2025/09/12 02:03:39 Increased receive buffer size to 14336 kiB 2025/09/12 02:03:39 Increased send buffer size to 14336 kiB 2025/09/12 02:03:39 Setting DF for IPv4 and IPv6. 2025/09/12 02:03:39 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:03:39 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:03:39 server Listening for udp connections on [::]:443 2025/09/12 02:03:40 server Client offered version 0x57414954, sending Version Negotiation 2025/09/12 02:03:40 server <- Received Initial packet. 2025/09/12 02:03:40 Created qlog file: /logs/qlog/77f26cbd481fd725.sqlog 2025/09/12 02:03:40 server Changing connection ID to 5d48064e. 2025/09/12 02:03:40 Adding connection IDs 77f26cbd481fd725 and 5d48064e for a new connection. 2025/09/12 02:03:40 server <- Received Initial packet. 2025/09/12 02:03:40 server <- Reading packet 25 (1252 bytes) for connection 77f26cbd481fd725, Initial 2025/09/12 02:03:40 server Long Header{Type: Initial, DestConnectionID: 77f26cbd481fd725, SrcConnectionID: (empty), Token: (empty), PacketNumber: 25, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/09/12 02:03:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/09/12 02:03:40 server -> Sending packet 0 (37 bytes) for connection 77f26cbd481fd725, Initial 2025/09/12 02:03:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d48064e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:03:40 server -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 25, DelayTime: 0s} 2025/09/12 02:03:40 server Parsed a coalesced packet. Part 1: 367 bytes. Remaining: 885 bytes. 2025/09/12 02:03:40 server <- Reading packet 26 (367 bytes) for connection 77f26cbd481fd725, Initial 2025/09/12 02:03:40 server Long Header{Type: Initial, DestConnectionID: 77f26cbd481fd725, SrcConnectionID: (empty), Token: (empty), PacketNumber: 26, PacketNumberLen: 1, Length: 349, Version: v1} 2025/09/12 02:03:40 server <- &wire.CryptoFrame{Offset: 1213, Data length: 327, Offset + Data length: 1540} 2025/09/12 02:03:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:03:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:03:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:03:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 1200, EnableResetStreamAt: false} 2025/09/12 02:03:40 Adding connection ID f09afba3. 2025/09/12 02:03:40 Adding connection ID dde7368b. 2025/09/12 02:03:40 Adding connection ID b4321673. 2025/09/12 02:03:40 Adding connection ID 620a5b60. 2025/09/12 02:03:40 Adding connection ID d8e482f2. 2025/09/12 02:03:40 server coalesced packet has different destination connection ID: 00000000, expected 77f26cbd481fd725 2025/09/12 02:03:40 server -> Sending packet 1 (1280 bytes) for connection 77f26cbd481fd725, Initial 2025/09/12 02:03:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d48064e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:03:40 server -> &wire.AckFrame{LargestAcked: 26, LowestAcked: 25, DelayTime: 0s} 2025/09/12 02:03:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:03:40 server -> Sending packet 0 (886 bytes) for connection 77f26cbd481fd725, Handshake 2025/09/12 02:03:40 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5d48064e, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:03:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:03:40 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:03:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 620a5b60, StatelessResetToken: 0xf2d7c81ea1e80143c0fcd100eb844377} 2025/09/12 02:03:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b4321673, StatelessResetToken: 0xe4a4ca917bc8fd0ba9e4b025cbfce4bc} 2025/09/12 02:03:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dde7368b, StatelessResetToken: 0xa2810ed9bb2d3d6e6e47ebef9b3924d1} 2025/09/12 02:03:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f09afba3, StatelessResetToken: 0x9fa008bf816c1d2611f91955c3c83ca2} 2025/09/12 02:03:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d8e482f2, StatelessResetToken: 0xaee13cc1c53a657aa575368d847d31cf} 2025/09/12 02:03:40 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 1215 bytes. 