, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:58 server <- &wire.PingFrame{} 2025/04/30 11:09:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:58 server newly acked packets (1): [0] 2025/04/30 11:09:58 server updated RTT: 32.704ms (σ: 12.457ms) 2025/04/30 11:09:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:58 server -> Sending packet 2 (24 bytes) for connection 5412330b0aa0b20f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 158.885µs} 2025/04/30 11:09:58 Received request: GET /reaolmnlsz 2025/04/30 11:09:58 server -> Sending packet 3 (1045 bytes) for connection 5412330b0aa0b20f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:58 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:58 server <- Reading packet 3 (1332 bytes) for connection a75e25be, 1-RTT 2025/04/30 11:09:58 server Short Header{DestConnectionID: a75e25be, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:58 server <- &wire.PingFrame{} 2025/04/30 11:09:58 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:58 server <- Reading packet 4 (38 bytes) for connection a75e25be, 1-RTT 2025/04/30 11:09:58 server Short Header{DestConnectionID: a75e25be, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:58 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:09:58 server newly acked packets (2): [1 3] 2025/04/30 11:09:58 server updated RTT: 32.56ms (σ: 9.629ms) 2025/04/30 11:09:58 server ECN capability confirmed. 2025/04/30 11:09:58 server Canceling loss detection timer. 2025/04/30 11:09:58 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:09:58 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:09:58 server <- Reading packet 5 (28 bytes) for connection a75e25be, 1-RTT 2025/04/30 11:09:58 server Short Header{DestConnectionID: a75e25be, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:09:58 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:09:58 Replacing connection for connection IDs [a75e25be 107618a4 b35717e8 8ccdd632] with a closed connection. 2025/04/30 11:09:58 server Connection 5412330b0aa0b20f closed. 2025/04/30 11:09:58 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:09:58 Removing connection ID e943641ae2f66315 after it has been retired. 2025/04/30 11:09:58 Removing connection IDs [124bd627 b5519b55 8556dce0 fadf3186] for a closed connection after it has been retired. 2025/04/30 11:09:59 server <- Received Initial packet. 2025/04/30 11:09:59 Created qlog file: /logs/qlog/ed89eefc80508e4d.sqlog 2025/04/30 11:09:59 server Changing connection ID to f5290929. 2025/04/30 11:09:59 Adding connection IDs ed89eefc80508e4d and f5290929 for a new connection. 2025/04/30 11:09:59 server <- Reading packet 2 (1220 bytes) for connection ed89eefc80508e4d, Initial 2025/04/30 11:09:59 server Long Header{Type: Initial, DestConnectionID: ed89eefc80508e4d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:09:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:09:59 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:59 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:59 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:59 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:09:59 Adding connection ID 6c9a24e2. 2025/04/30 11:09:59 Adding connection ID a7f3af3f. 2025/04/30 11:09:59 Adding connection ID 3ead052f. 2025/04/30 11:09:59 server <- &wire.PingFrame{} 2025/04/30 11:09:59 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ed89eefc80508e4d 2025/04/30 11:09:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5290929, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:09:59 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:59 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5290929, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:09:59 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:09:59 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:09:59 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:09:59 server -> Sending packet 1 (1280 bytes) for connection ed89eefc80508e4d, Initial 2025/04/30 11:09:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5290929, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:59 server -> Sending packet 2 (1280 bytes) for connection ed89eefc80508e4d, Initial 2025/04/30 11:09:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5290929, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:09:59 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:09:59 server -> Sending packet 1 (744 bytes) for connection ed89eefc80508e4d, Handshake 2025/04/30 11:09:59 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5290929, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:09:59 server -> Sending packet 2 (744 bytes) for connection ed89eefc80508e4d, Handshake 2025/04/30 11:09:59 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5290929, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:09:59 server Parsed a coalesced packet. Part 1: 73 bytes. Remaining: 1147 bytes. 2025/04/30 11:09:59 server <- Reading packet 7 (73 bytes) for connection f5290929, Handshake 2025/04/30 11:09:59 server Long Header{Type: Handshake, DestConnectionID: f5290929, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, Length: 60, Version: v1} 2025/04/30 11:09:59 server Dropping Initial keys. 2025/04/30 11:09:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:09:59 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:09:59 server <- &wire.PingFrame{} 2025/04/30 11:09:59 Retiring connection ID ed89eefc80508e4d in 5s. 2025/04/30 11:09:59 server Dropping Handshake keys. 2025/04/30 11:09:59 server <- Reading packet 8 (1147 bytes) for connection f5290929, 1-RTT 2025/04/30 11:09:59 server Short Header{DestConnectionID: f5290929, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:59 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:09:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:59 server -> Sending packet 2 (325 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:59 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:59 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 353.566µs} 2025/04/30 11:09:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:09:59 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:09:59 Received request: GET /uuijjyebsk 2025/04/30 11:09:59 server -> Sending packet 3 (320 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:59 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:59 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:09:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:09:59 server -> Sending packet 4 (1366 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:59 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:59 server -> &wire.PingFrame{} 2025/04/30 11:09:59 server <- Reading packet 4 (1252 bytes) for connection f5290929, 1-RTT 2025/04/30 11:09:59 server Short Header{DestConnectionID: f5290929, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:59 server <- &wire.PingFrame{} 2025/04/30 11:09:59 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:09:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:09:59 server Queueing ACK because packet 4 was missing before. 2025/04/30 11:09:59 server -> Sending packet 5 (1053 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:59 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:59 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}}, DelayTime: 576.28µs} 2025/04/30 11:09:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:59 server Dropping %!s(logging.PacketType=1) packet (38 bytes) because we already dropped the keys. 2025/04/30 11:09:59 server <- Reading packet 11 (37 bytes) for connection f5290929, 1-RTT 2025/04/30 11:09:59 server Short Header{DestConnectionID: f5290929, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:59 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:09:59 server newly acked packets (1): [4] 2025/04/30 11:09:59 server updated RTT: 32.418573ms (σ: 16.209286ms) 2025/04/30 11:09:59 server ECN capability confirmed. 2025/04/30 11:09:59 server setting loss timer for packet 3 (1-RTT) to 36.470894ms (in 2025-04-30 11:09:59.80061153 +0000 UTC m=+53.890172642) 2025/04/30 11:09:59 server <- Reading packet 12 (1332 bytes) for connection f5290929, 1-RTT 2025/04/30 11:09:59 server Short Header{DestConnectionID: f5290929, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:09:59 server <- &wire.PingFrame{} 2025/04/30 11:09:59 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:09:59 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:09:59.80061153 +0000 UTC m=+53.890172642 2025/04/30 11:09:59 server lost packet 3 (time threshold) 2025/04/30 11:09:59 server -> Sending packet 6 (330 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:59 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:59 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}}, DelayTime: 3.209754ms} 2025/04/30 11:09:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:09:59 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:09:59 Tracking 33 connection IDs and 0 reset tokens. 2025/04/30 11:09:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:09:59 server -> Sending packet 8 (1045 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:59 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:09:59 server Skipping packet number 7 2025/04/30 11:09:59 server -> Sending packet 9 (320 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:09:59 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:09:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:09:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:09:59 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:09:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:00 Removing connection ID b178af8135a7154f after it has been retired. 2025/04/30 11:10:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:00 server -> Sending packet 11 (1045 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:00 server Skipping packet number 10 2025/04/30 11:10:00 server -> Sending packet 12 (320 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:10:00 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:10:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:00 server -> Sending packet 13 (1409 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.PingFrame{} 2025/04/30 11:10:00 Removing connection IDs [dfbcec0f 51084069 ce27e85a 183cfdab] for a closed connection after it has been retired. 2025/04/30 11:10:00 server <- Received Initial packet. 2025/04/30 11:10:00 Created qlog file: /logs/qlog/9c508371686e4651.sqlog 2025/04/30 11:10:00 server Changing connection ID to bd0a04d1. 2025/04/30 11:10:00 Adding connection IDs 9c508371686e4651 and bd0a04d1 for a new connection. 2025/04/30 11:10:00 server <- Reading packet 1 (1220 bytes) for connection 9c508371686e4651, Initial 2025/04/30 11:10:00 server Long Header{Type: Initial, DestConnectionID: 9c508371686e4651, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:00 Adding connection ID 11b77cd4. 2025/04/30 11:10:00 Adding connection ID 9a2c5983. 2025/04/30 11:10:00 Adding connection ID 751ffcc0. 2025/04/30 11:10:00 server <- &wire.PingFrame{} 2025/04/30 11:10:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9c508371686e4651 2025/04/30 11:10:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bd0a04d1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:10:00 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bd0a04d1, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 11b77cd4, StatelessResetToken: 0xd229e2009b2e2cf16bfe5b684b9c6ac3} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 751ffcc0, StatelessResetToken: 0xc3a091e60cc332236d90aac4c922bfe3} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a2c5983, StatelessResetToken: 0xa1cf791101e72788949f3e8096c79ff9} 2025/04/30 11:10:00 server <- Reading packet 2 (77 bytes) for connection bd0a04d1, Handshake 2025/04/30 11:10:00 server Long Header{Type: Handshake, DestConnectionID: bd0a04d1, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:10:00 server Dropping Initial keys. 2025/04/30 11:10:00 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:10:00 server newly acked packets (1): [0] 2025/04/30 11:10:00 server updated RTT: 32.711683ms (σ: 16.355841ms) 2025/04/30 11:10:00 server Canceling loss detection timer. 2025/04/30 11:10:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:00 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:00 Retiring connection ID 9c508371686e4651 in 5s. 2025/04/30 11:10:00 server Dropping Handshake keys. 2025/04/30 11:10:00 server -> Sending packet 1 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:00 server -> Sending packet 3 (91 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a2c5983, StatelessResetToken: 0xa1cf791101e72788949f3e8096c79ff9} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 751ffcc0, StatelessResetToken: 0xc3a091e60cc332236d90aac4c922bfe3} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 11b77cd4, StatelessResetToken: 0xd229e2009b2e2cf16bfe5b684b9c6ac3} 2025/04/30 11:10:00 server Skipping packet number 2 2025/04/30 11:10:00 server -> Sending packet 4 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:00 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:00 Removing connection ID 683a0c97b5792aac after it has been retired. 