2025/04/30 11:59:09 Increased receive buffer size to 14336 kiB 2025/04/30 11:59:09 Increased send buffer size to 14336 kiB 2025/04/30 11:59:09 Setting DF for IPv4 and IPv6. 2025/04/30 11:59:09 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:59:09 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:59:09 server Listening for udp connections on [::]:443 2025/04/30 11:59:10 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:59:10 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:59:10 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:59:10 server <- Received Initial packet. 2025/04/30 11:59:10 Created qlog file: /logs/qlog/69c3fcf256cd2ff0a9b8e5.sqlog 2025/04/30 11:59:10 server Changing connection ID to b643effb. 2025/04/30 11:59:10 Adding connection IDs 69c3fcf256cd2ff0a9b8e5 and b643effb for a new connection. 2025/04/30 11:59:10 server Parsed a coalesced packet. Part 1: 372 bytes. Remaining: 880 bytes. 2025/04/30 11:59:10 server <- Reading packet 1 (372 bytes) for connection 69c3fcf256cd2ff0a9b8e5, Initial 2025/04/30 11:59:10 server Long Header{Type: Initial, DestConnectionID: 69c3fcf256cd2ff0a9b8e5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 351, Version: v1} 2025/04/30 11:59:10 server <- &wire.CryptoFrame{Offset: 1210, Data length: 329, Offset + Data length: 1539} 2025/04/30 11:59:10 server coalesced packet has different destination connection ID: 00000000, expected 69c3fcf256cd2ff0a9b8e5 2025/04/30 11:59:10 server -> Sending packet 0 (40 bytes) for connection 69c3fcf256cd2ff0a9b8e5, Initial 2025/04/30 11:59:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b643effb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:10 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:10 server Parsed a coalesced packet. Part 1: 1245 bytes. Remaining: 7 bytes. 2025/04/30 11:59:10 server <- Reading packet 2 (1245 bytes) for connection b643effb, Initial 2025/04/30 11:59:10 server Long Header{Type: Initial, DestConnectionID: b643effb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1231, Version: v1} 2025/04/30 11:59:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 1210, Offset + Data length: 1210} 2025/04/30 11:59:10 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:10 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:10 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:10 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:10 Adding connection ID ad0f8b08. 2025/04/30 11:59:10 Adding connection ID 395dddf9. 2025/04/30 11:59:10 Adding connection ID 786cdab4. 2025/04/30 11:59:10 Adding connection ID 1be76150. 2025/04/30 11:59:10 Adding connection ID 356014d8. 2025/04/30 11:59:10 server coalesced packet has different destination connection ID: 00000000, expected b643effb 2025/04/30 11:59:10 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 69c3fcf256cd2ff0a9b8e5 2025/04/30 11:59:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b643effb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 382, Version: v1} 2025/04/30 11:59:10 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b643effb, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:59:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:59:10 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1be76150, StatelessResetToken: 0xdac3eb9a96aedb9d4d8d479cec79f934} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 395dddf9, StatelessResetToken: 0xfd489e82fb43109513d1840e55d7d25e} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad0f8b08, StatelessResetToken: 0xf43ac85e89f548679bf0ddd0847fc7d0} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 786cdab4, StatelessResetToken: 0xeb032ed5fccb71b0bdbb3c1c0d988baf} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 356014d8, StatelessResetToken: 0xbeb540162806ee7004f8d2c726db7eb6} 2025/04/30 11:59:10 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:10 server <- Reading packet 2 (75 bytes) for connection b643effb, Handshake 2025/04/30 11:59:10 server Long Header{Type: Handshake, DestConnectionID: b643effb, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:10 server Dropping Initial keys. 2025/04/30 11:59:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.568ms} 2025/04/30 11:59:10 server newly acked packets (1): [0] 2025/04/30 11:59:10 server updated RTT: 134.66408ms (σ: 67.33204ms) 2025/04/30 11:59:10 server Canceling loss detection timer. 2025/04/30 11:59:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:10 Retiring connection ID 69c3fcf256cd2ff0a9b8e5 in 5s. 2025/04/30 11:59:10 server Dropping Handshake keys. 2025/04/30 11:59:10 server <- Reading packet 2 (42 bytes) for connection b643effb, 1-RTT 2025/04/30 11:59:10 server Short Header{DestConnectionID: b643effb, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:10 server -> Sending packet 1 (259 bytes) for connection 69c3fcf256cd2ff0a9b8e5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:10 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:10 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 364.271µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:10 server -> &wire.NewTokenFrame{Token: 0xf77bf28bc66d9c5cfdd95ee65eff09eeedce7f7ed82d8603a301eca19623231805740f37ed9caa2dd0af77beb80842c6cdd7ceb3461f0b8f5b114e03fbbcb548878623baea6064d73be8296eca7b3886ca42261fa5f9} 2025/04/30 11:59:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:10 Received request: GET /fuvjeulmcx 2025/04/30 11:59:10 server -> Sending packet 2 (1045 bytes) for connection 69c3fcf256cd2ff0a9b8e5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:10 server <- Reading packet 3 (1352 bytes) for connection b643effb, 1-RTT 2025/04/30 11:59:10 server Short Header{DestConnectionID: b643effb, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:10 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 408µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:10 server newly acked packets (2): [0 1] 2025/04/30 11:59:10 server updated RTT: 121.879ms (σ: 76.068ms) 2025/04/30 11:59:10 server ECN capability confirmed. 2025/04/30 11:59:10 server <- &wire.PingFrame{} 2025/04/30 11:59:10 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:10 server Ignoring all packets below 3. 2025/04/30 11:59:10 server <- Reading packet 4 (41 bytes) for connection b643effb, 1-RTT 2025/04/30 11:59:10 server Short Header{DestConnectionID: b643effb, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:10 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 96µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:10 server newly acked packets (1): [2] 2025/04/30 11:59:10 server updated RTT: 110.653ms (σ: 79.501ms) 2025/04/30 11:59:10 server Canceling loss detection timer. 2025/04/30 11:59:10 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:10 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:10 Replacing connection for connection IDs [b643effb ad0f8b08 395dddf9 786cdab4 1be76150 356014d8] with a closed connection. 2025/04/30 11:59:10 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:10 server Connection 69c3fcf256cd2ff0a9b8e5 closed. 2025/04/30 11:59:10 server <- Received Initial packet. 2025/04/30 11:59:10 Created qlog file: /logs/qlog/4ba7ab7ef747fadc.sqlog 2025/04/30 11:59:10 server Changing connection ID to e14a00b3. 2025/04/30 11:59:10 Adding connection IDs 4ba7ab7ef747fadc and e14a00b3 for a new connection. 2025/04/30 11:59:10 server <- Reading packet 0 (1252 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:10 server Long Header{Type: Initial, DestConnectionID: 4ba7ab7ef747fadc, SrcConnectionID: (empty), Token: 0xf77bf28bc66d9c5cfdd95ee65eff09eeedce7f7ed82d8603a301eca19623231805740f37ed9caa2dd0af77beb80842c6cdd7ceb3461f0b8f5b114e03fbbcb548878623baea6064d73be8296eca7b3886ca42261fa5f9, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:10 server -> Sending packet 0 (40 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14a00b3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:10 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:10 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:10 server <- Reading packet 3 (708 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:10 server Long Header{Type: Initial, DestConnectionID: 4ba7ab7ef747fadc, SrcConnectionID: (empty), Token: 0xf77bf28bc66d9c5cfdd95ee65eff09eeedce7f7ed82d8603a301eca19623231805740f37ed9caa2dd0af77beb80842c6cdd7ceb3461f0b8f5b114e03fbbcb548878623baea6064d73be8296eca7b3886ca42261fa5f9, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:10 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:10 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:10 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:10 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:10 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:10 Adding connection ID 21cb3cbe. 2025/04/30 11:59:10 Adding connection ID d302ea34. 