2025/04/30 11:05:05 Increased receive buffer size to 14336 kiB 2025/04/30 11:05:05 Increased send buffer size to 14336 kiB 2025/04/30 11:05:05 Setting DF for IPv4 and IPv6. 2025/04/30 11:05:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:05:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:05:05 server Listening for udp connections on [::]:443 2025/04/30 11:05:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:05:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:05:06 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:05:07 server <- Received Initial packet. 2025/04/30 11:05:07 Created qlog file: /logs/qlog/8956f4d8129bf860.sqlog 2025/04/30 11:05:07 server Changing connection ID to f67e3d84. 2025/04/30 11:05:07 Adding connection IDs 8956f4d8129bf860 and f67e3d84 for a new connection. 2025/04/30 11:05:07 server <- Reading packet 0 (1220 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:07 server Long Header{Type: Initial, DestConnectionID: 8956f4d8129bf860, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:05:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 297, Offset + Data length: 297} 2025/04/30 11:05:07 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:05:07 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:05:07 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:05:07 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 65536, InitialMaxStreamDataBidiRemote: 65536, InitialMaxStreamDataUni: 65536, InitialMaxData: 16777216, MaxBidiStreamNum: 0, MaxUniStreamNum: 3, MaxIdleTimeout: 10s, AckDelayExponent: 8, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:05:07 Adding connection ID b770f52c. 2025/04/30 11:05:07 Adding connection ID 03d45e78. 2025/04/30 11:05:07 Adding connection ID 52457699. 2025/04/30 11:05:07 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8956f4d8129bf860 2025/04/30 11:05:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f67e3d84, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:05:07 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:05:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:05:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f67e3d84, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:05:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:05:07 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52457699, StatelessResetToken: 0x1fc53bc387d23102c5dd7f74a5c31e65} 2025/04/30 11:05:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b770f52c, StatelessResetToken: 0xaf629ba99fbdef65f84f321917177537} 2025/04/30 11:05:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03d45e78, StatelessResetToken: 0x452aed6dde5976dd2f35ebd165e6809d} 2025/04/30 11:05:07 server <- Reading packet 1 (1220 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:07 server Long Header{Type: Initial, DestConnectionID: 8956f4d8129bf860, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:05:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 297, Offset + Data length: 297} 2025/04/30 11:05:07 server <- &wire.PingFrame{} 2025/04/30 11:05:07 server -> Sending packet 1 (37 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f67e3d84, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:05:07 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:05:07 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:05:07 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:05:07 server -> Sending packet 2 (1280 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f67e3d84, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:05:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:05:07 server -> Sending packet 3 (1280 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f67e3d84, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:05:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:05:07 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:05:07 server -> Sending packet 1 (742 bytes) for connection 8956f4d8129bf860, Handshake 2025/04/30 11:05:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f67e3d84, PacketNumber: 1, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:05:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:05:07 server -> Sending packet 2 (742 bytes) for connection 8956f4d8129bf860, Handshake 2025/04/30 11:05:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f67e3d84, PacketNumber: 2, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:05:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:05:07 server <- Reading packet 2 (1220 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:07 server Long Header{Type: Initial, DestConnectionID: 8956f4d8129bf860, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:05:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 297, Offset + Data length: 297} 2025/04/30 11:05:07 server <- &wire.PingFrame{} 2025/04/30 11:05:07 server -> Sending packet 4 (37 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f67e3d84, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:05:07 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:05:08 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:05:08 server -> Sending packet 5 (1280 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f67e3d84, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:05:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:05:08 server -> Sending packet 6 (1280 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f67e3d84, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:05:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:05:08 server <- Reading packet 3 (1220 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:08 server Long Header{Type: Initial, DestConnectionID: 8956f4d8129bf860, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 4, Length: 1202, Version: v1} 2025/04/30 11:05:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 297, Offset + Data length: 297} 2025/04/30 11:05:08 server <- &wire.PingFrame{} 2025/04/30 11:05:08 server -> Sending packet 7 (37 bytes) for connection 8956f4d8129bf860, Initial 2025/04/30 11:05:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f67e3d84, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:05:08 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:05:08 server <- Reading packet 4 (77 bytes) for connection f67e3d84, Handshake 2025/04/30 11:05:08 server Long Header{Type: Handshake, DestConnectionID: f67e3d84, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 4, Length: 64, Version: v1} 2025/04/30 11:05:08 server Dropping Initial keys. 2025/04/30 11:05:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:05:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:05:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:05:08 Retiring connection ID 8956f4d8129bf860 in 5s. 2025/04/30 11:05:08 server Dropping Handshake keys. 2025/04/30 11:05:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:05:08 server -> Sending packet 2 (320 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:08 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52457699, StatelessResetToken: 0x1fc53bc387d23102c5dd7f74a5c31e65} 2025/04/30 11:05:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:05:08 server -> &wire.NewTokenFrame{Token: 0xcb75d10b90c142e823163d4a8052a61b727ca7c436c642c50d25d6acd80b849e13fecac4de7bcc72d1abe9527285adf167815cfc54ab9c59a3d599003d64e64956ee380dff62eb682c7e72d69199dd5e555b29240dd3} 