2025/04/30 11:10:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:10:00 server -> Sending packet 15 (1045 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:00 server Skipping packet number 14 2025/04/30 11:10:00 server -> Sending packet 16 (320 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:10:00 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:10:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:00 server -> Sending packet 6 (91 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 11b77cd4, StatelessResetToken: 0xd229e2009b2e2cf16bfe5b684b9c6ac3} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 751ffcc0, StatelessResetToken: 0xc3a091e60cc332236d90aac4c922bfe3} 2025/04/30 11:10:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a2c5983, StatelessResetToken: 0xa1cf791101e72788949f3e8096c79ff9} 2025/04/30 11:10:00 server Skipping packet number 5 2025/04/30 11:10:00 server -> Sending packet 7 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:00 server -> Sending packet 8 (1366 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.PingFrame{} 2025/04/30 11:10:00 server <- Reading packet 6 (1220 bytes) for connection bd0a04d1, 1-RTT 2025/04/30 11:10:00 server Short Header{DestConnectionID: bd0a04d1, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:00 server <- &wire.PingFrame{} 2025/04/30 11:10:00 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:00 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:00 server -> Sending packet 9 (24 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 114.813µs} 2025/04/30 11:10:00 Received request: GET /rjgtzmoxrh 2025/04/30 11:10:00 server -> Sending packet 10 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:00 server <- Reading packet 7 (35 bytes) for connection bd0a04d1, 1-RTT 2025/04/30 11:10:00 server Short Header{DestConnectionID: bd0a04d1, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:00 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:10:00 server newly acked packets (1): [6] 2025/04/30 11:10:00 server updated RTT: 32.477ms (σ: 12.734ms) 2025/04/30 11:10:00 server ECN capability confirmed. 2025/04/30 11:10:00 server <- Reading packet 8 (37 bytes) for connection bd0a04d1, 1-RTT 2025/04/30 11:10:00 server Short Header{DestConnectionID: bd0a04d1, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:00 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:10:00 server newly acked packets (1): [8] 2025/04/30 11:10:00 server updated RTT: 32.433ms (σ: 9.638ms) 2025/04/30 11:10:00 server setting loss timer for packet 7 (1-RTT) to 36.487125ms (in 2025-04-30 11:10:00.743511254 +0000 UTC m=+54.833072366) 2025/04/30 11:10:00 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:10:00.743511254 +0000 UTC m=+54.833072366 2025/04/30 11:10:00 server lost packet 7 (time threshold) 2025/04/30 11:10:00 server -> Sending packet 11 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:00 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:00 server -> Sending packet 13 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:00 server Skipping packet number 12 2025/04/30 11:10:00 server -> Sending packet 14 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:00 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:00 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:01 server -> Sending packet 16 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:01 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:01 server Skipping packet number 15 2025/04/30 11:10:01 server -> Sending packet 17 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:01 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:01 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:01 server -> Sending packet 18 (1409 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:01 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:01 server -> &wire.PingFrame{} 2025/04/30 11:10:01 server <- Received Initial packet. 2025/04/30 11:10:01 Created qlog file: /logs/qlog/612118bde09f849d.sqlog 2025/04/30 11:10:01 server Changing connection ID to 6fcfbae6. 2025/04/30 11:10:01 Adding connection IDs 612118bde09f849d and 6fcfbae6 for a new connection. 2025/04/30 11:10:01 server <- Reading packet 0 (1220 bytes) for connection 612118bde09f849d, Initial 2025/04/30 11:10:01 server Long Header{Type: Initial, DestConnectionID: 612118bde09f849d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:01 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:01 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:01 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:01 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:01 Adding connection ID ee4485b2. 2025/04/30 11:10:01 Adding connection ID 59155850. 2025/04/30 11:10:01 Adding connection ID a4a4813f. 2025/04/30 11:10:01 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 612118bde09f849d 2025/04/30 11:10:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fcfbae6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 442, Version: v1} 2025/04/30 11:10:01 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fcfbae6, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:10:01 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a4a4813f, StatelessResetToken: 0x0f3dd9ff471971c18ede3c58eba87e02} 2025/04/30 11:10:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee4485b2, StatelessResetToken: 0x6b48468d09ae0079cb065f6da394b66c} 2025/04/30 11:10:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59155850, StatelessResetToken: 0xab32814b268a9e37c86252f5a7a33a97} 2025/04/30 11:10:01 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:10:01 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:10:01 server -> Sending packet 1 (1280 bytes) for connection 612118bde09f849d, Initial 2025/04/30 11:10:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fcfbae6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:01 server -> Sending packet 2 (1280 bytes) for connection 612118bde09f849d, Initial 2025/04/30 11:10:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fcfbae6, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:10:01 server -> Sending packet 20 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:01 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:01 server Skipping packet number 19 2025/04/30 11:10:01 server -> Sending packet 21 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:01 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:01 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:01 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:10:01 server -> Sending packet 1 (733 bytes) for connection 612118bde09f849d, Handshake 2025/04/30 11:10:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fcfbae6, PacketNumber: 1, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:10:01 server -> Sending packet 2 (733 bytes) for connection 612118bde09f849d, Handshake 2025/04/30 11:10:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fcfbae6, PacketNumber: 2, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:10:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:10:01 server -> Sending packet 18 (1045 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:01 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:01 server Skipping packet number 17 2025/04/30 11:10:01 server -> Sending packet 19 (320 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:01 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:01 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:10:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:10:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:10:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:10:01 Tracking 37 connection IDs and 0 reset tokens. 2025/04/30 11:10:02 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:10:02 server <- Reading packet 8 (72 bytes) for connection 6fcfbae6, Handshake 2025/04/30 11:10:02 server Long Header{Type: Handshake, DestConnectionID: 6fcfbae6, SrcConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:10:02 server Dropping Initial keys. 2025/04/30 11:10:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:02 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:02 Retiring connection ID 612118bde09f849d in 5s. 2025/04/30 11:10:02 server Dropping Handshake keys. 2025/04/30 11:10:02 server <- Reading packet 9 (1148 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:02 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:02 server -> Sending packet 2 (325 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 345.923µs} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59155850, StatelessResetToken: 0xab32814b268a9e37c86252f5a7a33a97} 2025/04/30 11:10:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a4a4813f, StatelessResetToken: 0x0f3dd9ff471971c18ede3c58eba87e02} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee4485b2, StatelessResetToken: 0x6b48468d09ae0079cb065f6da394b66c} 2025/04/30 11:10:02 server -> &wire.NewTokenFrame{Token: 0x898edd6e03abcea2f4ac289cc0debc2866555d850da1ae5a0d9d95d848903a289cf6cf3431f3bf91716dc21ea87db1d3499207f5b6acc96c52a628af8a73824b289e996957127ede4dbf6e9c624d0920bc84a341800c} 2025/04/30 11:10:02 Received request: GET /abyygwoqlx 2025/04/30 11:10:02 server -> Sending packet 3 (320 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee4485b2, StatelessResetToken: 0x6b48468d09ae0079cb065f6da394b66c} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59155850, StatelessResetToken: 0xab32814b268a9e37c86252f5a7a33a97} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a4a4813f, StatelessResetToken: 0x0f3dd9ff471971c18ede3c58eba87e02} 2025/04/30 11:10:02 server -> &wire.NewTokenFrame{Token: 0x898edd6e03abcea2f4ac289cc0debc2866555d850da1ae5a0d9d95d848903a289cf6cf3431f3bf91716dc21ea87db1d3499207f5b6acc96c52a628af8a73824b289e996957127ede4dbf6e9c624d0920bc84a341800c} 2025/04/30 11:10:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:02 server -> Sending packet 4 (1366 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.PingFrame{} 2025/04/30 11:10:02 server <- Reading packet 2 (1252 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.PingFrame{} 2025/04/30 11:10:02 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:02 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:02 server Queueing ACK because packet 2 was missing before. 2025/04/30 11:10:02 server -> Sending packet 5 (1053 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 2, Smallest: 2}}, DelayTime: 696.253µs} 2025/04/30 11:10:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:10:02 server -> Sending packet 23 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:02 server Skipping packet number 22 2025/04/30 11:10:02 server -> Sending packet 24 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:02 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:02 server -> Sending packet 7 (320 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59155850, StatelessResetToken: 0xab32814b268a9e37c86252f5a7a33a97} 2025/04/30 11:10:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:02 server -> &wire.NewTokenFrame{Token: 0x898edd6e03abcea2f4ac289cc0debc2866555d850da1ae5a0d9d95d848903a289cf6cf3431f3bf91716dc21ea87db1d3499207f5b6acc96c52a628af8a73824b289e996957127ede4dbf6e9c624d0920bc84a341800c} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee4485b2, StatelessResetToken: 0x6b48468d09ae0079cb065f6da394b66c} 2025/04/30 11:10:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a4a4813f, StatelessResetToken: 0x0f3dd9ff471971c18ede3c58eba87e02} 2025/04/30 11:10:02 server Skipping packet number 6 2025/04/30 11:10:02 server -> Sending packet 8 (1045 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:02 server <- Reading packet 11 (37 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:10:02 server newly acked packets (1): [7] 2025/04/30 11:10:02 server updated RTT: 31.285925ms (σ: 15.642962ms) 2025/04/30 11:10:02 server ECN capability confirmed. 2025/04/30 11:10:02 server lost packet 4 (time threshold) 2025/04/30 11:10:02 server -> Sending packet 9 (1323 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.PingFrame{} 2025/04/30 11:10:02 Removing connection IDs [563fc169 8bcacdb2 e99d49c6 8092203e] for a closed connection after it has been retired. 2025/04/30 11:10:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:02 server -> Sending packet 11 (1045 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:02 server -> Sending packet 12 (1045 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:02 server <- Reading packet 13 (39 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:10:02 server <- Reading packet 14 (40 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:10:02 server newly acked packets (1): [12] 2025/04/30 11:10:02 server updated RTT: 31.443ms (σ: 12.048ms) 2025/04/30 11:10:02 server lost packet 9 (time threshold) 2025/04/30 11:10:02 server Canceling loss detection timer. 