2025/04/30 11:59:10 Adding connection ID 2828e07a. 2025/04/30 11:59:10 Adding connection ID 77bc480f. 2025/04/30 11:59:10 Adding connection ID fe6d699a. 2025/04/30 11:59:10 server coalesced packet has different destination connection ID: 00000000, expected 4ba7ab7ef747fadc 2025/04/30 11:59:10 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4ba7ab7ef747fadc 2025/04/30 11:59:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14a00b3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 930, Version: v1} 2025/04/30 11:59:10 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e14a00b3, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:10 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 21cb3cbe, StatelessResetToken: 0xaf4bba9e44b16523d8c93e82c35a7736} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2828e07a, StatelessResetToken: 0xc80ae9e23ebd1c43b85d1b4fc03cb27f} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 77bc480f, StatelessResetToken: 0x5a5d26d80a3b51e7a3b079e08989163e} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: fe6d699a, StatelessResetToken: 0xcd0f2944bf121fce3faa330c9ec23971} 2025/04/30 11:59:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d302ea34, StatelessResetToken: 0xd8b22963f22fafdf17a2e2e8e294a890} 2025/04/30 11:59:11 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:11 server -> Sending packet 2 (1280 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14a00b3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:11 server -> Sending packet 3 (1280 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14a00b3, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:11 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 1128 bytes. 2025/04/30 11:59:11 server <- Reading packet 4 (124 bytes) for connection e14a00b3, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: e14a00b3, SrcConnectionID: (empty), Token: 0xf77bf28bc66d9c5cfdd95ee65eff09eeedce7f7ed82d8603a301eca19623231805740f37ed9caa2dd0af77beb80842c6cdd7ceb3461f0b8f5b114e03fbbcb548878623baea6064d73be8296eca7b3886ca42261fa5f9, PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:11 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 592µs} 2025/04/30 11:59:11 server coalesced packet has different destination connection ID: 00000000, expected e14a00b3 2025/04/30 11:59:11 server <- Reading packet 5 (1252 bytes) for connection e14a00b3, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: e14a00b3, SrcConnectionID: (empty), Token: 0xf77bf28bc66d9c5cfdd95ee65eff09eeedce7f7ed82d8603a301eca19623231805740f37ed9caa2dd0af77beb80842c6cdd7ceb3461f0b8f5b114e03fbbcb548878623baea6064d73be8296eca7b3886ca42261fa5f9, PacketNumber: 5, PacketNumberLen: 1, Length: 1151, Version: v1} 2025/04/30 11:59:11 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 32µs} 2025/04/30 11:59:11 server newly acked packets (1): [3] 2025/04/30 11:59:11 server updated RTT: 34.703004ms (σ: 17.351502ms) 2025/04/30 11:59:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:59:11 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:11 server -> Sending packet 1 (197 bytes) for connection 4ba7ab7ef747fadc, Handshake 2025/04/30 11:59:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e14a00b3, PacketNumber: 1, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:11 server -> Sending packet 2 (197 bytes) for connection 4ba7ab7ef747fadc, Handshake 2025/04/30 11:59:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e14a00b3, PacketNumber: 2, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:11 server -> Sending packet 4 (42 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14a00b3, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:11 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server Parsed a coalesced packet. Part 1: 705 bytes. Remaining: 547 bytes. 2025/04/30 11:59:11 server <- Reading packet 6 (705 bytes) for connection e14a00b3, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: e14a00b3, SrcConnectionID: (empty), Token: 0xf77bf28bc66d9c5cfdd95ee65eff09eeedce7f7ed82d8603a301eca19623231805740f37ed9caa2dd0af77beb80842c6cdd7ceb3461f0b8f5b114e03fbbcb548878623baea6064d73be8296eca7b3886ca42261fa5f9, PacketNumber: 6, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:11 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:11 server coalesced packet has different destination connection ID: 00000000, expected e14a00b3 2025/04/30 11:59:11 server -> Sending packet 5 (42 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14a00b3, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:11 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server Parsed a coalesced packet. Part 1: 121 bytes. Remaining: 1131 bytes. 2025/04/30 11:59:11 server <- Reading packet 7 (121 bytes) for connection e14a00b3, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: e14a00b3, SrcConnectionID: (empty), Token: 0xf77bf28bc66d9c5cfdd95ee65eff09eeedce7f7ed82d8603a301eca19623231805740f37ed9caa2dd0af77beb80842c6cdd7ceb3461f0b8f5b114e03fbbcb548878623baea6064d73be8296eca7b3886ca42261fa5f9, PacketNumber: 7, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 11:59:11 server <- &wire.PingFrame{} 2025/04/30 11:59:11 server coalesced packet has different destination connection ID: 00000000, expected e14a00b3 2025/04/30 11:59:11 server -> Sending packet 6 (42 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14a00b3, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:11 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:59:11 Tracking 14 connection IDs and 0 reset tokens. 2025/04/30 11:59:11 server Parsed a coalesced packet. Part 1: 121 bytes. Remaining: 1131 bytes. 2025/04/30 11:59:11 server <- Reading packet 8 (121 bytes) for connection e14a00b3, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: e14a00b3, SrcConnectionID: (empty), Token: 0xf77bf28bc66d9c5cfdd95ee65eff09eeedce7f7ed82d8603a301eca19623231805740f37ed9caa2dd0af77beb80842c6cdd7ceb3461f0b8f5b114e03fbbcb548878623baea6064d73be8296eca7b3886ca42261fa5f9, PacketNumber: 8, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 11:59:11 server <- &wire.PingFrame{} 2025/04/30 11:59:11 server coalesced packet has different destination connection ID: 00000000, expected e14a00b3 2025/04/30 11:59:11 server -> Sending packet 7 (42 bytes) for connection 4ba7ab7ef747fadc, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14a00b3, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:11 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:11 server -> Sending packet 3 (197 bytes) for connection 4ba7ab7ef747fadc, Handshake 2025/04/30 11:59:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e14a00b3, PacketNumber: 3, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:11 server -> Sending packet 4 (197 bytes) for connection 4ba7ab7ef747fadc, Handshake 2025/04/30 11:59:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e14a00b3, PacketNumber: 4, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:11 server <- Reading packet 0 (75 bytes) for connection e14a00b3, Handshake 2025/04/30 11:59:11 server Long Header{Type: Handshake, DestConnectionID: e14a00b3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:11 server Dropping Initial keys. 2025/04/30 11:59:11 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 592µs} 2025/04/30 11:59:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:11 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:11 Retiring connection ID 4ba7ab7ef747fadc in 5s. 2025/04/30 11:59:11 server Dropping Handshake keys. 2025/04/30 11:59:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:11 server -> Sending packet 2 (371 bytes) for connection 4ba7ab7ef747fadc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:11 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: fe6d699a, StatelessResetToken: 0xcd0f2944bf121fce3faa330c9ec23971} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 77bc480f, StatelessResetToken: 0x5a5d26d80a3b51e7a3b079e08989163e} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d302ea34, StatelessResetToken: 0xd8b22963f22fafdf17a2e2e8e294a890} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 21cb3cbe, StatelessResetToken: 0xaf4bba9e44b16523d8c93e82c35a7736} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:11 server -> &wire.NewTokenFrame{Token: 0x5472123a25f86f1c716318433ee6cb703d6fd1c07104f57343493cb982d6f05a367ee0f44ca6a30e5a04d97f98f047fb3024c2181bb256240667b586675b6278a09ede17f55652b56c0dfb484bff5e6068f62ecfe909} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2828e07a, StatelessResetToken: 0xc80ae9e23ebd1c43b85d1b4fc03cb27f} 2025/04/30 11:59:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:11 server -> Sending packet 3 (371 bytes) for connection 4ba7ab7ef747fadc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:11 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 77bc480f, StatelessResetToken: 0x5a5d26d80a3b51e7a3b079e08989163e} 2025/04/30 11:59:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: fe6d699a, StatelessResetToken: 0xcd0f2944bf121fce3faa330c9ec23971} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 21cb3cbe, StatelessResetToken: 