2025/04/30 16:42:07 Increased receive buffer size to 14336 kiB 2025/04/30 16:42:07 Increased send buffer size to 14336 kiB 2025/04/30 16:42:07 Setting DF for IPv4 and IPv6. 2025/04/30 16:42:07 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 16:42:07 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 16:42:07 server Listening for udp connections on [::]:443 2025/04/30 16:42:07 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 16:42:07 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 16:42:07 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 16:42:08 server <- Received Initial packet. 2025/04/30 16:42:08 Created qlog file: /logs/qlog/1f5c42d99c9b9da4.sqlog 2025/04/30 16:42:08 server Changing connection ID to 56378a08. 2025/04/30 16:42:08 Adding connection IDs 1f5c42d99c9b9da4 and 56378a08 for a new connection. 2025/04/30 16:42:08 server <- Reading packet 1803621 (1252 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:08 server Long Header{Type: Initial, DestConnectionID: 1f5c42d99c9b9da4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1803621, PacketNumberLen: 3, Length: 1234, Version: v1} 2025/04/30 16:42:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 310, Offset + Data length: 310} 2025/04/30 16:42:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 16:42:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 16:42:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 16:42:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 107374182, InitialMaxStreamDataBidiRemote: 107374182, InitialMaxStreamDataUni: 107374182, InitialMaxData: 107374182, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 1m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 16:42:08 Adding connection ID fd247d5b. 2025/04/30 16:42:08 Adding connection ID 90ab5bef. 2025/04/30 16:42:08 Adding connection ID 0e74db2a. 2025/04/30 16:42:08 Adding connection ID 573bcb82. 2025/04/30 16:42:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1f5c42d99c9b9da4 2025/04/30 16:42:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56378a08, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 407, Version: v1} 2025/04/30 16:42:08 server -> &wire.AckFrame{LargestAcked: 1803621, LowestAcked: 1803621, DelayTime: 0s} 2025/04/30 16:42:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 16:42:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56378a08, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 16:42:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 16:42:08 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 16:42:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 573bcb82, StatelessResetToken: 0xc91b86077c489998a334d503ceb476ba} 2025/04/30 16:42:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0e74db2a, StatelessResetToken: 0xda9d4ff3b0da5ce82cdb421b446b6536} 2025/04/30 16:42:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fd247d5b, StatelessResetToken: 0x24c0330fd2e8e0ba8ec68a2dd4289fd8} 2025/04/30 16:42:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 90ab5bef, StatelessResetToken: 0x6321e04baf5aa842d191b5ac9e78fde5} 2025/04/30 16:42:08 server <- Reading packet 1803623 (1252 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:08 server Long Header{Type: Initial, DestConnectionID: 1f5c42d99c9b9da4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1803623, PacketNumberLen: 3, Length: 1234, Version: v1} 2025/04/30 16:42:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 310, Offset + Data length: 310} 2025/04/30 16:42:08 server -> Sending packet 1 (42 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56378a08, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 16:42:08 server -> &wire.AckFrame{LargestAcked: 1803623, LowestAcked: 1803621, AckRanges: {{Largest: 1803623, Smallest: 1803623}, {Largest: 1803621, Smallest: 1803621}}, DelayTime: 0s} 2025/04/30 16:42:09 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 16:42:09 server -> Sending packet 2 (1280 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56378a08, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 16:42:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 16:42:09 server -> Sending packet 3 (1280 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56378a08, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 16:42:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 16:42:09 Tracking 6 connection IDs and 0 reset tokens. 2025/04/30 16:42:09 server <- Reading packet 1803625 (1252 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:09 server Long Header{Type: Initial, DestConnectionID: 1f5c42d99c9b9da4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1803625, PacketNumberLen: 3, Length: 1234, Version: v1} 2025/04/30 16:42:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 310, Offset + Data length: 310} 2025/04/30 16:42:09 server -> Sending packet 4 (44 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56378a08, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 16:42:09 server -> &wire.AckFrame{LargestAcked: 1803625, LowestAcked: 1803621, AckRanges: {{Largest: 1803625, Smallest: 1803625}, {Largest: 1803623, Smallest: 1803623}, {Largest: 1803621, Smallest: 1803621}}, DelayTime: 0s} 2025/04/30 16:42:09 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 16:42:09 server -> Sending packet 1 (744 bytes) for connection 1f5c42d99c9b9da4, Handshake 2025/04/30 16:42:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56378a08, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 16:42:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 16:42:09 server -> Sending packet 2 (744 bytes) for connection 1f5c42d99c9b9da4, Handshake 2025/04/30 16:42:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56378a08, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 