2025/04/30 11:10:02 server -> Sending packet 13 (1301 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.PingFrame{} 2025/04/30 11:10:02 server -> Sending packet 14 (22 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:02 server <- Reading packet 15 (40 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 15, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:10:02 server newly acked packets (1): [13] 2025/04/30 11:10:02 server updated RTT: 31.516ms (σ: 9.182ms) 2025/04/30 11:10:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:02 server -> Sending packet 16 (22 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:02 server -> Sending packet 17 (22 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:02 server <- Reading packet 16 (41 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 16, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.AckFrame{LargestAcked: 16, LowestAcked: 0, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 13, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:10:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:02 server -> Sending packet 19 (22 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:02 server -> Sending packet 20 (22 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:02 server -> Sending packet 21 (1376 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.PingFrame{} 2025/04/30 11:10:02 server <- Reading packet 17 (43 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 17, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.AckFrame{LargestAcked: 19, LowestAcked: 0, AckRanges: {{Largest: 19, Smallest: 19}, {Largest: 16, Smallest: 16}, {Largest: 13, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:10:02 server <- Reading packet 18 (45 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:02 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 18, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:02 server <- &wire.AckFrame{LargestAcked: 21, LowestAcked: 0, AckRanges: {{Largest: 21, Smallest: 21}, {Largest: 19, Smallest: 19}, {Largest: 16, Smallest: 16}, {Largest: 13, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 11:10:02 server newly acked packets (1): [21] 2025/04/30 11:10:02 server updated RTT: 31.561ms (σ: 6.976ms) 2025/04/30 11:10:02 server setting loss timer for packet 20 (1-RTT) to 35.862226ms (in 2025-04-30 11:10:02.960713713 +0000 UTC m=+57.050274825) 2025/04/30 11:10:02 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:10:02.960713713 +0000 UTC m=+57.050274825 2025/04/30 11:10:02 server lost packet 20 (time threshold) 2025/04/30 11:10:02 server Canceling loss detection timer. 2025/04/30 11:10:02 server -> Sending packet 22 (22 bytes) for connection 612118bde09f849d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:02 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:03 server <- Reading packet 19 (46 bytes) for connection 6fcfbae6, 1-RTT 2025/04/30 11:10:03 server Short Header{DestConnectionID: 6fcfbae6, PacketNumber: 19, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:03 server <- &wire.AckFrame{LargestAcked: 22, LowestAcked: 0, AckRanges: {{Largest: 22, Smallest: 21}, {Largest: 19, Smallest: 19}, {Largest: 16, Smallest: 16}, {Largest: 13, Smallest: 11}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.088ms, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 11:10:03 server newly acked packets (1): [22] 2025/04/30 11:10:03 server updated RTT: 34.611ms (σ: 11.332ms) 2025/04/30 11:10:03 server Canceling loss detection timer. 2025/04/30 11:10:03 Removing connection ID 014df16c5ae7ba23 after it has been retired. 2025/04/30 11:10:03 Removing connection IDs [61bf3485 adad3b7e ce766aac d69f9d53] for a closed connection after it has been retired. 2025/04/30 11:10:03 server Destroying connection: timeout: no recent network activity 2025/04/30 11:10:03 Error accepting stream: timeout: no recent network activity 2025/04/30 11:10:03 Removing connection ID 578551c2. 2025/04/30 11:10:03 Removing connection ID b58fb1c6. 2025/04/30 11:10:03 Removing connection ID 4edc1e98. 2025/04/30 11:10:03 Removing connection ID 879a187c. 2025/04/30 11:10:03 server Connection a2d2ecf9ac29600b closed. 2025/04/30 11:10:03 Removing connection ID 5412330b0aa0b20f after it has been retired. 2025/04/30 11:10:03 Removing connection IDs [a75e25be 107618a4 b35717e8 8ccdd632] for a closed connection after it has been retired. 2025/04/30 11:10:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:10:03 server -> Sending packet 21 (1045 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:03 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:03 server Skipping packet number 20 2025/04/30 11:10:03 server -> Sending packet 22 (320 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:03 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:10:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:10:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:10:03 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:10:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:10:03 server -> Sending packet 26 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:03 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:03 server Skipping packet number 25 2025/04/30 11:10:03 server -> Sending packet 27 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:03 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:03 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:03 Tracking 19 connection IDs and 0 reset tokens. 2025/04/30 11:10:04 Removing connection ID ed89eefc80508e4d after it has been retired. 2025/04/30 11:10:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:10:04 server -> Sending packet 28 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:04 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:04 server -> Sending packet 29 (22 bytes) for connection d3064b9f30a77229, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:04 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:05 Removing connection ID 9c508371686e4651 after it has been retired. 2025/04/30 11:10:05 Tracking 17 connection IDs and 0 reset tokens. 2025/04/30 11:10:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:10:06 server -> Sending packet 29 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:06 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:06 server Skipping packet number 28 2025/04/30 11:10:06 server -> Sending packet 30 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:06 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:06 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:07 Removing connection ID 612118bde09f849d after it has been retired. 2025/04/30 11:10:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:10:07 server -> Sending packet 24 (1045 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:07 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:07 server Skipping packet number 23 2025/04/30 11:10:07 server -> Sending packet 25 (320 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:07 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:10:07 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:10:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:10:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:10:07 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:10:09 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:10:11 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:10:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:10:13 server -> Sending packet 32 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:13 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:13 server Skipping packet number 31 2025/04/30 11:10:13 server -> Sending packet 33 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:13 server Short Header{DestConnectionID: (empty), PacketNumber: 33, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:13 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:13 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:10:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:10:15 server -> Sending packet 27 (1045 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:15 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:15 server Skipping packet number 26 2025/04/30 11:10:15 server -> Sending packet 28 (320 bytes) for connection ed89eefc80508e4d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:15 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3ead052f, StatelessResetToken: 0x365efd298e6673e5356a4014280deec5} 2025/04/30 11:10:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a7f3af3f, StatelessResetToken: 0x2446ab2d9302ab9d821627c0841dcb34} 2025/04/30 11:10:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c9a24e2, StatelessResetToken: 0x67e6b0a6bb8af5511d8f170f8f0a2d1b} 2025/04/30 11:10:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:15 server -> &wire.NewTokenFrame{Token: 0xf13533c593053959830d61411f81bd7c001e799d33a4731d4111de88f360c28a81b722e78a724cbef4d0b71738de9ac94fb6dcce1825f52e0d5833dd566d77b2cf14e185551860c81eb390e7ac76af8a7d9237c49728} 2025/04/30 11:10:15 Tracking 16 connection IDs and 0 reset tokens. 2025/04/30 11:10:16 server Destroying connection: timeout: no recent network activity 2025/04/30 11:10:16 Error accepting stream: timeout: no recent network activity 2025/04/30 11:10:16 Removing connection ID 1439714e. 2025/04/30 11:10:16 Removing connection ID 4b6db297. 2025/04/30 11:10:16 Removing connection ID ba117e93. 2025/04/30 11:10:16 Removing connection ID a435093e. 2025/04/30 11:10:16 server Connection d3064b9f30a77229 closed. 2025/04/30 11:10:17 server <- Received Initial packet. 2025/04/30 11:10:17 Created qlog file: /logs/qlog/928b1bf23813d98d.sqlog 2025/04/30 11:10:17 server Changing connection ID to e068cea2. 2025/04/30 11:10:17 Adding connection IDs 928b1bf23813d98d and e068cea2 for a new connection. 2025/04/30 11:10:17 server <- Reading packet 0 (1220 bytes) for connection 928b1bf23813d98d, Initial 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: 928b1bf23813d98d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:17 Adding connection ID 9a6bd40d. 2025/04/30 11:10:17 Adding connection ID df36060c. 2025/04/30 11:10:17 Adding connection ID cd20f445. 2025/04/30 11:10:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 928b1bf23813d98d 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e068cea2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 438, Version: v1} 2025/04/30 11:10:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e068cea2, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:10:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df36060c, StatelessResetToken: 0x6999c1f9910fedcabaa98f33a967393c} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cd20f445, StatelessResetToken: 0x6756a133fcca1b40b90eed16b938257d} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9a6bd40d, StatelessResetToken: 0xac448e6df9376285f18f46a134fef157} 2025/04/30 11:10:17 server <- Reading packet 1 (77 bytes) for connection e068cea2, Handshake 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: e068cea2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:10:17 server Dropping Initial keys. 2025/04/30 11:10:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:10:17 server newly acked packets (1): [0] 2025/04/30 11:10:17 server updated RTT: 32.531669ms (σ: 16.265834ms) 2025/04/30 11:10:17 server Canceling loss detection timer. 2025/04/30 11:10:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:17 Retiring connection ID 928b1bf23813d98d in 5s. 2025/04/30 11:10:17 server Dropping Handshake keys. 2025/04/30 11:10:17 server -> Sending packet 1 (251 bytes) for connection 928b1bf23813d98d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:17 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:17 server -> &wire.NewTokenFrame{Token: 0x69deda6a84eb27fd0096f93c1cff13c6b3e497f44dd50af792c33d0dda19c55504af73d4e6b674c0e3095ea2fa50351895d640155e0556e9d043db44cd85c49b5e9c61a220882ded79ea907d4a9d51156c154bec8fa6} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:17 server <- Reading packet 2 (1252 bytes) for connection e068cea2, 1-RTT 2025/04/30 11:10:17 server Short Header{DestConnectionID: e068cea2, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:17 server <- &wire.PingFrame{} 2025/04/30 11:10:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:17 server newly acked packets (1): [0] 2025/04/30 11:10:17 server updated RTT: 32.656ms (σ: 12.449ms) 2025/04/30 11:10:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:17 server -> Sending packet 2 (24 bytes) for connection 928b1bf23813d98d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:17 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 106.348µs} 2025/04/30 11:10:17 Received request: GET /hkgzhwwjeo 2025/04/30 11:10:17 server -> Sending packet 3 (1045 bytes) for connection 928b1bf23813d98d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:17 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:17 server <- Reading packet 3 (1332 bytes) for connection e068cea2, 1-RTT 2025/04/30 11:10:17 server Short Header{DestConnectionID: e068cea2, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:17 server <- &wire.PingFrame{} 2025/04/30 11:10:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:17 server <- Reading packet 4 (36 bytes) for connection e068cea2, 1-RTT 2025/04/30 11:10:17 server Short Header{DestConnectionID: e068cea2, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:10:17 server newly acked packets (1): [3] 2025/04/30 11:10:17 server updated RTT: 32.537ms (σ: 9.573ms) 2025/04/30 11:10:17 server ECN capability confirmed. 