0xaf4bba9e44b16523d8c93e82c35a7736} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d302ea34, StatelessResetToken: 0xd8b22963f22fafdf17a2e2e8e294a890} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2828e07a, StatelessResetToken: 0xc80ae9e23ebd1c43b85d1b4fc03cb27f} 2025/04/30 11:59:11 server -> &wire.NewTokenFrame{Token: 0x5472123a25f86f1c716318433ee6cb703d6fd1c07104f57343493cb982d6f05a367ee0f44ca6a30e5a04d97f98f047fb3024c2181bb256240667b586675b6278a09ede17f55652b56c0dfb484bff5e6068f62ecfe909} 2025/04/30 11:59:11 server <- Reading packet 0 (42 bytes) for connection e14a00b3, 1-RTT 2025/04/30 11:59:11 server Short Header{DestConnectionID: e14a00b3, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:11 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:11 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:11 server -> Sending packet 4 (24 bytes) for connection 4ba7ab7ef747fadc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:11 Received request: GET /czqbmciyjf 2025/04/30 11:59:11 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:11 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 402.741µs} 2025/04/30 11:59:11 server -> Sending packet 5 (1045 bytes) for connection 4ba7ab7ef747fadc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:11 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:11 server <- Reading packet 1 (1352 bytes) for connection e14a00b3, 1-RTT 2025/04/30 11:59:11 server Short Header{DestConnectionID: e14a00b3, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:11 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 408µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server <- &wire.PingFrame{} 2025/04/30 11:59:11 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:11 server <- Reading packet 2 (1392 bytes) for connection e14a00b3, 1-RTT 2025/04/30 11:59:11 server Short Header{DestConnectionID: e14a00b3, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:11 server <- &wire.PingFrame{} 2025/04/30 11:59:11 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:11 server <- Reading packet 3 (30 bytes) for connection e14a00b3, 1-RTT 2025/04/30 11:59:11 server Short Header{DestConnectionID: e14a00b3, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:11 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 24µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server newly acked packets (2): [3 5] 2025/04/30 11:59:11 server updated RTT: 34.537ms (σ: 13.344ms) 2025/04/30 11:59:11 server ECN capability confirmed. 2025/04/30 11:59:11 server Canceling loss detection timer. 2025/04/30 11:59:11 server <- Reading packet 4 (41 bytes) for connection e14a00b3, 1-RTT 2025/04/30 11:59:11 server Short Header{DestConnectionID: e14a00b3, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:11 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 192µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:11 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:11 Replacing connection for connection IDs [e14a00b3 21cb3cbe d302ea34 2828e07a 77bc480f fe6d699a] with a closed connection. 2025/04/30 11:59:11 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:11 server Connection 4ba7ab7ef747fadc closed. 2025/04/30 11:59:11 server <- Received Initial packet. 2025/04/30 11:59:11 Created qlog file: /logs/qlog/38b9a75b7a3fcf50.sqlog 2025/04/30 11:59:11 server Changing connection ID to 360f4c5c. 2025/04/30 11:59:11 Adding connection IDs 38b9a75b7a3fcf50 and 360f4c5c for a new connection. 2025/04/30 11:59:11 server <- Reading packet 0 (1252 bytes) for connection 38b9a75b7a3fcf50, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: 38b9a75b7a3fcf50, SrcConnectionID: (empty), Token: 0x5472123a25f86f1c716318433ee6cb703d6fd1c07104f57343493cb982d6f05a367ee0f44ca6a30e5a04d97f98f047fb3024c2181bb256240667b586675b6278a09ede17f55652b56c0dfb484bff5e6068f62ecfe909, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:11 server -> Sending packet 0 (40 bytes) for connection 38b9a75b7a3fcf50, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:11 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:11 server <- Reading packet 2 (704 bytes) for connection 360f4c5c, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: 360f4c5c, SrcConnectionID: (empty), Token: 0x5472123a25f86f1c716318433ee6cb703d6fd1c07104f57343493cb982d6f05a367ee0f44ca6a30e5a04d97f98f047fb3024c2181bb256240667b586675b6278a09ede17f55652b56c0dfb484bff5e6068f62ecfe909, PacketNumber: 2, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:11 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:11 Adding connection ID 520f8cba. 2025/04/30 11:59:11 Adding connection ID a989dfe7. 2025/04/30 11:59:11 Adding connection ID 87d255c9. 2025/04/30 11:59:11 Adding connection ID f0624e3f. 2025/04/30 11:59:11 Adding connection ID f848b3d3. 2025/04/30 11:59:11 server coalesced packet has different destination connection ID: 00000000, expected 360f4c5c 2025/04/30 11:59:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 38b9a75b7a3fcf50 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 943, Version: v1} 2025/04/30 11:59:11 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 11:59:11 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f0624e3f, StatelessResetToken: 0x854c97125fb53f13057b88373ba89cd0} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 87d255c9, StatelessResetToken: 0x5a6ec26763fd912344be8aabfd1cdc34} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a989dfe7, StatelessResetToken: 0x5f23a63bd00218a04d930eef3f5a00f6} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 520f8cba, StatelessResetToken: 0xffa3d0289ed4843103508f47c5fef986} 2025/04/30 11:59:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f848b3d3, StatelessResetToken: 0x2eae70824b0cf8544750272f0f0e2cac} 2025/04/30 11:59:11 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:11 server -> Sending packet 2 (1280 bytes) for connection 38b9a75b7a3fcf50, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:11 server -> Sending packet 3 (1280 bytes) for connection 38b9a75b7a3fcf50, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:11 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:59:11 server <- Reading packet 3 (125 bytes) for connection 360f4c5c, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: 360f4c5c, SrcConnectionID: (empty), Token: 0x5472123a25f86f1c716318433ee6cb703d6fd1c07104f57343493cb982d6f05a367ee0f44ca6a30e5a04d97f98f047fb3024c2181bb256240667b586675b6278a09ede17f55652b56c0dfb484bff5e6068f62ecfe909, PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:59:11 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 496µs} 2025/04/30 11:59:11 server coalesced packet has different destination connection ID: 00000000, expected 360f4c5c 2025/04/30 11:59:11 server Parsed a coalesced packet. Part 1: 711 bytes. Remaining: 541 bytes. 2025/04/30 11:59:11 server <- Reading packet 4 (711 bytes) for connection 360f4c5c, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: 360f4c5c, SrcConnectionID: (empty), Token: 0x5472123a25f86f1c716318433ee6cb703d6fd1c07104f57343493cb982d6f05a367ee0f44ca6a30e5a04d97f98f047fb3024c2181bb256240667b586675b6278a09ede17f55652b56c0dfb484bff5e6068f62ecfe909, PacketNumber: 4, PacketNumberLen: 1, Length: 610, Version: v1} 2025/04/30 11:59:11 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/04/30 11:59:11 server newly acked packets (1): [3] 2025/04/30 11:59:11 server updated RTT: 34.40915ms (σ: 17.204575ms) 2025/04/30 11:59:11 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:11 server coalesced packet has different destination connection ID: 00000000, expected 360f4c5c 2025/04/30 11:59:11 server -> Sending packet 4 (42 bytes) for connection 38b9a75b7a3fcf50, Initial 2025/04/30 11:59:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:11 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:11 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:11 server -> Sending packet 1 (184 bytes) for connection 38b9a75b7a3fcf50, Handshake 2025/04/30 11:59:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, PacketNumber: 1, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 11:59:11 server -> Sending packet 2 (184 bytes) for connection 38b9a75b7a3fcf50, Handshake 2025/04/30 11:59:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, PacketNumber: 2, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 11:59:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 11:59:12 server Parsed a coalesced packet. Part 1: 714 bytes. Remaining: 538 bytes. 