16:42:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 16:42:09 server <- Reading packet 1803627 (1252 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:09 server Long Header{Type: Initial, DestConnectionID: 1f5c42d99c9b9da4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1803627, PacketNumberLen: 3, Length: 1234, Version: v1} 2025/04/30 16:42:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 310, Offset + Data length: 310} 2025/04/30 16:42:09 server -> Sending packet 5 (46 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56378a08, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 32, Version: v1} 2025/04/30 16:42:09 server -> &wire.AckFrame{LargestAcked: 1803627, LowestAcked: 1803621, AckRanges: {{Largest: 1803627, Smallest: 1803627}, {Largest: 1803625, Smallest: 1803625}, {Largest: 1803623, Smallest: 1803623}, {Largest: 1803621, Smallest: 1803621}}, DelayTime: 0s} 2025/04/30 16:42:09 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 16:42:09 server -> Sending packet 6 (1280 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56378a08, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 16:42:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 16:42:09 server -> Sending packet 7 (1280 bytes) for connection 1f5c42d99c9b9da4, Initial 2025/04/30 16:42:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56378a08, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 16:42:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 16:42:10 server <- Reading packet 1803621 (77 bytes) for connection 56378a08, Handshake 2025/04/30 16:42:10 server Long Header{Type: Handshake, DestConnectionID: 56378a08, SrcConnectionID: (empty), PacketNumber: 1803621, PacketNumberLen: 3, Length: 64, Version: v1} 2025/04/30 16:42:10 server Dropping Initial keys. 2025/04/30 16:42:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 16:42:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 16:42:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.216ms} 2025/04/30 16:42:10 Retiring connection ID 1f5c42d99c9b9da4 in 5s. 2025/04/30 16:42:10 server Dropping Handshake keys. 2025/04/30 16:42:10 server <- Reading packet 1803621 (36 bytes) for connection 56378a08, 1-RTT 2025/04/30 16:42:10 server Short Header{DestConnectionID: 56378a08, PacketNumber: 1803621, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 16:42:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.28ms} 2025/04/30 16:42:10 server newly acked packets (1): [0] 2025/04/30 16:42:10 server updated RTT: 1.50311604s (σ: 751.55802ms) 2025/04/30 16:42:10 server Canceling loss detection timer. 2025/04/30 16:42:10 server <- Reading packet 1803622 (68 bytes) for connection 56378a08, 1-RTT 2025/04/30 16:42:10 server Short Header{DestConnectionID: 56378a08, PacketNumber: 1803622, PacketNumberLen: 3, KeyPhase: 0} 2025/04/30 16:42:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 16:42:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 16:42:10 server -> Sending packet 1 (256 bytes) for connection 1f5c42d99c9b9da4, 1-RTT (ECN: ECT(0)) 2025/04/30 16:42:10 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 16:42:10 server -> &wire.AckFrame{LargestAcked: 1803622, LowestAcked: 1803621, DelayTime: 371.844µs} 2025/04/30 16:42:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 16:42:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 16:42:10 server -> &wire.NewTokenFrame{Token: 0xd88c6e860fc815d728d33cf4a08626bcfb2bd8d30d9c109079056dd8ab27c661fcd73ccf58f2104d266eeea23a4aa6f25f60d9ac2fed81ad192213b43a0c03595fd656f57f24eb7867fac96906ab69b5e1f9de13f26c} 2025/04/30 16:42:10 Received request: GET /nzzbpgrxnl 2025/04/30 16:42:10 server -> Sending packet 2 (1045 bytes) for connection 1f5c42d99c9b9da4, 1-RTT (ECN: ECT(0)) 2025/04/30 16:42:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 16:42:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 16:42:10 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 16:42:10 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 16:42:11 Tracking 6 connection IDs and 0 reset tokens. 2025/04/30 16:42:11 server <- Reading packet 1803623 (36 bytes) for connection 56378a08, 1-RTT 2025/04/30 16:42:11 server Short Header{DestConnectionID: 56378a08, PacketNumber: 1803623, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 16:42:11 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 120µs} 2025/04/30 16:42:11 server newly acked packets (1): [1] 2025/04/30 16:42:11 server updated RTT: 1.502878s (σ: 564.144ms) 2025/04/30 16:42:11 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 16:42:11 server Ignoring all packets below 1803623. 2025/04/30 16:42:11 server <- Reading packet 1803624 (33 bytes) for connection 56378a08, 1-RTT 2025/04/30 16:42:11 server Short Header{DestConnectionID: 56378a08, PacketNumber: 1803624, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 16:42:11 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"No Error"} 2025/04/30 16:42:11 server Closing connection with error: Application error 0x0 (remote): No Error 2025/04/30 16:42:11 Replacing connection for connection IDs [56378a08 fd247d5b 90ab5bef 0e74db2a 573bcb82] with a closed connection. 2025/04/30 16:42:11 Error accepting stream: Application error 0x0 (remote): No Error 2025/04/30 16:42:11 server Connection 1f5c42d99c9b9da4 closed. 2025/04/30 16:42:13 Tracking 6 connection IDs and 0 reset tokens. 2025/04/30 16:42:15 Tracking 6 connection IDs and 0 reset tokens. 2025/04/30 16:42:15 Removing connection ID 1f5c42d99c9b9da4 after it has been retired. 2025/04/30 16:42:16 Removing connection IDs [56378a08 fd247d5b 90ab5bef 0e74db2a 573bcb82] for a closed connection after it has been retired. 2025/04/30 16:42:17 Tracking 0 connection IDs and 0 reset tokens.