2025/04/30 11:10:17 server setting loss timer for packet 1 (1-RTT) to 36.604125ms (in 2025-04-30 11:10:17.232321126 +0000 UTC m=+71.321882239) 2025/04/30 11:10:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:10:17 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:10:17 Replacing connection for connection IDs [e068cea2 9a6bd40d df36060c cd20f445] with a closed connection. 2025/04/30 11:10:17 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:10:17 server Connection 928b1bf23813d98d closed. 2025/04/30 11:10:17 server <- Received Initial packet. 2025/04/30 11:10:17 Created qlog file: /logs/qlog/7840d16c5aadf8b8.sqlog 2025/04/30 11:10:17 server Changing connection ID to af684d04. 2025/04/30 11:10:17 Adding connection IDs 7840d16c5aadf8b8 and af684d04 for a new connection. 2025/04/30 11:10:17 server <- Reading packet 0 (1220 bytes) for connection 7840d16c5aadf8b8, Initial 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: 7840d16c5aadf8b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:17 Adding connection ID 8eff1cd1. 2025/04/30 11:10:17 Adding connection ID 95076b0b. 2025/04/30 11:10:17 Adding connection ID c37849eb. 2025/04/30 11:10:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7840d16c5aadf8b8 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af684d04, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:10:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af684d04, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:10:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 95076b0b, StatelessResetToken: 0x85e52bbfb7244e23e8d1a81fc6dbf54e} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c37849eb, StatelessResetToken: 0xf8e13222a1e176c3388895a06a2e329f} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8eff1cd1, StatelessResetToken: 0xc08c17dd665154aac81d7557d071136d} 2025/04/30 11:10:17 server <- Reading packet 1 (1220 bytes) for connection 7840d16c5aadf8b8, Initial 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: 7840d16c5aadf8b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:17 server <- &wire.PingFrame{} 2025/04/30 11:10:17 server -> Sending packet 1 (37 bytes) for connection 7840d16c5aadf8b8, Initial 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af684d04, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:10:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:10:17 server -> Sending packet 2 (1280 bytes) for connection 7840d16c5aadf8b8, Initial 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af684d04, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:17 server -> Sending packet 3 (1280 bytes) for connection 7840d16c5aadf8b8, Initial 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: af684d04, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:17 server <- Reading packet 2 (1220 bytes) for connection af684d04, Initial 2025/04/30 11:10:17 server Long Header{Type: Initial, DestConnectionID: af684d04, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:10:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:10:17 server newly acked packets (1): [3] 2025/04/30 11:10:17 server updated RTT: 33.643927ms (σ: 16.821963ms) 2025/04/30 11:10:17 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:10:17 server -> Sending packet 1 (743 bytes) for connection 7840d16c5aadf8b8, Handshake 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af684d04, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:10:17 server -> Sending packet 2 (743 bytes) for connection 7840d16c5aadf8b8, Handshake 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af684d04, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:10:17 server <- Reading packet 3 (1220 bytes) for connection af684d04, Handshake 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: af684d04, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:10:17 server Dropping Initial keys. 2025/04/30 11:10:17 server <- &wire.PingFrame{} 2025/04/30 11:10:17 server -> Sending packet 3 (36 bytes) for connection 7840d16c5aadf8b8, Handshake 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: af684d04, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:10:17 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:10:17 server <- Reading packet 6 (38 bytes) for connection af684d04, Handshake 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: af684d04, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 25, Version: v1} 2025/04/30 11:10:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 504µs} 2025/04/30 11:10:17 server newly acked packets (1): [2] 2025/04/30 11:10:17 server Canceling loss detection timer. 2025/04/30 11:10:17 Tracking 22 connection IDs and 0 reset tokens. 2025/04/30 11:10:17 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:10:17 server <- Reading packet 7 (72 bytes) for connection af684d04, Handshake 2025/04/30 11:10:17 server Long Header{Type: Handshake, DestConnectionID: af684d04, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:10:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:17 Retiring connection ID 7840d16c5aadf8b8 in 5s. 2025/04/30 11:10:17 server Dropping Handshake keys. 2025/04/30 11:10:17 server <- Reading packet 8 (1148 bytes) for connection af684d04, 1-RTT 2025/04/30 11:10:17 server Short Header{DestConnectionID: af684d04, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:17 Received request: GET /tevlgzyfbk 2025/04/30 11:10:17 server -> Sending packet 2 (328 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:17 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 365.078µs} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 95076b0b, StatelessResetToken: 0x85e52bbfb7244e23e8d1a81fc6dbf54e} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8eff1cd1, StatelessResetToken: 0xc08c17dd665154aac81d7557d071136d} 2025/04/30 11:10:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c37849eb, StatelessResetToken: 0xf8e13222a1e176c3388895a06a2e329f} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:17 server -> &wire.NewTokenFrame{Token: 0xaef050f38a9e0d20aa85b994ae3c3f8abfa9f2a6c5d16ef065391baf83e481e8d54df742e098987ea1f525b6dd92c41db38c494cea18a04c5b7d4555e81d264293ab80c3675ca8b878deb3b79fa257bee3c71254d2ae} 2025/04/30 11:10:17 server -> Sending packet 3 (1280 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:17 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c37849eb, StatelessResetToken: 0xf8e13222a1e176c3388895a06a2e329f} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8eff1cd1, StatelessResetToken: 0xc08c17dd665154aac81d7557d071136d} 2025/04/30 11:10:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:17 server -> &wire.NewTokenFrame{Token: 0xaef050f38a9e0d20aa85b994ae3c3f8abfa9f2a6c5d16ef065391baf83e481e8d54df742e098987ea1f525b6dd92c41db38c494cea18a04c5b7d4555e81d264293ab80c3675ca8b878deb3b79fa257bee3c71254d2ae} 2025/04/30 11:10:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 95076b0b, StatelessResetToken: 0x85e52bbfb7244e23e8d1a81fc6dbf54e} 2025/04/30 11:10:17 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 955, Offset + Data length: 955} 2025/04/30 11:10:17 server -> Sending packet 4 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:17 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:17 server <- Reading packet 9 (44 bytes) for connection af684d04, 1-RTT 2025/04/30 11:10:17 server Short Header{DestConnectionID: af684d04, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:10:17 server newly acked packets (1): [3] 2025/04/30 11:10:17 server updated RTT: 33.475ms (σ: 12.951ms) 2025/04/30 11:10:17 server ECN capability confirmed. 2025/04/30 11:10:17 server <- &wire.MaxDataFrame{MaximumData: 16778171} 2025/04/30 11:10:17 server <- &wire.MaxStreamDataFrame{StreamID: 0, MaximumStreamData: 66491} 2025/04/30 11:10:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:18 server Sending ACK because the ACK timer expired. 2025/04/30 11:10:18 server -> Sending packet 5 (25 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 8, DelayTime: 25.344932ms} 2025/04/30 11:10:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:18 server -> Sending packet 7 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:18 server -> Sending packet 8 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:18 server <- Reading packet 10 (1220 bytes) for connection af684d04, 1-RTT 2025/04/30 11:10:18 server Short Header{DestConnectionID: af684d04, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:18 server <- &wire.MaxDataFrame{MaximumData: 16778171} 2025/04/30 11:10:18 server <- &wire.PingFrame{} 2025/04/30 11:10:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:18 server <- Reading packet 11 (1252 bytes) for connection af684d04, 1-RTT 2025/04/30 11:10:18 server Short Header{DestConnectionID: af684d04, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:18 server <- &wire.PingFrame{} 2025/04/30 11:10:18 server <- &wire.MaxStreamDataFrame{StreamID: 0, MaximumStreamData: 66491} 2025/04/30 11:10:18 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:10:18 server -> Sending packet 9 (24 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 8, DelayTime: 96.59µs} 2025/04/30 11:10:18 server <- Reading packet 12 (40 bytes) for connection af684d04, 1-RTT 2025/04/30 11:10:18 server Short Header{DestConnectionID: af684d04, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:18 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:10:18 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:10:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:18 server -> Sending packet 10 (1366 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.PingFrame{} 2025/04/30 11:10:18 server Sending ACK because the ACK timer expired. 2025/04/30 11:10:18 server -> Sending packet 11 (25 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 8, DelayTime: 25.348398ms} 2025/04/30 11:10:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:18 server -> Sending packet 13 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:18 server -> Sending packet 14 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:18 server <- Received Initial packet. 2025/04/30 11:10:18 Created qlog file: /logs/qlog/1c6eb1823aa8d8eb.sqlog 2025/04/30 11:10:18 server Changing connection ID to c4186bc7. 2025/04/30 11:10:18 Adding connection IDs 1c6eb1823aa8d8eb and c4186bc7 for a new connection. 2025/04/30 11:10:18 server <- Reading packet 0 (1220 bytes) for connection 1c6eb1823aa8d8eb, Initial 2025/04/30 11:10:18 server Long Header{Type: Initial, DestConnectionID: 1c6eb1823aa8d8eb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:18 Adding connection ID 246ce162. 2025/04/30 11:10:18 Adding connection ID adfc7f94. 2025/04/30 11:10:18 Adding connection ID eb6884b3. 2025/04/30 11:10:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1c6eb1823aa8d8eb 2025/04/30 11:10:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c4186bc7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:10:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c4186bc7, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:10:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eb6884b3, StatelessResetToken: 0x598b3a9a9a7e6e3cff913ed8151840c1} 2025/04/30 11:10:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: adfc7f94, StatelessResetToken: 0x29fe05a1fdea2a796737fa094207290a} 2025/04/30 11:10:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 246ce162, StatelessResetToken: 0x1646d30a73536ab637dd899a38580f32} 2025/04/30 11:10:18 server <- Reading packet 1 (77 bytes) for connection c4186bc7, Handshake 2025/04/30 11:10:18 server Long Header{Type: Handshake, DestConnectionID: c4186bc7, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:10:18 server Dropping Initial keys. 2025/04/30 11:10:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:10:18 server newly acked packets (1): [0] 2025/04/30 11:10:18 server updated RTT: 32.435181ms (σ: 16.21759ms) 2025/04/30 11:10:18 server Canceling loss detection timer. 