2025/04/30 11:59:12 server <- Reading packet 5 (714 bytes) for connection 360f4c5c, Initial 2025/04/30 11:59:12 server Long Header{Type: Initial, DestConnectionID: 360f4c5c, SrcConnectionID: (empty), Token: 0x5472123a25f86f1c716318433ee6cb703d6fd1c07104f57343493cb982d6f05a367ee0f44ca6a30e5a04d97f98f047fb3024c2181bb256240667b586675b6278a09ede17f55652b56c0dfb484bff5e6068f62ecfe909, PacketNumber: 5, PacketNumberLen: 1, Length: 613, Version: v1} 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 194.552ms} 2025/04/30 11:59:12 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:12 server coalesced packet has different destination connection ID: 00000000, expected 360f4c5c 2025/04/30 11:59:12 server -> Sending packet 5 (42 bytes) for connection 38b9a75b7a3fcf50, Initial 2025/04/30 11:59:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:12 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:12 server -> Sending packet 3 (184 bytes) for connection 38b9a75b7a3fcf50, Handshake 2025/04/30 11:59:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, PacketNumber: 3, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 11:59:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 11:59:12 server -> Sending packet 4 (184 bytes) for connection 38b9a75b7a3fcf50, Handshake 2025/04/30 11:59:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 360f4c5c, PacketNumber: 4, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 11:59:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 11:59:12 server <- Reading packet 0 (75 bytes) for connection 360f4c5c, Handshake 2025/04/30 11:59:12 server Long Header{Type: Handshake, DestConnectionID: 360f4c5c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:12 server Dropping Initial keys. 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 536µs} 2025/04/30 11:59:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:12 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:12 Retiring connection ID 38b9a75b7a3fcf50 in 5s. 2025/04/30 11:59:12 server Dropping Handshake keys. 2025/04/30 11:59:12 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:59:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:12 server -> Sending packet 2 (371 bytes) for connection 38b9a75b7a3fcf50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 87d255c9, StatelessResetToken: 0x5a6ec26763fd912344be8aabfd1cdc34} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a989dfe7, StatelessResetToken: 0x5f23a63bd00218a04d930eef3f5a00f6} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f848b3d3, StatelessResetToken: 0x2eae70824b0cf8544750272f0f0e2cac} 2025/04/30 11:59:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f0624e3f, StatelessResetToken: 0x854c97125fb53f13057b88373ba89cd0} 2025/04/30 11:59:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 520f8cba, StatelessResetToken: 0xffa3d0289ed4843103508f47c5fef986} 2025/04/30 11:59:12 server -> &wire.NewTokenFrame{Token: 0x98b873065ad9e2928cc07224f3ce40a5ac03f481b333528cda259ba79c84462cb40caf723232571856266990b1848195557e1bae0aaaef9c52e916e31e953a08df451f1b52f15daec1c8aac0d2a86d443baff7ba87aa} 2025/04/30 11:59:12 server -> Sending packet 3 (371 bytes) for connection 38b9a75b7a3fcf50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.NewTokenFrame{Token: 0x98b873065ad9e2928cc07224f3ce40a5ac03f481b333528cda259ba79c84462cb40caf723232571856266990b1848195557e1bae0aaaef9c52e916e31e953a08df451f1b52f15daec1c8aac0d2a86d443baff7ba87aa} 2025/04/30 11:59:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 520f8cba, StatelessResetToken: 0xffa3d0289ed4843103508f47c5fef986} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f0624e3f, StatelessResetToken: 0x854c97125fb53f13057b88373ba89cd0} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a989dfe7, StatelessResetToken: 0x5f23a63bd00218a04d930eef3f5a00f6} 2025/04/30 11:59:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 87d255c9, StatelessResetToken: 0x5a6ec26763fd912344be8aabfd1cdc34} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f848b3d3, StatelessResetToken: 0x2eae70824b0cf8544750272f0f0e2cac} 2025/04/30 11:59:12 server <- Reading packet 0 (42 bytes) for connection 360f4c5c, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 360f4c5c, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:12 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:12 server -> Sending packet 4 (27 bytes) for connection 38b9a75b7a3fcf50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 428.908µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:12 Received request: GET /woprhwymyg 2025/04/30 11:59:12 server -> Sending packet 5 (1045 bytes) for connection 38b9a75b7a3fcf50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:12 server <- Reading packet 1 (1352 bytes) for connection 360f4c5c, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 360f4c5c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 328µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server newly acked packets (1): [3] 2025/04/30 11:59:12 server updated RTT: 34.233ms (σ: 13.253ms) 2025/04/30 11:59:12 server ECN capability confirmed. 2025/04/30 11:59:12 server <- &wire.PingFrame{} 2025/04/30 11:59:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:12 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:12 server -> Sending packet 6 (28 bytes) for connection 38b9a75b7a3fcf50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.414205ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server <- Reading packet 2 (1392 bytes) for connection 360f4c5c, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 360f4c5c, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.PingFrame{} 2025/04/30 11:59:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:12 server -> Sending packet 8 (1054 bytes) for connection 38b9a75b7a3fcf50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 17.211843ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:12 server -> Sending packet 9 (1045 bytes) for connection 38b9a75b7a3fcf50, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:12 server <- Reading packet 3 (1444 bytes) for connection 360f4c5c, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 360f4c5c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 120µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server <- &wire.PingFrame{} 2025/04/30 11:59:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:12 server <- Reading packet 4 (46 bytes) for connection 360f4c5c, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 360f4c5c, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 544µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:12 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:12 Replacing connection for connection IDs [520f8cba a989dfe7 87d255c9 f0624e3f f848b3d3 360f4c5c] with a closed connection. 2025/04/30 11:59:12 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:12 server Connection 38b9a75b7a3fcf50 closed. 2025/04/30 11:59:12 server <- Received Initial packet. 2025/04/30 11:59:12 Created qlog file: /logs/qlog/842d544c8cf9cd31.sqlog 2025/04/30 11:59:12 server Changing connection ID to 1e2fed9d. 2025/04/30 11:59:12 Adding connection IDs 842d544c8cf9cd31 and 1e2fed9d for a new connection. 2025/04/30 11:59:12 server <- Reading packet 0 (1252 bytes) for connection 842d544c8cf9cd31, Initial 2025/04/30 11:59:12 server Long Header{Type: Initial, DestConnectionID: 842d544c8cf9cd31, SrcConnectionID: (empty), Token: 0x98b873065ad9e2928cc07224f3ce40a5ac03f481b333528cda259ba79c84462cb40caf723232571856266990b1848195557e1bae0aaaef9c52e916e31e953a08df451f1b52f15daec1c8aac0d2a86d443baff7ba87aa, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:12 server -> Sending packet 0 (40 bytes) for connection 842d544c8cf9cd31, Initial 2025/04/30 11:59:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2fed9d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:12 server <- Reading packet 3 (708 bytes) for connection 842d544c8cf9cd31, Initial 2025/04/30 11:59:12 server Long Header{Type: Initial, DestConnectionID: 842d544c8cf9cd31, SrcConnectionID: (empty), Token: 0x98b873065ad9e2928cc07224f3ce40a5ac03f481b333528cda259ba79c84462cb40caf723232571856266990b1848195557e1bae0aaaef9c52e916e31e953a08df451f1b52f15daec1c8aac0d2a86d443baff7ba87aa, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:12 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:12 Adding connection ID 4b51f621. 2025/04/30 11:59:12 Adding connection ID 3898ad01. 2025/04/30 11:59:12 Adding connection ID fd3d74e4. 2025/04/30 11:59:12 Adding connection ID 83a76a12. 2025/04/30 11:59:12 Adding connection ID dea2fa15. 