2025/09/12 02:03:40 server <- Reading packet 27 (37 bytes) for connection 5d48064e, Initial 2025/09/12 02:03:40 server Long Header{Type: Initial, DestConnectionID: 5d48064e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 27, PacketNumberLen: 1, Length: 23, Version: v1} 2025/09/12 02:03:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 696µs} 2025/09/12 02:03:40 server newly acked packets (1): [1] 2025/09/12 02:03:40 server updated RTT: 33.590241ms (σ: 16.79512ms) 2025/09/12 02:03:40 server coalesced packet has different destination connection ID: 00000000, expected 5d48064e 2025/09/12 02:03:40 server <- Reading packet 0 (36 bytes) for connection 5d48064e, Handshake 2025/09/12 02:03:40 server Long Header{Type: Handshake, DestConnectionID: 5d48064e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/09/12 02:03:40 server Dropping Initial keys. 2025/09/12 02:03:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 712µs} 2025/09/12 02:03:40 server newly acked packets (1): [0] 2025/09/12 02:03:40 server updated RTT: 33.59ms (σ: 12.596ms) 2025/09/12 02:03:40 server Canceling loss detection timer. 2025/09/12 02:03:40 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/09/12 02:03:40 server <- Reading packet 1 (69 bytes) for connection 5d48064e, Handshake 2025/09/12 02:03:40 server Long Header{Type: Handshake, DestConnectionID: 5d48064e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/09/12 02:03:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:03:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:03:40 server Dropping Handshake keys. 2025/09/12 02:03:40 server <- Reading packet 0 (42 bytes) for connection 5d48064e, 1-RTT 2025/09/12 02:03:40 server Short Header{DestConnectionID: 5d48064e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:03:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:03:40 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:03:40 server -> Sending packet 1 (293 bytes) for connection 77f26cbd481fd725, 1-RTT (ECN: ECT(0)) 2025/09/12 02:03:40 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:03:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 355.553µs} 2025/09/12 02:03:40 server -> &wire.NewTokenFrame{Token: 0x347042f39662a633e8c4943cf1095a3233d6a75d764c217e2316c62e5b6e3f314a07fceafa127e63f2d3ee4af5665e41753fea068176d6882b0152680da9ec2d5f3fcfc9bae77b42eaffe14de8b0411316b35fd1574b3978206fba} 2025/09/12 02:03:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:03:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:03:40 Received request: GET /ytgvfgmjbu 2025/09/12 02:03:40 server -> Sending packet 2 (1045 bytes) for connection 77f26cbd481fd725, 1-RTT (ECN: ECT(0)) 2025/09/12 02:03:40 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:03:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:03:40 server <- Reading packet 1 (28 bytes) for connection 5d48064e, 1-RTT 2025/09/12 02:03:40 server Short Header{DestConnectionID: 5d48064e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:03:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.432ms} 2025/09/12 02:03:40 server newly acked packets (1): [0] 2025/09/12 02:03:40 server updated RTT: 33.608ms (σ: 9.483ms) 2025/09/12 02:03:40 server <- Reading packet 2 (1352 bytes) for connection 5d48064e, 1-RTT 2025/09/12 02:03:40 server Short Header{DestConnectionID: 5d48064e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:03:40 server <- &wire.PingFrame{} 2025/09/12 02:03:40 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:03:40 server <- Reading packet 3 (30 bytes) for connection 5d48064e, 1-RTT 2025/09/12 02:03:40 server Short Header{DestConnectionID: 5d48064e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:03:40 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:03:40 server newly acked packets (2): [1 2] 2025/09/12 02:03:40 server updated RTT: 33.387ms (σ: 7.552ms) 2025/09/12 02:03:40 server ECN capability confirmed. 2025/09/12 02:03:40 server Canceling loss detection timer. 2025/09/12 02:03:40 server Ignoring all packets below 1. 2025/09/12 02:03:40 server <- Reading packet 4 (41 bytes) for connection 5d48064e, 1-RTT 2025/09/12 02:03:40 server Short Header{DestConnectionID: 5d48064e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:03:40 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 224µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:03:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/09/12 02:03:40 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/09/12 02:03:40 Replacing connection for connection IDs [f09afba3 dde7368b b4321673 620a5b60 d8e482f2 5d48064e 77f26cbd481fd725] with a closed connection. 2025/09/12 02:03:40 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/09/12 02:03:40 server Connection 77f26cbd481fd725 closed. 2025/09/12 02:03:41 Removing connection IDs [f09afba3 dde7368b b4321673 620a5b60 d8e482f2 5d48064e 77f26cbd481fd725] for a closed connection after it has been retired.