2025/04/30 11:10:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:18 Retiring connection ID 1c6eb1823aa8d8eb in 5s. 2025/04/30 11:10:18 server Dropping Handshake keys. 2025/04/30 11:10:18 server -> Sending packet 1 (251 bytes) for connection 1c6eb1823aa8d8eb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.NewTokenFrame{Token: 0xb0e06e52e5c6c2bd81cb3e9a6fbe592d51587033fdb43ce7261f8a97dab04787d5ff7caee22c115010bc42bcda53a7ad93d7e7ad195b81b81ffd1c220067a8e748e8185c29499ea36359f8e78004cecc671ebf45611e} 2025/04/30 11:10:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:18 server <- Reading packet 2 (1252 bytes) for connection c4186bc7, 1-RTT 2025/04/30 11:10:18 server Short Header{DestConnectionID: c4186bc7, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:18 server <- &wire.PingFrame{} 2025/04/30 11:10:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:18 server newly acked packets (1): [0] 2025/04/30 11:10:18 server updated RTT: 32.557ms (σ: 12.408ms) 2025/04/30 11:10:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:18 server -> Sending packet 2 (24 bytes) for connection 1c6eb1823aa8d8eb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 113.19µs} 2025/04/30 11:10:18 Received request: GET /ndikwyoegf 2025/04/30 11:10:18 server -> Sending packet 3 (1045 bytes) for connection 1c6eb1823aa8d8eb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:18 server -> Sending packet 5 (251 bytes) for connection 1c6eb1823aa8d8eb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:18 server -> &wire.NewTokenFrame{Token: 0xb0e06e52e5c6c2bd81cb3e9a6fbe592d51587033fdb43ce7261f8a97dab04787d5ff7caee22c115010bc42bcda53a7ad93d7e7ad195b81b81ffd1c220067a8e748e8185c29499ea36359f8e78004cecc671ebf45611e} 2025/04/30 11:10:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:18 server Skipping packet number 4 2025/04/30 11:10:18 server -> Sending packet 6 (1045 bytes) for connection 1c6eb1823aa8d8eb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:18 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:10:18 server Dropping %!s(logging.PacketType=1) packet (72 bytes) because we already dropped the keys. 2025/04/30 11:10:18 server <- Reading packet 4 (1148 bytes) for connection c4186bc7, 1-RTT 2025/04/30 11:10:18 server Short Header{DestConnectionID: c4186bc7, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:10:18 server -> Sending packet 7 (26 bytes) for connection 1c6eb1823aa8d8eb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 89.416µs} 2025/04/30 11:10:18 server <- Reading packet 6 (1332 bytes) for connection c4186bc7, 1-RTT 2025/04/30 11:10:18 server Short Header{DestConnectionID: c4186bc7, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:18 server <- &wire.PingFrame{} 2025/04/30 11:10:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:10:18 server -> Sending packet 8 (28 bytes) for connection 1c6eb1823aa8d8eb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 180.497µs} 2025/04/30 11:10:18 server <- Reading packet 7 (36 bytes) for connection c4186bc7, 1-RTT 2025/04/30 11:10:18 server Short Header{DestConnectionID: c4186bc7, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:18 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:10:18 server newly acked packets (2): [5 6] 2025/04/30 11:10:18 server ECN capability confirmed. 2025/04/30 11:10:18 server Canceling loss detection timer. 2025/04/30 11:10:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:10:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:10:18 Replacing connection for connection IDs [eb6884b3 c4186bc7 246ce162 adfc7f94] with a closed connection. 2025/04/30 11:10:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:10:18 server Connection 1c6eb1823aa8d8eb closed. 2025/04/30 11:10:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:10:18 server -> Sending packet 16 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:18 server -> Sending packet 17 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:18 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:19 server <- Received Initial packet. 2025/04/30 11:10:19 Created qlog file: /logs/qlog/0f96bcbc838c0583.sqlog 2025/04/30 11:10:19 server Changing connection ID to 9f98c162. 2025/04/30 11:10:19 Adding connection IDs 0f96bcbc838c0583 and 9f98c162 for a new connection. 2025/04/30 11:10:19 server <- Reading packet 1 (1220 bytes) for connection 0f96bcbc838c0583, Initial 2025/04/30 11:10:19 server Long Header{Type: Initial, DestConnectionID: 0f96bcbc838c0583, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:19 Adding connection ID fcb747f6. 2025/04/30 11:10:19 Adding connection ID 1b042516. 2025/04/30 11:10:19 Adding connection ID a45a993d. 2025/04/30 11:10:19 server <- &wire.PingFrame{} 2025/04/30 11:10:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0f96bcbc838c0583 2025/04/30 11:10:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9f98c162, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 443, Version: v1} 2025/04/30 11:10:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:10:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9f98c162, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:10:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fcb747f6, StatelessResetToken: 0x938d080cd4c88f60c685e2988eef2d33} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a45a993d, StatelessResetToken: 0xe10c079b459177359484c82fb024e570} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1b042516, StatelessResetToken: 0xd06e52fb4296da47e0e80c5258c4f94a} 2025/04/30 11:10:19 server <- Reading packet 2 (77 bytes) for connection 9f98c162, Handshake 2025/04/30 11:10:19 server Long Header{Type: Handshake, DestConnectionID: 9f98c162, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:10:19 server Dropping Initial keys. 2025/04/30 11:10:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:10:19 server newly acked packets (1): [0] 2025/04/30 11:10:19 server updated RTT: 32.529886ms (σ: 16.264943ms) 2025/04/30 11:10:19 server Canceling loss detection timer. 2025/04/30 11:10:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:19 Retiring connection ID 0f96bcbc838c0583 in 5s. 2025/04/30 11:10:19 server Dropping Handshake keys. 2025/04/30 11:10:19 server -> Sending packet 1 (251 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.NewTokenFrame{Token: 0x634a034a484609790dec3aa02c6e53c79c4137b433f6a6611d6fc7d5df3a52dce00bc2eb480e53b637b5cb1f7bdea3bc261a3973140447bc1658940c555e4ffd9feeb1aa0bcac79d2fc14214fcc08fa4ca784280af18} 2025/04/30 11:10:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:19 server -> Sending packet 3 (91 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fcb747f6, StatelessResetToken: 0x938d080cd4c88f60c685e2988eef2d33} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a45a993d, StatelessResetToken: 0xe10c079b459177359484c82fb024e570} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1b042516, StatelessResetToken: 0xd06e52fb4296da47e0e80c5258c4f94a} 2025/04/30 11:10:19 server Skipping packet number 2 2025/04/30 11:10:19 server -> Sending packet 4 (251 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:19 server -> &wire.NewTokenFrame{Token: 0x634a034a484609790dec3aa02c6e53c79c4137b433f6a6611d6fc7d5df3a52dce00bc2eb480e53b637b5cb1f7bdea3bc261a3973140447bc1658940c555e4ffd9feeb1aa0bcac79d2fc14214fcc08fa4ca784280af18} 2025/04/30 11:10:19 server <- Reading packet 6 (35 bytes) for connection 9f98c162, 1-RTT 2025/04/30 11:10:19 server Short Header{DestConnectionID: 9f98c162, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:10:19 server newly acked packets (1): [4] 2025/04/30 11:10:19 server updated RTT: 32.365ms (σ: 12.526ms) 2025/04/30 11:10:19 server ECN capability confirmed. 2025/04/30 11:10:19 server setting loss timer for packet 3 (1-RTT) to 36.410625ms (in 2025-04-30 11:10:19.286946166 +0000 UTC m=+73.376507278) 2025/04/30 11:10:19 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:10:19.286946166 +0000 UTC m=+73.376507278 2025/04/30 11:10:19 server lost packet 3 (time threshold) 2025/04/30 11:10:19 server Canceling loss detection timer. 2025/04/30 11:10:19 server -> Sending packet 5 (91 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a45a993d, StatelessResetToken: 0xe10c079b459177359484c82fb024e570} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1b042516, StatelessResetToken: 0xd06e52fb4296da47e0e80c5258c4f94a} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fcb747f6, StatelessResetToken: 0x938d080cd4c88f60c685e2988eef2d33} 2025/04/30 11:10:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:19 server -> Sending packet 7 (91 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a45a993d, StatelessResetToken: 0xe10c079b459177359484c82fb024e570} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1b042516, StatelessResetToken: 0xd06e52fb4296da47e0e80c5258c4f94a} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fcb747f6, StatelessResetToken: 0x938d080cd4c88f60c685e2988eef2d33} 2025/04/30 11:10:19 server -> Sending packet 8 (91 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fcb747f6, StatelessResetToken: 0x938d080cd4c88f60c685e2988eef2d33} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a45a993d, StatelessResetToken: 0xe10c079b459177359484c82fb024e570} 2025/04/30 11:10:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1b042516, StatelessResetToken: 0xd06e52fb4296da47e0e80c5258c4f94a} 2025/04/30 11:10:19 server -> Sending packet 9 (1366 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.PingFrame{} 2025/04/30 11:10:19 server <- Reading packet 8 (37 bytes) for connection 9f98c162, 1-RTT 2025/04/30 11:10:19 server Short Header{DestConnectionID: 9f98c162, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:10:19 server newly acked packets (1): [8] 2025/04/30 11:10:19 server updated RTT: 32.177ms (σ: 9.768ms) 2025/04/30 11:10:19 server Canceling loss detection timer. 2025/04/30 11:10:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:10:19 server -> Sending packet 19 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:19 server -> Sending packet 20 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:19 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:19 Tracking 32 connection IDs and 0 reset tokens. 2025/04/30 11:10:21 server <- Reading packet 12 (49 bytes) for connection 9f98c162, 1-RTT 2025/04/30 11:10:21 server Short Header{DestConnectionID: 9f98c162, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:21 server -> Sending packet 10 (28 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 147.314µs} 2025/04/30 11:10:21 Received request: GET /ojtzuudqpi 2025/04/30 11:10:21 server -> Sending packet 11 (1045 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:21 server -> Sending packet 13 (1045 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:21 server -> Sending packet 14 (1045 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:21 server <- Reading packet 13 (40 bytes) for connection 9f98c162, 1-RTT 2025/04/30 11:10:21 server Short Header{DestConnectionID: 9f98c162, PacketNumber: 13, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:21 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 9, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 9}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:10:21 server newly acked packets (1): [9] 2025/04/30 11:10:21 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:10:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:21 server -> Sending packet 15 (1409 bytes) for connection 0f96bcbc838c0583, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.PingFrame{} 2025/04/30 11:10:21 server <- Reading packet 14 (28 bytes) for connection 9f98c162, 1-RTT 2025/04/30 11:10:21 server Short Header{DestConnectionID: 9f98c162, PacketNumber: 14, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:10:21 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:10:21 Replacing connection for connection IDs [9f98c162 fcb747f6 1b042516 a45a993d] with a closed connection. 2025/04/30 11:10:21 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:10:21 server Connection 0f96bcbc838c0583 closed. 2025/04/30 11:10:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:10:21 server -> Sending packet 22 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:21 server -> Sending packet 23 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:21 server <- Received Initial packet. 2025/04/30 11:10:21 Created qlog file: /logs/qlog/7176a85da05ca32c.sqlog 2025/04/30 11:10:21 server Changing connection ID to 035a63f0. 2025/04/30 11:10:21 Adding connection IDs 7176a85da05ca32c and 035a63f0 for a new connection. 2025/04/30 11:10:21 server <- Reading packet 0 (1220 bytes) for connection 7176a85da05ca32c, Initial 2025/04/30 11:10:21 server Long Header{Type: Initial, DestConnectionID: 7176a85da05ca32c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:21 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:21 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:21 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:21 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:21 Adding connection ID 4d0d393f. 2025/04/30 11:10:21 Adding connection ID b3a21841. 2025/04/30 11:10:21 Adding connection ID d62ac4d2. 2025/04/30 11:10:21 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7176a85da05ca32c 2025/04/30 11:10:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 035a63f0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 430, Version: v1} 2025/04/30 11:10:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 035a63f0, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:10:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d62ac4d2, StatelessResetToken: 0x8e57c82c771c027097b31086e85105ac} 2025/04/30 11:10:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b3a21841, StatelessResetToken: 0xad2018b564a7c71b55265db28322334f} 2025/04/30 11:10:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d0d393f, StatelessResetToken: 0x9d9a18204e70fb98d7efade32dd901af} 2025/04/30 11:10:21 server <- Reading packet 1 (77 bytes) for connection 035a63f0, Handshake 2025/04/30 11:10:21 server Long Header{Type: Handshake, DestConnectionID: 035a63f0, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:10:21 server Dropping Initial keys. 2025/04/30 11:10:21 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:10:21 server newly acked packets (1): [0] 2025/04/30 11:10:21 server updated RTT: 32.583098ms (σ: 16.291549ms) 2025/04/30 11:10:21 server Canceling loss detection timer. 