2025/04/30 11:59:12 server coalesced packet has different destination connection ID: 00000000, expected 842d544c8cf9cd31 2025/04/30 11:59:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 842d544c8cf9cd31 2025/04/30 11:59:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e2fed9d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:59:12 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1e2fed9d, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:59:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 83a76a12, StatelessResetToken: 0x1c39b70d1f95063c77fb046a7fe5e627} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4b51f621, StatelessResetToken: 0x7a2ced1f55d14e435315ac3296d32a63} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: dea2fa15, StatelessResetToken: 0x080c8acc8b947f4cc22ee9c75ba64d9b} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3898ad01, StatelessResetToken: 0x5b67dd32e99ee1ec357dd928505a5ed5} 2025/04/30 11:59:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fd3d74e4, StatelessResetToken: 0x68773caf688f7891e654610f6803baaf} 2025/04/30 11:59:12 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:12 server <- Reading packet 4 (124 bytes) for connection 1e2fed9d, Initial 2025/04/30 11:59:12 server Long Header{Type: Initial, DestConnectionID: 1e2fed9d, SrcConnectionID: (empty), Token: 0x98b873065ad9e2928cc07224f3ce40a5ac03f481b333528cda259ba79c84462cb40caf723232571856266990b1848195557e1bae0aaaef9c52e916e31e953a08df451f1b52f15daec1c8aac0d2a86d443baff7ba87aa, PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.016ms} 2025/04/30 11:59:12 server newly acked packets (1): [1] 2025/04/30 11:59:12 server updated RTT: 33.25531ms (σ: 16.627655ms) 2025/04/30 11:59:12 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:12 server <- Reading packet 0 (75 bytes) for connection 1e2fed9d, Handshake 2025/04/30 11:59:12 server Long Header{Type: Handshake, DestConnectionID: 1e2fed9d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:12 server Dropping Initial keys. 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.016ms} 2025/04/30 11:59:12 server newly acked packets (1): [0] 2025/04/30 11:59:12 server updated RTT: 33.255ms (σ: 12.47ms) 2025/04/30 11:59:12 server Canceling loss detection timer. 2025/04/30 11:59:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:12 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:12 Retiring connection ID 842d544c8cf9cd31 in 5s. 2025/04/30 11:59:12 server Dropping Handshake keys. 2025/04/30 11:59:12 server <- Reading packet 0 (42 bytes) for connection 1e2fed9d, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 1e2fed9d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:12 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:12 server -> Sending packet 1 (259 bytes) for connection 842d544c8cf9cd31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 Received request: GET /zvhseszras 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408.877µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server -> &wire.NewTokenFrame{Token: 0x247701b3bb4012de61b6e5f32a6d179d21c3febbe8e0c28d43aaf84129c05150ab0bf054bfb895b9863a58ea3d49164ccfc8324c30fc130dbb6e05904521ea582d387fe7674a530aa4c79bbe83afb0519b75444de2e2} 2025/04/30 11:59:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:12 server -> Sending packet 2 (1045 bytes) for connection 842d544c8cf9cd31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:12 server <- Reading packet 2 (1352 bytes) for connection 1e2fed9d, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 1e2fed9d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.PingFrame{} 2025/04/30 11:59:12 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:12 server -> Sending packet 3 (29 bytes) for connection 842d544c8cf9cd31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 137.137µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server <- Reading packet 3 (30 bytes) for connection 1e2fed9d, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 1e2fed9d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 24µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server newly acked packets (3): [0 1 2] 2025/04/30 11:59:12 server updated RTT: 33.174ms (σ: 9.513ms) 2025/04/30 11:59:12 server ECN capability confirmed. 2025/04/30 11:59:12 server Canceling loss detection timer. 2025/04/30 11:59:12 server Ignoring all packets below 1. 2025/04/30 11:59:12 server -> Sending packet 4 (22 bytes) for connection 842d544c8cf9cd31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:12 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:12 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:12 server <- Reading packet 4 (41 bytes) for connection 1e2fed9d, 1-RTT 2025/04/30 11:59:12 server Short Header{DestConnectionID: 1e2fed9d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:12 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 168µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:12 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:12 Replacing connection for connection IDs [83a76a12 dea2fa15 1e2fed9d 4b51f621 3898ad01 fd3d74e4] with a closed connection. 2025/04/30 11:59:12 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:12 server Connection 842d544c8cf9cd31 closed. 2025/04/30 11:59:13 server <- Received Initial packet. 2025/04/30 11:59:13 Created qlog file: /logs/qlog/8c074d9cfde97325.sqlog 2025/04/30 11:59:13 server Changing connection ID to ccb8478f. 2025/04/30 11:59:13 Adding connection IDs 8c074d9cfde97325 and ccb8478f for a new connection. 2025/04/30 11:59:13 server <- Reading packet 0 (1252 bytes) for connection 8c074d9cfde97325, Initial 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: 8c074d9cfde97325, SrcConnectionID: (empty), Token: 0x247701b3bb4012de61b6e5f32a6d179d21c3febbe8e0c28d43aaf84129c05150ab0bf054bfb895b9863a58ea3d49164ccfc8324c30fc130dbb6e05904521ea582d387fe7674a530aa4c79bbe83afb0519b75444de2e2, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:13 server -> Sending packet 0 (40 bytes) for connection 8c074d9cfde97325, Initial 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ccb8478f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:13 server <- Reading packet 2 (704 bytes) for connection ccb8478f, Initial 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: ccb8478f, SrcConnectionID: (empty), Token: 0x247701b3bb4012de61b6e5f32a6d179d21c3febbe8e0c28d43aaf84129c05150ab0bf054bfb895b9863a58ea3d49164ccfc8324c30fc130dbb6e05904521ea582d387fe7674a530aa4c79bbe83afb0519b75444de2e2, PacketNumber: 2, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:13 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:13 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:13 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:13 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:13 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:13 Adding connection ID 5ac1ffce. 2025/04/30 11:59:13 Adding connection ID ec8768c1. 2025/04/30 11:59:13 Adding connection ID 529cc711. 2025/04/30 11:59:13 Adding connection ID 63ca32b7. 2025/04/30 11:59:13 Adding connection ID 1f8379d5. 2025/04/30 11:59:13 server coalesced packet has different destination connection ID: 00000000, expected ccb8478f 2025/04/30 11:59:13 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8c074d9cfde97325 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ccb8478f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 931, Version: v1} 2025/04/30 11:59:13 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ccb8478f, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ac1ffce, StatelessResetToken: 0xbe912598aaee2064bb83c9aaabd3d282} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec8768c1, StatelessResetToken: 0x645a0534cc4a1d7f090a9e460df6d155} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f8379d5, StatelessResetToken: 0x0d90d0bed7a636c9d6996e70c589c647} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 529cc711, StatelessResetToken: 0x8d9d2d1533c8d324979ebc682fd1a476} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 63ca32b7, StatelessResetToken: 0x2e3bb577fada687090cf7f7a9d6830a3} 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:13 server <- Reading packet 3 (124 bytes) for connection ccb8478f, Initial 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: ccb8478f, SrcConnectionID: (empty), Token: 0x247701b3bb4012de61b6e5f32a6d179d21c3febbe8e0c28d43aaf84129c05150ab0bf054bfb895b9863a58ea3d49164ccfc8324c30fc130dbb6e05904521ea582d387fe7674a530aa4c79bbe83afb0519b75444de2e2, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.016ms} 2025/04/30 11:59:13 server newly acked packets (1): [1] 2025/04/30 11:59:13 server updated RTT: 33.137138ms (σ: 16.568569ms) 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:13 server <- Reading packet 0 (75 bytes) for connection ccb8478f, Handshake 2025/04/30 11:59:13 server Long Header{Type: Handshake, DestConnectionID: ccb8478f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:13 server Dropping Initial keys. 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.016ms} 2025/04/30 11:59:13 server newly acked packets (1): [0] 2025/04/30 11:59:13 server updated RTT: 33.137ms (σ: 12.426ms) 2025/04/30 11:59:13 server Canceling loss detection timer. 2025/04/30 11:59:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:13 Retiring connection ID 8c074d9cfde97325 in 5s. 2025/04/30 11:59:13 server Dropping Handshake keys. 2025/04/30 11:59:13 server -> Sending packet 1 (251 bytes) for connection 8c074d9cfde97325, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:13 server -> &wire.NewTokenFrame{Token: 0x459268c2da8be62a22f2d43975365f26f3366ce7b52966a95792929859b391de3f365a97fb2b2e72b8738dce320d0b2e6a8323ac76425ac55ea25a88fac2d8ad45acee9edbd2191ec8733816c3d6b08b7cc2313ed04e} 2025/04/30 11:59:13 server <- Reading packet 1 (28 bytes) for connection ccb8478f, 1-RTT 2025/04/30 11:59:13 server Short Header{DestConnectionID: ccb8478f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.56ms} 2025/04/30 11:59:13 server newly acked packets (1): [0] 2025/04/30 11:59:13 server updated RTT: 35.555ms (σ: 14.155ms) 2025/04/30 11:59:13 Tracking 35 connection IDs and 0 reset tokens. 