2025/04/30 11:05:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03d45e78, StatelessResetToken: 0x452aed6dde5976dd2f35ebd165e6809d} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b770f52c, StatelessResetToken: 0xaf629ba99fbdef65f84f321917177537} 2025/04/30 11:05:08 server -> Sending packet 3 (320 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:08 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03d45e78, StatelessResetToken: 0x452aed6dde5976dd2f35ebd165e6809d} 2025/04/30 11:05:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52457699, StatelessResetToken: 0x1fc53bc387d23102c5dd7f74a5c31e65} 2025/04/30 11:05:08 server -> &wire.NewTokenFrame{Token: 0xcb75d10b90c142e823163d4a8052a61b727ca7c436c642c50d25d6acd80b849e13fecac4de7bcc72d1abe9527285adf167815cfc54ab9c59a3d599003d64e64956ee380dff62eb682c7e72d69199dd5e555b29240dd3} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b770f52c, StatelessResetToken: 0xaf629ba99fbdef65f84f321917177537} 2025/04/30 11:05:08 server -> Sending packet 4 (1366 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:08 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:08 server -> &wire.PingFrame{} 2025/04/30 11:05:08 server <- Reading packet 5 (1252 bytes) for connection f67e3d84, 1-RTT 2025/04/30 11:05:08 server Short Header{DestConnectionID: f67e3d84, PacketNumber: 5, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:05:08 server <- &wire.PingFrame{} 2025/04/30 11:05:08 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:05:08 server <- Reading packet 6 (34 bytes) for connection f67e3d84, 1-RTT 2025/04/30 11:05:08 server Short Header{DestConnectionID: f67e3d84, PacketNumber: 6, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:05:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:05:08 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 11:05:08 server -> Sending packet 5 (24 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:08 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:08 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 158.454µs} 2025/04/30 11:05:08 server <- Reading packet 7 (46 bytes) for connection f67e3d84, 1-RTT 2025/04/30 11:05:08 server Short Header{DestConnectionID: f67e3d84, PacketNumber: 7, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:05:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:05:08 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:05:08 Received request: GET /jguripnnux 2025/04/30 11:05:08 server -> Sending packet 6 (1050 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:08 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:08 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 424.557µs} 2025/04/30 11:05:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:05:08 server Dropping %!s(logging.PacketType=1) packet (38 bytes) because we already dropped the keys. 2025/04/30 11:05:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:05:08 server -> Sending packet 8 (320 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:08 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:05:08 server -> &wire.NewTokenFrame{Token: 0xcb75d10b90c142e823163d4a8052a61b727ca7c436c642c50d25d6acd80b849e13fecac4de7bcc72d1abe9527285adf167815cfc54ab9c59a3d599003d64e64956ee380dff62eb682c7e72d69199dd5e555b29240dd3} 2025/04/30 11:05:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03d45e78, StatelessResetToken: 0x452aed6dde5976dd2f35ebd165e6809d} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b770f52c, StatelessResetToken: 0xaf629ba99fbdef65f84f321917177537} 2025/04/30 11:05:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52457699, StatelessResetToken: 0x1fc53bc387d23102c5dd7f74a5c31e65} 2025/04/30 11:05:08 server Skipping packet number 7 2025/04/30 11:05:08 server -> Sending packet 9 (1045 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:08 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:05:09 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:05:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:05:09 server -> Sending packet 11 (320 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:09 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:05:09 server -> &wire.NewTokenFrame{Token: 0xcb75d10b90c142e823163d4a8052a61b727ca7c436c642c50d25d6acd80b849e13fecac4de7bcc72d1abe9527285adf167815cfc54ab9c59a3d599003d64e64956ee380dff62eb682c7e72d69199dd5e555b29240dd3} 2025/04/30 11:05:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:05:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03d45e78, StatelessResetToken: 0x452aed6dde5976dd2f35ebd165e6809d} 2025/04/30 11:05:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b770f52c, StatelessResetToken: 0xaf629ba99fbdef65f84f321917177537} 2025/04/30 11:05:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52457699, StatelessResetToken: 0x1fc53bc387d23102c5dd7f74a5c31e65} 2025/04/30 11:05:09 server Skipping packet number 10 2025/04/30 11:05:09 server -> Sending packet 12 (1045 bytes) for connection 8956f4d8129bf860, 1-RTT (ECN: ECT(0)) 2025/04/30 11:05:09 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:05:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:05:10 server <- Reading packet 9 (35 bytes) for connection f67e3d84, 1-RTT 2025/04/30 11:05:10 server Short Header{DestConnectionID: f67e3d84, PacketNumber: 9, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:05:10 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:05:10 server <- Reading packet 10 (35 bytes) for connection f67e3d84, 1-RTT 2025/04/30 11:05:10 server Short Header{DestConnectionID: f67e3d84, PacketNumber: 10, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:05:10 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:05:10 server newly acked packets (1): [4] 2025/04/30 11:05:10 server updated RTT: 1.502427286s (σ: 751.213643ms) 2025/04/30 11:05:10 server ECN capability confirmed. 2025/04/30 11:05:10 server <- Reading packet 11 (1332 bytes) for connection f67e3d84, 1-RTT 2025/04/30 11:05:10 server Short Header{DestConnectionID: f67e3d84, PacketNumber: 11, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:05:10 server <- &wire.PingFrame{} 2025/04/30 11:05:10 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:05:10 server <- Reading packet 12 (36 bytes) for connection f67e3d84, 1-RTT 2025/04/30 11:05:10 server Short Header{DestConnectionID: f67e3d84, PacketNumber: 12, PacketNumberLen: 4, KeyPhase: 0} 2025/04/30 11:05:10 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 256µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:05:10 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:05:10 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:05:10 Replacing connection for connection IDs [f67e3d84 b770f52c 03d45e78 52457699] with a closed connection. 2025/04/30 11:05:10 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:05:10 server Connection 8956f4d8129bf860 closed. 2025/04/30 11:05:11 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:05:13 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:05:13 Removing connection ID 8956f4d8129bf860 after it has been retired. 2025/04/30 11:05:15 Removing connection IDs [f67e3d84 b770f52c 03d45e78 52457699] for a closed connection after it has been retired. 2025/04/30 11:05:15 Tracking 0 connection IDs and 0 reset tokens.