2025/04/30 11:10:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:21 Retiring connection ID 7176a85da05ca32c in 5s. 2025/04/30 11:10:21 server Dropping Handshake keys. 2025/04/30 11:10:21 server -> Sending packet 1 (251 bytes) for connection 7176a85da05ca32c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:21 server -> &wire.NewTokenFrame{Token: 0x9585c1d4de3009555900e0cc69fcfa5298f724c701170579263b0303a6c6a3961aa5964f39e76e6649e099ac6d84b3dc0722814f06bfcbfcda6990899958ef088c664d6d98a4a503011e79c54ccf346ad1023648a161} 2025/04/30 11:10:21 server <- Reading packet 2 (1252 bytes) for connection 035a63f0, 1-RTT 2025/04/30 11:10:21 server Short Header{DestConnectionID: 035a63f0, PacketNumber: 2, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:21 server <- &wire.PingFrame{} 2025/04/30 11:10:21 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:21 server newly acked packets (1): [0] 2025/04/30 11:10:21 server updated RTT: 32.705ms (σ: 12.464ms) 2025/04/30 11:10:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:21 server -> Sending packet 2 (24 bytes) for connection 7176a85da05ca32c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 115.204µs} 2025/04/30 11:10:21 Received request: GET /eajnqdtsha 2025/04/30 11:10:21 server -> Sending packet 3 (1045 bytes) for connection 7176a85da05ca32c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:21 server <- Reading packet 4 (38 bytes) for connection 035a63f0, 1-RTT 2025/04/30 11:10:21 server Short Header{DestConnectionID: 035a63f0, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:21 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:10:21 server newly acked packets (2): [1 3] 2025/04/30 11:10:21 server updated RTT: 32.553ms (σ: 9.651ms) 2025/04/30 11:10:21 server ECN capability confirmed. 2025/04/30 11:10:21 server Canceling loss detection timer. 2025/04/30 11:10:21 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:10:21 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:10:21 server -> Sending packet 4 (29 bytes) for connection 7176a85da05ca32c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:21 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:21 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 138.958µs} 2025/04/30 11:10:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:21 server <- Reading packet 5 (28 bytes) for connection 035a63f0, 1-RTT 2025/04/30 11:10:21 server Short Header{DestConnectionID: 035a63f0, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:10:21 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:10:21 Replacing connection for connection IDs [035a63f0 4d0d393f b3a21841 d62ac4d2] with a closed connection. 2025/04/30 11:10:21 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:10:21 server Connection 7176a85da05ca32c closed. 2025/04/30 11:10:21 Tracking 37 connection IDs and 0 reset tokens. 2025/04/30 11:10:22 server <- Received Initial packet. 2025/04/30 11:10:22 Created qlog file: /logs/qlog/ae2221cd9703d4d5.sqlog 2025/04/30 11:10:22 server Changing connection ID to 91793232. 2025/04/30 11:10:22 Adding connection IDs ae2221cd9703d4d5 and 91793232 for a new connection. 2025/04/30 11:10:22 server <- Reading packet 1 (1220 bytes) for connection ae2221cd9703d4d5, Initial 2025/04/30 11:10:22 server Long Header{Type: Initial, DestConnectionID: ae2221cd9703d4d5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:22 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:22 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:22 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:22 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:22 Adding connection ID 16283084. 2025/04/30 11:10:22 Adding connection ID 70997a5a. 2025/04/30 11:10:22 Adding connection ID f6719128. 2025/04/30 11:10:22 server <- &wire.PingFrame{} 2025/04/30 11:10:22 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ae2221cd9703d4d5 2025/04/30 11:10:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 91793232, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:10:22 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:10:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 91793232, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:10:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 16283084, StatelessResetToken: 0x1967fadd9059f2142e6fd09887c20b75} 2025/04/30 11:10:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70997a5a, StatelessResetToken: 0xc15d65b472610b38112c2abf902dc83b} 2025/04/30 11:10:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f6719128, StatelessResetToken: 0xd3c0083158ed97908add07ede98f4236} 2025/04/30 11:10:22 Removing connection ID 928b1bf23813d98d after it has been retired. 2025/04/30 11:10:22 Removing connection IDs [e068cea2 9a6bd40d df36060c cd20f445] for a closed connection after it has been retired. 2025/04/30 11:10:22 server Parsed a coalesced packet. Part 1: 72 bytes. Remaining: 1148 bytes. 2025/04/30 11:10:22 server <- Reading packet 4 (72 bytes) for connection 91793232, Handshake 2025/04/30 11:10:22 server Long Header{Type: Handshake, DestConnectionID: 91793232, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 59, Version: v1} 2025/04/30 11:10:22 server Dropping Initial keys. 2025/04/30 11:10:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:22 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:22 Retiring connection ID ae2221cd9703d4d5 in 5s. 2025/04/30 11:10:22 server Dropping Handshake keys. 2025/04/30 11:10:22 server <- Reading packet 5 (1148 bytes) for connection 91793232, 1-RTT 2025/04/30 11:10:22 server Short Header{DestConnectionID: 91793232, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:22 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:22 server -> Sending packet 1 (1366 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.PingFrame{} 2025/04/30 11:10:22 Received request: GET /hikykkxehn 2025/04/30 11:10:22 server -> Sending packet 2 (253 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 317.34µs} 2025/04/30 11:10:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:22 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:22 server -> Sending packet 3 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:22 server -> Sending packet 5 (91 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 16283084, StatelessResetToken: 0x1967fadd9059f2142e6fd09887c20b75} 2025/04/30 11:10:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f6719128, StatelessResetToken: 0xd3c0083158ed97908add07ede98f4236} 2025/04/30 11:10:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70997a5a, StatelessResetToken: 0xc15d65b472610b38112c2abf902dc83b} 2025/04/30 11:10:22 server Skipping packet number 4 2025/04/30 11:10:22 server -> Sending packet 6 (248 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:22 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:22 server <- Reading packet 7 (35 bytes) for connection 91793232, 1-RTT 2025/04/30 11:10:22 server Short Header{DestConnectionID: 91793232, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:22 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:10:22 server newly acked packets (2): [1 5] 2025/04/30 11:10:22 server updated RTT: 31.011808ms (σ: 15.505904ms) 2025/04/30 11:10:22 server ECN capability confirmed. 2025/04/30 11:10:22 server lost packet 3 (time threshold) 2025/04/30 11:10:22 server -> Sending packet 7 (1409 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.PingFrame{} 2025/04/30 11:10:22 server -> Sending packet 8 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:22 server -> Sending packet 10 (248 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:22 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:22 server Skipping packet number 9 2025/04/30 11:10:22 server -> Sending packet 11 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:22 server -> Sending packet 13 (248 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:22 server Skipping packet number 12 2025/04/30 11:10:22 server -> Sending packet 14 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:22 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:22 Removing connection ID 7840d16c5aadf8b8 after it has been retired. 2025/04/30 11:10:23 server <- Received Initial packet. 2025/04/30 11:10:23 Created qlog file: /logs/qlog/4f22712dc4efb85e.sqlog 2025/04/30 11:10:23 server Changing connection ID to fc88c454. 2025/04/30 11:10:23 Adding connection IDs 4f22712dc4efb85e and fc88c454 for a new connection. 2025/04/30 11:10:23 server <- Reading packet 1 (1220 bytes) for connection 4f22712dc4efb85e, Initial 2025/04/30 11:10:23 server Long Header{Type: Initial, DestConnectionID: 4f22712dc4efb85e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:23 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:23 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:23 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:23 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:23 Adding connection ID fb350d12. 2025/04/30 11:10:23 Adding connection ID 3cff23fc. 2025/04/30 11:10:23 Adding connection ID f7696975. 2025/04/30 11:10:23 server <- &wire.PingFrame{} 2025/04/30 11:10:23 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4f22712dc4efb85e 2025/04/30 11:10:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fc88c454, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 443, Version: v1} 2025/04/30 11:10:23 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:10:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:23 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fc88c454, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:10:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fb350d12, StatelessResetToken: 0x19651e5adc57df94338499109979995d} 2025/04/30 11:10:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3cff23fc, StatelessResetToken: 0x920a852b7ae6d7117ac372e367e0ee02} 2025/04/30 11:10:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f7696975, StatelessResetToken: 0xbed1ce149e8963c745a1e93dee4ca31e} 2025/04/30 11:10:23 server <- Reading packet 2 (77 bytes) for connection fc88c454, Handshake 2025/04/30 11:10:23 server Long Header{Type: Handshake, DestConnectionID: fc88c454, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:10:23 server Dropping Initial keys. 2025/04/30 11:10:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 8µs} 2025/04/30 11:10:23 server newly acked packets (1): [0] 2025/04/30 11:10:23 server updated RTT: 32.614707ms (σ: 16.307353ms) 2025/04/30 11:10:23 server Canceling loss detection timer. 2025/04/30 11:10:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:23 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:23 Retiring connection ID 4f22712dc4efb85e in 5s. 2025/04/30 11:10:23 server Dropping Handshake keys. 2025/04/30 11:10:23 server -> Sending packet 1 (251 bytes) for connection 4f22712dc4efb85e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.NewTokenFrame{Token: 0x9d6a26188e1c7ee61c4cd4435f9c2e1fa108070024bf84546fe407f4965b1ed04a1862a89137bae147b2b83f0bd3b9d66d68e1c6f25ba05607ada538db8a9fddead6dec2aff14273e7b6adf6ea130c8abdfe44947018} 2025/04/30 11:10:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:23 server <- Reading packet 3 (1252 bytes) for connection fc88c454, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: fc88c454, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.PingFrame{} 2025/04/30 11:10:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:23 server newly acked packets (1): [0] 2025/04/30 11:10:23 server updated RTT: 32.734ms (σ: 12.47ms) 2025/04/30 11:10:23 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:23 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:23 server -> Sending packet 2 (24 bytes) for connection 4f22712dc4efb85e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 123.549µs} 2025/04/30 11:10:23 Received request: GET /uaarixbmkd 2025/04/30 11:10:23 server -> Sending packet 3 (1045 bytes) for connection 4f22712dc4efb85e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:23 server <- Reading packet 4 (1332 bytes) for connection fc88c454, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: fc88c454, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.PingFrame{} 2025/04/30 11:10:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:23 server Sending ACK because the ACK timer expired. 