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:13 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:59:13 server <- Reading packet 2 (42 bytes) for connection ccb8478f, 1-RTT 2025/04/30 11:59:13 server Short Header{DestConnectionID: ccb8478f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:13 server -> Sending packet 2 (27 bytes) for connection 8c074d9cfde97325, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 141.415µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:13 Received request: GET /egjbbcdpwa 2025/04/30 11:59:13 server -> Sending packet 3 (1045 bytes) for connection 8c074d9cfde97325, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:13 server <- Reading packet 3 (30 bytes) for connection ccb8478f, 1-RTT 2025/04/30 11:59:13 server Short Header{DestConnectionID: ccb8478f, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server newly acked packets (1): [3] 2025/04/30 11:59:13 server updated RTT: 35.046ms (σ: 11.633ms) 2025/04/30 11:59:13 server ECN capability confirmed. 2025/04/30 11:59:13 server lost packet 1 (time threshold) 2025/04/30 11:59:13 server Canceling loss detection timer. 2025/04/30 11:59:13 server -> Sending packet 4 (254 bytes) for connection 8c074d9cfde97325, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.NewTokenFrame{Token: 0x459268c2da8be62a22f2d43975365f26f3366ce7b52966a95792929859b391de3f365a97fb2b2e72b8738dce320d0b2e6a8323ac76425ac55ea25a88fac2d8ad45acee9edbd2191ec8733816c3d6b08b7cc2313ed04e} 2025/04/30 11:59:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:13 server -> Sending packet 6 (254 bytes) for connection 8c074d9cfde97325, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:13 server -> &wire.NewTokenFrame{Token: 0x459268c2da8be62a22f2d43975365f26f3366ce7b52966a95792929859b391de3f365a97fb2b2e72b8738dce320d0b2e6a8323ac76425ac55ea25a88fac2d8ad45acee9edbd2191ec8733816c3d6b08b7cc2313ed04e} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:13 server -> Sending packet 7 (254 bytes) for connection 8c074d9cfde97325, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:13 server -> &wire.NewTokenFrame{Token: 0x459268c2da8be62a22f2d43975365f26f3366ce7b52966a95792929859b391de3f365a97fb2b2e72b8738dce320d0b2e6a8323ac76425ac55ea25a88fac2d8ad45acee9edbd2191ec8733816c3d6b08b7cc2313ed04e} 2025/04/30 11:59:13 server -> Sending packet 8 (1366 bytes) for connection 8c074d9cfde97325, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.PingFrame{} 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 44 bytes. 2025/04/30 11:59:13 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 11:59:13 server <- Reading packet 6 (44 bytes) for connection ccb8478f, 1-RTT 2025/04/30 11:59:13 server Short Header{DestConnectionID: ccb8478f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 133.824ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:13 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:13 Replacing connection for connection IDs [63ca32b7 1f8379d5 ccb8478f 5ac1ffce ec8768c1 529cc711] with a closed connection. 2025/04/30 11:59:13 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:13 server Connection 8c074d9cfde97325 closed. 2025/04/30 11:59:13 server <- Received Initial packet. 2025/04/30 11:59:13 Created qlog file: /logs/qlog/97890ecf0174ca400c.sqlog 2025/04/30 11:59:13 server Changing connection ID to 5d48e734. 2025/04/30 11:59:13 Adding connection IDs 97890ecf0174ca400c and 5d48e734 for a new connection. 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 1: 368 bytes. Remaining: 884 bytes. 2025/04/30 11:59:13 server <- Reading packet 1 (368 bytes) for connection 97890ecf0174ca400c, Initial 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: 97890ecf0174ca400c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 349, Version: v1} 2025/04/30 11:59:13 server <- &wire.CryptoFrame{Offset: 1212, Data length: 327, Offset + Data length: 1539} 2025/04/30 11:59:13 server coalesced packet has different destination connection ID: 00000000, expected 97890ecf0174ca400c 2025/04/30 11:59:13 server -> Sending packet 0 (40 bytes) for connection 97890ecf0174ca400c, Initial 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d48e734, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server <- Reading packet 2 (1252 bytes) for connection 97890ecf0174ca400c, Initial 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: 97890ecf0174ca400c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1233, Version: v1} 2025/04/30 11:59:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 1212, Offset + Data length: 1212} 2025/04/30 11:59:13 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:13 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:13 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:13 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:13 Adding connection ID 4364e45f. 2025/04/30 11:59:13 Adding connection ID 24f4bc8a. 2025/04/30 11:59:13 Adding connection ID 6808655a. 2025/04/30 11:59:13 Adding connection ID e35245f3. 2025/04/30 11:59:13 Adding connection ID c91eb6a1. 2025/04/30 11:59:13 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 97890ecf0174ca400c 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d48e734, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 390, Version: v1} 2025/04/30 11:59:13 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5d48e734, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c91eb6a1, StatelessResetToken: 0x8330623faf403c82d575df6adac398a0} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e35245f3, StatelessResetToken: 0x7b7a9fcf3d004686e9eafa3156032a3f} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4364e45f, StatelessResetToken: 0xceab2ac16720b6d3b21e2e5e4958c4e3} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6808655a, StatelessResetToken: 0xb1cf3f76fa12437fcd35a8d48bef23fe} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 24f4bc8a, StatelessResetToken: 0x584354a723501deb5cde34360472755d} 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 36 bytes. 2025/04/30 11:59:13 server <- Reading packet 4 (37 bytes) for connection 5d48e734, Initial 2025/04/30 11:59:13 server Long Header{Type: Initial, DestConnectionID: 5d48e734, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.24ms} 2025/04/30 11:59:13 server newly acked packets (1): [1] 2025/04/30 11:59:13 server updated RTT: 33.162186ms (σ: 16.581093ms) 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 2: 36 bytes. Remaining: 0 bytes. 2025/04/30 11:59:13 server <- Reading packet 0 (36 bytes) for connection 5d48e734, Handshake 2025/04/30 11:59:13 server Long Header{Type: Handshake, DestConnectionID: 5d48e734, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:13 server Dropping Initial keys. 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.24ms} 2025/04/30 11:59:13 server newly acked packets (1): [0] 2025/04/30 11:59:13 server updated RTT: 33.162ms (σ: 12.435ms) 2025/04/30 11:59:13 server Canceling loss detection timer. 2025/04/30 11:59:13 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:59:13 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:13 server <- Reading packet 2 (75 bytes) for connection 5d48e734, Handshake 2025/04/30 11:59:13 server Long Header{Type: Handshake, DestConnectionID: 5d48e734, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104.4ms} 2025/04/30 11:59:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:13 Retiring connection ID 97890ecf0174ca400c in 5s. 2025/04/30 11:59:13 server Dropping Handshake keys. 2025/04/30 11:59:13 server <- Reading packet 2 (42 bytes) for connection 5d48e734, 1-RTT 2025/04/30 11:59:13 server Short Header{DestConnectionID: 5d48e734, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:13 server -> Sending packet 2 (379 bytes) for connection 97890ecf0174ca400c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 307.205µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server -> &wire.NewTokenFrame{Token: 0xe19b6e3db3164c27f7440e12c47a98384637c83fad07cff5351234693bee4e8f59b8c93b54af039727c0001783734ff6c39e2b3d2ebc4f7ba6663af466a023261c0e6180ae70768d6f2ddfee8d9d859220d90674400b} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e35245f3, StatelessResetToken: 0x7b7a9fcf3d004686e9eafa3156032a3f} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 24f4bc8a, StatelessResetToken: 0x584354a723501deb5cde34360472755d} 2025/04/30 11:59:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c91eb6a1, StatelessResetToken: 0x8330623faf403c82d575df6adac398a0} 2025/04/30 11:59:13 Received request: GET /ggtqofysno 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6808655a, StatelessResetToken: 0xb1cf3f76fa12437fcd35a8d48bef23fe} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4364e45f, StatelessResetToken: 