2025/04/30 11:10:23 server -> Sending packet 4 (25 bytes) for connection 4f22712dc4efb85e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.377948ms} 2025/04/30 11:10:23 server <- Reading packet 6 (1412 bytes) for connection fc88c454, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: fc88c454, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.PingFrame{} 2025/04/30 11:10:23 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:10:23 server -> Sending packet 5 (26 bytes) for connection 4f22712dc4efb85e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 114.553µs} 2025/04/30 11:10:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:23 server -> Sending packet 7 (251 bytes) for connection 4f22712dc4efb85e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.NewTokenFrame{Token: 0x9d6a26188e1c7ee61c4cd4435f9c2e1fa108070024bf84546fe407f4965b1ed04a1862a89137bae147b2b83f0bd3b9d66d68e1c6f25ba05607ada538db8a9fddead6dec2aff14273e7b6adf6ea130c8abdfe44947018} 2025/04/30 11:10:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:23 server Skipping packet number 6 2025/04/30 11:10:23 server -> Sending packet 8 (1045 bytes) for connection 4f22712dc4efb85e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:23 server <- Reading packet 7 (1452 bytes) for connection fc88c454, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: fc88c454, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.PingFrame{} 2025/04/30 11:10:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:23 server <- Reading packet 8 (42 bytes) for connection fc88c454, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: fc88c454, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:10:23 server newly acked packets (1): [8] 2025/04/30 11:10:23 server updated RTT: 32.634ms (σ: 9.552ms) 2025/04/30 11:10:23 server ECN capability confirmed. 2025/04/30 11:10:23 server setting loss timer for packet 7 (1-RTT) to 36.71325ms (in 2025-04-30 11:10:23.20672576 +0000 UTC m=+77.296286872) 2025/04/30 11:10:23 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:10:23 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:10:23 server -> Sending packet 9 (29 bytes) for connection 4f22712dc4efb85e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 146.513µs} 2025/04/30 11:10:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:10:23 server <- Reading packet 9 (28 bytes) for connection fc88c454, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: fc88c454, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:10:23 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:10:23 Replacing connection for connection IDs [fc88c454 fb350d12 3cff23fc f7696975] with a closed connection. 2025/04/30 11:10:23 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:10:23 server Connection 4f22712dc4efb85e closed. 2025/04/30 11:10:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:10:23 server -> Sending packet 16 (248 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:23 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:23 server Skipping packet number 15 2025/04/30 11:10:23 server -> Sending packet 17 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:23 Removing connection ID 1c6eb1823aa8d8eb after it has been retired. 2025/04/30 11:10:23 Removing connection IDs [eb6884b3 c4186bc7 246ce162 adfc7f94] for a closed connection after it has been retired. 2025/04/30 11:10:23 server <- Received Initial packet. 2025/04/30 11:10:23 Created qlog file: /logs/qlog/4f7129336aadd6e3.sqlog 2025/04/30 11:10:23 server Changing connection ID to 2588e5cc. 2025/04/30 11:10:23 Adding connection IDs 4f7129336aadd6e3 and 2588e5cc for a new connection. 2025/04/30 11:10:23 server <- Reading packet 1 (1220 bytes) for connection 4f7129336aadd6e3, Initial 2025/04/30 11:10:23 server Long Header{Type: Initial, DestConnectionID: 4f7129336aadd6e3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:23 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:23 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:23 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:23 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:23 Adding connection ID 06b2eb17. 2025/04/30 11:10:23 Adding connection ID 16fa010b. 2025/04/30 11:10:23 Adding connection ID 4a800b8d. 2025/04/30 11:10:23 server <- &wire.PingFrame{} 2025/04/30 11:10:23 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4f7129336aadd6e3 2025/04/30 11:10:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2588e5cc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 444, Version: v1} 2025/04/30 11:10:23 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:10:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:23 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2588e5cc, PacketNumber: 0, PacketNumberLen: 2, Length: 718, Version: v1} 2025/04/30 11:10:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 696, Offset + Data length: 696} 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 06b2eb17, StatelessResetToken: 0x93bf64a90b9e84438f285866dd791cbd} 2025/04/30 11:10:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4a800b8d, StatelessResetToken: 0xa4b9dec85d35134ebd1c8e9573de2a2f} 2025/04/30 11:10:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 16fa010b, StatelessResetToken: 0x07889d12643827eaebdddb244a77f51b} 2025/04/30 11:10:23 server <- Reading packet 2 (77 bytes) for connection 2588e5cc, Handshake 2025/04/30 11:10:23 server Long Header{Type: Handshake, DestConnectionID: 2588e5cc, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:10:23 server Dropping Initial keys. 2025/04/30 11:10:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:10:23 server newly acked packets (1): [0] 2025/04/30 11:10:23 server updated RTT: 32.636006ms (σ: 16.318003ms) 2025/04/30 11:10:23 server Canceling loss detection timer. 2025/04/30 11:10:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:23 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:23 Retiring connection ID 4f7129336aadd6e3 in 5s. 2025/04/30 11:10:23 server Dropping Handshake keys. 2025/04/30 11:10:23 server -> Sending packet 1 (251 bytes) for connection 4f7129336aadd6e3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:23 server -> &wire.NewTokenFrame{Token: 0xdca973c90ebf7d569061efd8431dd0e40050688810b463174c6fc74f8a51e855b6e6ed570d1b7867cbb1aff94e681c7f808527a38897251269161ccffdd1044a3a31efddf6f38310a39370b92681b4d79e5ab9d36aca} 2025/04/30 11:10:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:23 server <- Reading packet 3 (1252 bytes) for connection 2588e5cc, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: 2588e5cc, PacketNumber: 3, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.PingFrame{} 2025/04/30 11:10:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:23 server newly acked packets (1): [0] 2025/04/30 11:10:23 server updated RTT: 32.759ms (σ: 12.485ms) 2025/04/30 11:10:23 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:23 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:23 server -> Sending packet 2 (24 bytes) for connection 4f7129336aadd6e3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 104.545µs} 2025/04/30 11:10:23 Received request: GET /undcjeohlp 2025/04/30 11:10:23 server -> Sending packet 3 (1045 bytes) for connection 4f7129336aadd6e3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:23 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:23 server <- Reading packet 4 (1332 bytes) for connection 2588e5cc, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: 2588e5cc, PacketNumber: 4, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.PingFrame{} 2025/04/30 11:10:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:23 server <- Reading packet 6 (28 bytes) for connection 2588e5cc, 1-RTT 2025/04/30 11:10:23 server Short Header{DestConnectionID: 2588e5cc, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:23 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:10:23 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:10:23 Replacing connection for connection IDs [2588e5cc 06b2eb17 16fa010b 4a800b8d] with a closed connection. 2025/04/30 11:10:23 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:10:23 server Connection 4f7129336aadd6e3 closed. 2025/04/30 11:10:23 Tracking 41 connection IDs and 0 reset tokens. 2025/04/30 11:10:24 server <- Received Initial packet. 2025/04/30 11:10:24 Created qlog file: /logs/qlog/3165f59d1f0210d6.sqlog 2025/04/30 11:10:24 server Changing connection ID to c2de3967. 2025/04/30 11:10:24 Adding connection IDs 3165f59d1f0210d6 and c2de3967 for a new connection. 2025/04/30 11:10:24 server <- Reading packet 0 (1220 bytes) for connection 3165f59d1f0210d6, Initial 2025/04/30 11:10:24 server Long Header{Type: Initial, DestConnectionID: 3165f59d1f0210d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 25s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:10:24 Adding connection ID 02712095. 2025/04/30 11:10:24 Adding connection ID d69c9b8e. 2025/04/30 11:10:24 Adding connection ID a18fea60. 2025/04/30 11:10:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3165f59d1f0210d6 2025/04/30 11:10:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c2de3967, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:10:24 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c2de3967, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a18fea60, StatelessResetToken: 0xb630ee731f4c5c3eafa3212a5dd0a5b3} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 02712095, StatelessResetToken: 0xb8965b6f787e36e248b928762df2d36c} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d69c9b8e, StatelessResetToken: 0x08af05ced231851982a5139e1181c976} 2025/04/30 11:10:24 Removing connection ID 0f96bcbc838c0583 after it has been retired. 2025/04/30 11:10:24 server <- Reading packet 1 (1220 bytes) for connection 3165f59d1f0210d6, Initial 2025/04/30 11:10:24 server Long Header{Type: Initial, DestConnectionID: 3165f59d1f0210d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:10:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 290, Offset + Data length: 290} 2025/04/30 11:10:24 server <- &wire.PingFrame{} 2025/04/30 11:10:24 server -> Sending packet 1 (37 bytes) for connection 3165f59d1f0210d6, Initial 2025/04/30 11:10:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c2de3967, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:10:24 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:10:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:10:24 server -> Sending packet 19 (248 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:24 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:24 server Skipping packet number 18 2025/04/30 11:10:24 server -> Sending packet 20 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:24 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:10:24 server -> Sending packet 2 (1280 bytes) for connection 3165f59d1f0210d6, Initial 2025/04/30 11:10:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c2de3967, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:24 server -> Sending packet 3 (1280 bytes) for connection 3165f59d1f0210d6, Initial 2025/04/30 11:10:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c2de3967, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:10:24 server <- Reading packet 2 (1220 bytes) for connection c2de3967, Initial 2025/04/30 11:10:24 server Long Header{Type: Initial, DestConnectionID: c2de3967, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1206, Version: v1} 2025/04/30 11:10:24 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:10:24 server newly acked packets (1): [3] 2025/04/30 11:10:24 server updated RTT: 33.751258ms (σ: 16.875629ms) 2025/04/30 11:10:24 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:10:24 server -> Sending packet 1 (744 bytes) for connection 3165f59d1f0210d6, Handshake 2025/04/30 11:10:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c2de3967, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:10:24 server -> Sending packet 2 (744 bytes) for connection 3165f59d1f0210d6, Handshake 2025/04/30 11:10:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c2de3967, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:10:24 server <- Reading packet 3 (1220 bytes) for connection c2de3967, Handshake 2025/04/30 11:10:24 server Long Header{Type: Handshake, DestConnectionID: c2de3967, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1207, Version: v1} 2025/04/30 11:10:24 server Dropping Initial keys. 2025/04/30 11:10:24 server <- &wire.PingFrame{} 2025/04/30 11:10:24 server -> Sending packet 3 (36 bytes) for connection 3165f59d1f0210d6, Handshake 2025/04/30 11:10:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c2de3967, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:10:24 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:10:24 server Queueing packet (1252 bytes) for later decryption 2025/04/30 11:10:24 server <- Reading packet 6 (39 bytes) for connection c2de3967, Handshake 2025/04/30 11:10:24 server Long Header{Type: Handshake, DestConnectionID: c2de3967, SrcConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 4, Length: 26, Version: v1} 2025/04/30 11:10:24 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 11:10:24 server newly acked packets (1): [2] 2025/04/30 11:10:24 server updated RTT: 36.659ms (σ: 18.473ms) 2025/04/30 11:10:24 server Canceling loss detection timer. 2025/04/30 11:10:24 server Parsed a coalesced packet. Part 1: 73 bytes. Remaining: 1147 bytes. 2025/04/30 11:10:24 server <- Reading packet 7 (73 bytes) for connection c2de3967, Handshake 2025/04/30 11:10:24 server Long Header{Type: Handshake, DestConnectionID: c2de3967, SrcConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 4, Length: 60, Version: v1} 2025/04/30 11:10:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:10:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:10:24 server <- &wire.PingFrame{} 2025/04/30 11:10:24 Retiring connection ID 3165f59d1f0210d6 in 5s. 2025/04/30 11:10:24 server Dropping Handshake keys. 2025/04/30 11:10:24 server <- Reading packet 8 (1147 bytes) for connection c2de3967, 1-RTT 2025/04/30 11:10:24 server Short Header{DestConnectionID: c2de3967, PacketNumber: 8, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:24 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:10:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:24 Received request: GET /ewqtfeeqfl 2025/04/30 11:10:24 server -> Sending packet 2 (328 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 363.295µs} 2025/04/30 11:10:24 server -> &wire.NewTokenFrame{Token: 0xf5bfc9fc60b8f81c3064c9dbdadb30e919998ef98f043f705c60a16116870907175dab34a12eb76a264c26da88e6b0535490cd7991784b5c1a4c1e074f57708335f5faae0d348569a6ca8cf4f4f901e166cbea74d2b2} 2025/04/30 11:10:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 02712095, StatelessResetToken: 0xb8965b6f787e36e248b928762df2d36c} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a18fea60, StatelessResetToken: 0xb630ee731f4c5c3eafa3212a5dd0a5b3} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d69c9b8e, StatelessResetToken: 0x08af05ced231851982a5139e1181c976} 2025/04/30 11:10:24 server -> Sending packet 3 (323 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a18fea60, StatelessResetToken: 0xb630ee731f4c5c3eafa3212a5dd0a5b3} 2025/04/30 11:10:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 02712095, StatelessResetToken: 0xb8965b6f787e36e248b928762df2d36c} 2025/04/30 11:10:24 server -> &wire.NewTokenFrame{Token: 0xf5bfc9fc60b8f81c3064c9dbdadb30e919998ef98f043f705c60a16116870907175dab34a12eb76a264c26da88e6b0535490cd7991784b5c1a4c1e074f57708335f5faae0d348569a6ca8cf4f4f901e166cbea74d2b2} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d69c9b8e, StatelessResetToken: 0x08af05ced231851982a5139e1181c976} 2025/04/30 11:10:24 server -> Sending packet 4 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:24 server <- Reading packet 5 (1252 bytes) for connection c2de3967, 1-RTT 2025/04/30 11:10:24 server Short Header{DestConnectionID: c2de3967, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:24 server <- &wire.PingFrame{} 2025/04/30 11:10:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:10:24 server Queueing ACK because packet 5 was missing before. 2025/04/30 11:10:24 server -> Sending packet 5 (27 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}}, DelayTime: 655.147µs} 2025/04/30 11:10:24 server <- Reading packet 9 (34 bytes) for connection c2de3967, 1-RTT 2025/04/30 11:10:24 server Short Header{DestConnectionID: c2de3967, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:24 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 25.088ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:10:24 server Destroying connection: timeout: no recent network activity 2025/04/30 11:10:24 Removing connection ID a7f3af3f. 2025/04/30 11:10:24 Removing connection ID 3ead052f. 2025/04/30 11:10:24 Removing connection ID f5290929. 2025/04/30 11:10:24 Removing connection ID 6c9a24e2. 2025/04/30 11:10:24 server Connection ed89eefc80508e4d closed. 2025/04/30 11:10:24 Error accepting stream: timeout: no recent network activity 2025/04/30 11:10:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:24 server -> Sending packet 7 (323 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.NewTokenFrame{Token: 0xf5bfc9fc60b8f81c3064c9dbdadb30e919998ef98f043f705c60a16116870907175dab34a12eb76a264c26da88e6b0535490cd7991784b5c1a4c1e074f57708335f5faae0d348569a6ca8cf4f4f901e166cbea74d2b2} 2025/04/30 11:10:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a18fea60, StatelessResetToken: 0xb630ee731f4c5c3eafa3212a5dd0a5b3} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d69c9b8e, StatelessResetToken: 0x08af05ced231851982a5139e1181c976} 2025/04/30 11:10:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 02712095, StatelessResetToken: 0xb8965b6f787e36e248b928762df2d36c} 2025/04/30 11:10:24 server Skipping packet number 6 2025/04/30 11:10:24 server -> Sending packet 8 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:24 server -> Sending packet 9 (1366 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:24 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:24 server -> &wire.PingFrame{} 2025/04/30 11:10:24 server <- Reading packet 10 (35 bytes) for connection c2de3967, 1-RTT 2025/04/30 11:10:24 server Short Header{DestConnectionID: c2de3967, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:24 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:10:24 server newly acked packets (1): [7] 2025/04/30 11:10:24 server updated RTT: 35.971ms (σ: 15.229ms) 2025/04/30 11:10:24 server ECN capability confirmed. 2025/04/30 11:10:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:10:25 server -> Sending packet 25 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:25 server -> Sending packet 26 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:10:25 server -> Sending packet 11 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:25 server -> Sending packet 12 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:25 server <- Reading packet 11 (42 bytes) for connection c2de3967, 1-RTT 2025/04/30 11:10:25 server Short Header{DestConnectionID: c2de3967, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:10:25 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:10:25 server <- &wire.MaxDataFrame{MaximumData: 16778240} 2025/04/30 11:10:25 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:10:25 server Sending ACK because the ACK timer expired. 2025/04/30 11:10:25 server -> Sending packet 13 (27 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 5, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 5, Smallest: 5}}, DelayTime: 25.341832ms} 2025/04/30 11:10:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:10:25 server -> Sending packet 15 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:25 server -> Sending packet 16 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 11:10:25 server -> Sending packet 35 (1045 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 35, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:25 server Skipping packet number 34 2025/04/30 11:10:25 server -> Sending packet 36 (251 bytes) for connection 9c508371686e4651, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 36, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:10:25 server -> &wire.NewTokenFrame{Token: 0x147f4521513b2f5e3494acbda15ce79ee79a0591e7e634222fcf949b461ced39e9fb25483a8829735710c68f3aa4c720b421ef699f0f88b728758a8211a74c86157cba91b124f0950423ac714bd99d500e5f6ae27763} 2025/04/30 11:10:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:25 server Destroying connection: timeout: no recent network activity 2025/04/30 11:10:25 Removing connection ID bd0a04d1. 2025/04/30 11:10:25 Removing connection ID 11b77cd4. 2025/04/30 11:10:25 Removing connection ID 9a2c5983. 2025/04/30 11:10:25 Removing connection ID 751ffcc0. 2025/04/30 11:10:25 Error accepting stream: timeout: no recent network activity 2025/04/30 11:10:25 server Connection 9c508371686e4651 closed. 2025/04/30 11:10:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:10:25 server -> Sending packet 18 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:25 server -> Sending packet 19 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:25 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:25 Tracking 37 connection IDs and 0 reset tokens. 2025/04/30 11:10:26 Removing connection IDs [9f98c162 fcb747f6 1b042516 a45a993d] for a closed connection after it has been retired. 2025/04/30 11:10:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:10:26 server -> Sending packet 22 (248 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:26 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:26 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:26 server Skipping packet number 21 2025/04/30 11:10:26 server -> Sending packet 23 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:26 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:26 Removing connection ID 7176a85da05ca32c after it has been retired. 2025/04/30 11:10:26 Removing connection IDs [035a63f0 4d0d393f b3a21841 d62ac4d2] for a closed connection after it has been retired. 2025/04/30 11:10:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:10:26 server -> Sending packet 21 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:26 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:26 server -> Sending packet 22 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:26 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:27 Removing connection ID ae2221cd9703d4d5 after it has been retired. 2025/04/30 11:10:27 Tracking 27 connection IDs and 0 reset tokens. 2025/04/30 11:10:28 server Destroying connection: timeout: no recent network activity 2025/04/30 11:10:28 Removing connection ID 6fcfbae6. 2025/04/30 11:10:28 Removing connection ID ee4485b2. 2025/04/30 11:10:28 Removing connection ID 59155850. 2025/04/30 11:10:28 Removing connection ID a4a4813f. 2025/04/30 11:10:28 Error accepting stream: timeout: no recent network activity 2025/04/30 11:10:28 server Connection 612118bde09f849d closed. 2025/04/30 11:10:28 Removing connection ID 4f22712dc4efb85e after it has been retired. 2025/04/30 11:10:28 Removing connection IDs [fc88c454 fb350d12 3cff23fc f7696975] for a closed connection after it has been retired. 2025/04/30 11:10:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:10:28 server -> Sending packet 24 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:28 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:28 server -> Sending packet 25 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:28 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:28 Removing connection ID 4f7129336aadd6e3 after it has been retired. 2025/04/30 11:10:28 Removing connection IDs [2588e5cc 06b2eb17 16fa010b 4a800b8d] for a closed connection after it has been retired. 2025/04/30 11:10:29 Removing connection ID 3165f59d1f0210d6 after it has been retired. 2025/04/30 11:10:29 Tracking 12 connection IDs and 0 reset tokens. 2025/04/30 11:10:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:10:29 server -> Sending packet 25 (248 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:29 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:29 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:29 server Skipping packet number 24 2025/04/30 11:10:29 server -> Sending packet 26 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:29 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:31 Tracking 12 connection IDs and 0 reset tokens. 2025/04/30 11:10:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:10:32 server -> Sending packet 28 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:32 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:32 server -> Sending packet 29 (92 bytes) for connection 7840d16c5aadf8b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:32 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 955, Data length: 69, Offset + Data length: 1024} 2025/04/30 11:10:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:10:32 server -> Sending packet 27 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:32 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:32 server -> Sending packet 28 (1045 bytes) for connection 3165f59d1f0210d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:32 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:33 Tracking 12 connection IDs and 0 reset tokens. 2025/04/30 11:10:35 Tracking 12 connection IDs and 0 reset tokens. 2025/04/30 11:10:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:10:37 server -> Sending packet 28 (248 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:37 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:10:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:10:37 server -> &wire.NewTokenFrame{Token: 0x580fdf0fbdfb1a6c08233db0c9544d45f873edb996f647654a290b6a9830f4034df22835f55fa1eb970923d4bae54542af6bdab8d2462936e598acf45e62f953da3d6a241a30d51486e5e4a7c0e7e44d66d186f0d7b8} 2025/04/30 11:10:37 server Skipping packet number 27 2025/04/30 11:10:37 server -> Sending packet 29 (1045 bytes) for connection ae2221cd9703d4d5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:10:37 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:10:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:10:37 Tracking 12 connection IDs and 0 reset tokens. 2025/04/30 11:10:39 Tracking 12 connection IDs and 0 reset tokens.