0xceab2ac16720b6d3b21e2e5e4958c4e3} 2025/04/30 11:59:13 server -> Sending packet 3 (371 bytes) for connection 97890ecf0174ca400c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4364e45f, StatelessResetToken: 0xceab2ac16720b6d3b21e2e5e4958c4e3} 2025/04/30 11:59:13 server -> &wire.NewTokenFrame{Token: 0xe19b6e3db3164c27f7440e12c47a98384637c83fad07cff5351234693bee4e8f59b8c93b54af039727c0001783734ff6c39e2b3d2ebc4f7ba6663af466a023261c0e6180ae70768d6f2ddfee8d9d859220d90674400b} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6808655a, StatelessResetToken: 0xb1cf3f76fa12437fcd35a8d48bef23fe} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 24f4bc8a, StatelessResetToken: 0x584354a723501deb5cde34360472755d} 2025/04/30 11:59:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c91eb6a1, StatelessResetToken: 0x8330623faf403c82d575df6adac398a0} 2025/04/30 11:59:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e35245f3, StatelessResetToken: 0x7b7a9fcf3d004686e9eafa3156032a3f} 2025/04/30 11:59:13 server -> Sending packet 4 (1045 bytes) for connection 97890ecf0174ca400c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:13 server <- Reading packet 1 (28 bytes) for connection 5d48e734, 1-RTT 2025/04/30 11:59:13 server Short Header{DestConnectionID: 5d48e734, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.04ms} 2025/04/30 11:59:13 server <- Reading packet 4 (1392 bytes) for connection 5d48e734, 1-RTT 2025/04/30 11:59:13 server Short Header{DestConnectionID: 5d48e734, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:13 server <- &wire.PingFrame{} 2025/04/30 11:59:13 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:13 server <- Reading packet 5 (32 bytes) for connection 5d48e734, 1-RTT 2025/04/30 11:59:13 server Short Header{DestConnectionID: 5d48e734, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:13 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server newly acked packets (2): [3 4] 2025/04/30 11:59:13 server updated RTT: 33.242ms (σ: 9.487ms) 2025/04/30 11:59:13 server ECN capability confirmed. 2025/04/30 11:59:13 server Canceling loss detection timer. 2025/04/30 11:59:13 server -> Sending packet 5 (32 bytes) for connection 97890ecf0174ca400c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:13 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:13 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 189.575µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:14 server -> Sending packet 7 (22 bytes) for connection 97890ecf0174ca400c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:14 server -> Sending packet 8 (22 bytes) for connection 97890ecf0174ca400c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:14 server <- Reading packet 8 (44 bytes) for connection 5d48e734, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: 5d48e734, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 124.064ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:14 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:14 Replacing connection for connection IDs [6808655a e35245f3 c91eb6a1 5d48e734 4364e45f 24f4bc8a] with a closed connection. 2025/04/30 11:59:14 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:14 server Connection 97890ecf0174ca400c closed. 2025/04/30 11:59:14 server <- Received Initial packet. 2025/04/30 11:59:14 Created qlog file: /logs/qlog/f7e5c3b107364e16.sqlog 2025/04/30 11:59:14 server Changing connection ID to e994b727. 2025/04/30 11:59:14 Adding connection IDs f7e5c3b107364e16 and e994b727 for a new connection. 2025/04/30 11:59:14 server <- Reading packet 0 (1252 bytes) for connection f7e5c3b107364e16, Initial 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: f7e5c3b107364e16, SrcConnectionID: (empty), Token: 0xe19b6e3db3164c27f7440e12c47a98384637c83fad07cff5351234693bee4e8f59b8c93b54af039727c0001783734ff6c39e2b3d2ebc4f7ba6663af466a023261c0e6180ae70768d6f2ddfee8d9d859220d90674400b, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:14 server -> Sending packet 0 (40 bytes) for connection f7e5c3b107364e16, Initial 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e994b727, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:14 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:14 server <- Reading packet 2 (704 bytes) for connection e994b727, Initial 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: e994b727, SrcConnectionID: (empty), Token: 0xe19b6e3db3164c27f7440e12c47a98384637c83fad07cff5351234693bee4e8f59b8c93b54af039727c0001783734ff6c39e2b3d2ebc4f7ba6663af466a023261c0e6180ae70768d6f2ddfee8d9d859220d90674400b, PacketNumber: 2, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:14 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:14 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:14 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:14 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:14 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:14 Adding connection ID ee0459e4. 2025/04/30 11:59:14 Adding connection ID 860e4e7d. 2025/04/30 11:59:14 Adding connection ID 6182f310. 2025/04/30 11:59:14 Adding connection ID 839533d7. 2025/04/30 11:59:14 Adding connection ID fadf3fbb. 2025/04/30 11:59:14 server coalesced packet has different destination connection ID: 00000000, expected e994b727 2025/04/30 11:59:14 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f7e5c3b107364e16 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e994b727, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 941, Version: v1} 2025/04/30 11:59:14 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:14 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e994b727, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: fadf3fbb, StatelessResetToken: 0x24711d69c889ca473a0d7e28924c24a9} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6182f310, StatelessResetToken: 0x93cdaffafa288a6e9ef6330a06380573} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 839533d7, StatelessResetToken: 0x297135541b45db4417951c190354021e} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 860e4e7d, StatelessResetToken: 0xc04e41db6e4cbfcf440c0d5aeac96bb0} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ee0459e4, StatelessResetToken: 0x7d200ebf636b19f1bfd394c6daf2de35} 2025/04/30 11:59:14 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:14 server <- Reading packet 3 (124 bytes) for connection e994b727, Initial 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: e994b727, SrcConnectionID: (empty), Token: 0xe19b6e3db3164c27f7440e12c47a98384637c83fad07cff5351234693bee4e8f59b8c93b54af039727c0001783734ff6c39e2b3d2ebc4f7ba6663af466a023261c0e6180ae70768d6f2ddfee8d9d859220d90674400b, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.056ms} 2025/04/30 11:59:14 server newly acked packets (1): [1] 2025/04/30 11:59:14 server updated RTT: 32.999612ms (σ: 16.499806ms) 2025/04/30 11:59:14 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:14 server <- Reading packet 0 (75 bytes) for connection e994b727, Handshake 2025/04/30 11:59:14 server Long Header{Type: Handshake, DestConnectionID: e994b727, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:14 server Dropping Initial keys. 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/04/30 11:59:14 server newly acked packets (1): [0] 2025/04/30 11:59:14 server updated RTT: 32.999ms (σ: 12.374ms) 2025/04/30 11:59:14 server Canceling loss detection timer. 2025/04/30 11:59:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:14 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:14 Retiring connection ID f7e5c3b107364e16 in 5s. 2025/04/30 11:59:14 server Dropping Handshake keys. 2025/04/30 11:59:14 server <- Reading packet 0 (42 bytes) for connection e994b727, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: e994b727, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:14 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:14 server -> Sending packet 1 (259 bytes) for connection f7e5c3b107364e16, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 Received request: GET /zfxlfvldzl 2025/04/30 11:59:14 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 430.706µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server -> &wire.NewTokenFrame{Token: 0xa8a1db4615f4bab33d9d79d1bfbe1c9858d2ae825e6316d86bb2c109867dbb2dd8a1d6278172a41a97ba6f3094931b423bac47f1c1e82f9e1602dd030e8b6d6616a102beaa70243a04b1ffb84a457e92ada976a7b23c} 2025/04/30 11:59:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:14 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:14 server -> Sending packet 2 (1045 bytes) for connection f7e5c3b107364e16, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:14 server <- Reading packet 1 (28 bytes) for connection e994b727, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: e994b727, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.496ms} 2025/04/30 11:59:14 server newly acked packets (1): [0] 2025/04/30 11:59:14 server updated RTT: 35.401ms (σ: 14.086ms) 2025/04/30 11:59:14 server <- Reading packet 2 (1352 bytes) for connection e994b727, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: e994b727, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.PingFrame{} 2025/04/30 11:59:14 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:14 server <- Reading packet 3 (31 bytes) for connection e994b727, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: e994b727, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 21.456ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server newly acked packets (1): [1] 2025/04/30 11:59:14 server updated RTT: 37.53ms (σ: 14.822ms) 2025/04/30 11:59:14 server ECN capability confirmed. 2025/04/30 11:59:14 server Ignoring all packets below 1. 2025/04/30 11:59:14 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:14 server -> Sending packet 3 (28 bytes) for connection f7e5c3b107364e16, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 5.167339ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:14 server -> Sending packet 5 (1045 bytes) for connection f7e5c3b107364e16, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:14 server -> Sending packet 6 (1045 bytes) for connection f7e5c3b107364e16, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:14 server <- Reading packet 4 (25 bytes) for connection e994b727, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: e994b727, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.PingFrame{} 2025/04/30 11:59:14 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:14 server <- Reading packet 5 (25 bytes) for connection e994b727, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: e994b727, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.PingFrame{} 2025/04/30 11:59:14 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:14 server -> Sending packet 7 (27 bytes) for connection f7e5c3b107364e16, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 86.112µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server <- Reading packet 7 (43 bytes) for connection e994b727, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: e994b727, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 280µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:14 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:14 Replacing connection for connection IDs [6182f310 839533d7 fadf3fbb e994b727 ee0459e4 860e4e7d] with a closed connection. 2025/04/30 11:59:14 server Connection f7e5c3b107364e16 closed. 2025/04/30 11:59:14 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:14 server <- Received Initial packet. 2025/04/30 11:59:14 Created qlog file: /logs/qlog/63458af2d70d9770e27e68e691583a.sqlog 2025/04/30 11:59:14 server Changing connection ID to 4bec2769. 2025/04/30 11:59:14 Adding connection IDs 63458af2d70d9770e27e68e691583a and 4bec2769 for a new connection. 2025/04/30 11:59:14 server <- Reading packet 0 (1252 bytes) for connection 63458af2d70d9770e27e68e691583a, Initial 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: 63458af2d70d9770e27e68e691583a, SrcConnectionID: (empty), Token: 0xa8a1db4615f4bab33d9d79d1bfbe1c9858d2ae825e6316d86bb2c109867dbb2dd8a1d6278172a41a97ba6f3094931b423bac47f1c1e82f9e1602dd030e8b6d6616a102beaa70243a04b1ffb84a457e92ada976a7b23c, PacketNumber: 0, PacketNumberLen: 1, Length: 1140, Version: v1} 2025/04/30 11:59:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 1119, Offset + Data length: 1119} 2025/04/30 11:59:14 server -> Sending packet 0 (40 bytes) for connection 63458af2d70d9770e27e68e691583a, Initial 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4bec2769, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:14 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server Parsed a coalesced packet. Part 1: 722 bytes. Remaining: 530 bytes. 2025/04/30 11:59:14 server <- Reading packet 1 (722 bytes) for connection 63458af2d70d9770e27e68e691583a, Initial 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: 63458af2d70d9770e27e68e691583a, SrcConnectionID: (empty), Token: 0xa8a1db4615f4bab33d9d79d1bfbe1c9858d2ae825e6316d86bb2c109867dbb2dd8a1d6278172a41a97ba6f3094931b423bac47f1c1e82f9e1602dd030e8b6d6616a102beaa70243a04b1ffb84a457e92ada976a7b23c, PacketNumber: 1, PacketNumberLen: 1, Length: 610, Version: v1} 2025/04/30 11:59:14 server <- &wire.CryptoFrame{Offset: 1119, Data length: 588, Offset + Data length: 1707} 2025/04/30 11:59:14 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:14 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:14 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:14 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:14 Adding connection ID edd27eae. 2025/04/30 11:59:14 Adding connection ID ae8d6dbd. 2025/04/30 11:59:14 Adding connection ID e6f7f3c7. 2025/04/30 11:59:14 Adding connection ID 1fd815b4. 2025/04/30 11:59:14 Adding connection ID 9a0238d8. 2025/04/30 11:59:14 server coalesced packet has different destination connection ID: 00000000, expected 63458af2d70d9770e27e68e691583a 2025/04/30 11:59:14 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 63458af2d70d9770e27e68e691583a 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4bec2769, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 932, Version: v1} 2025/04/30 11:59:14 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:14 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4bec2769, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1fd815b4, StatelessResetToken: 0x9d61eb0021f3a5eab3b37d908b829af6} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae8d6dbd, StatelessResetToken: 0x41fed9ac73a13930cb0e464c8225ae1e} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9a0238d8, StatelessResetToken: 0x1477049e3332f22bc45b333340467d45} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e6f7f3c7, StatelessResetToken: 0xdb83618e95dddbbfe3f93c12d1785996} 2025/04/30 11:59:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: edd27eae, StatelessResetToken: 0xe35eee02cba91db9429f31ef2d1d52f9} 2025/04/30 11:59:14 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:14 server <- Reading packet 2 (124 bytes) for connection 4bec2769, Initial 2025/04/30 11:59:14 server Long Header{Type: Initial, DestConnectionID: 4bec2769, SrcConnectionID: (empty), Token: 0xa8a1db4615f4bab33d9d79d1bfbe1c9858d2ae825e6316d86bb2c109867dbb2dd8a1d6278172a41a97ba6f3094931b423bac47f1c1e82f9e1602dd030e8b6d6616a102beaa70243a04b1ffb84a457e92ada976a7b23c, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 800µs} 2025/04/30 11:59:14 server newly acked packets (1): [1] 2025/04/30 11:59:14 server updated RTT: 32.870356ms (σ: 16.435178ms) 2025/04/30 11:59:14 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:14 server <- Reading packet 0 (75 bytes) for connection 4bec2769, Handshake 2025/04/30 11:59:14 server Long Header{Type: Handshake, DestConnectionID: 4bec2769, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:14 server Dropping Initial keys. 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 800µs} 2025/04/30 11:59:14 server newly acked packets (1): [0] 2025/04/30 11:59:14 server updated RTT: 32.87ms (σ: 12.326ms) 2025/04/30 11:59:14 server Canceling loss detection timer. 2025/04/30 11:59:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:14 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:14 Retiring connection ID 63458af2d70d9770e27e68e691583a in 5s. 2025/04/30 11:59:14 server Dropping Handshake keys. 2025/04/30 11:59:14 server -> Sending packet 1 (251 bytes) for connection 63458af2d70d9770e27e68e691583a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.NewTokenFrame{Token: 0x80a6b865c811d58bf42d0fcbe51315983726459e1f7b0c53b025f7eca22c7c894420611838524f2ab90d1b08e0709bcb76aaec0de89f1ae4b42513d7eaadb0b405aa88c794f3fa0f7a199bccbb58b205f769400c6093} 2025/04/30 11:59:14 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:14 server <- Reading packet 0 (42 bytes) for connection 4bec2769, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: 4bec2769, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:14 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:14 server -> Sending packet 2 (27 bytes) for connection 63458af2d70d9770e27e68e691583a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 422.318µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:14 Received request: GET /ledzhfbfxl 2025/04/30 11:59:14 server -> Sending packet 3 (1045 bytes) for connection 63458af2d70d9770e27e68e691583a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:14 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:14 server <- Reading packet 3 (32 bytes) for connection 4bec2769, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: 4bec2769, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 24µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server newly acked packets (3): [0 1 3] 2025/04/30 11:59:14 server updated RTT: 32.773ms (σ: 9.437ms) 2025/04/30 11:59:14 server ECN capability confirmed. 2025/04/30 11:59:14 server Canceling loss detection timer. 2025/04/30 11:59:14 server <- Reading packet 4 (43 bytes) for connection 4bec2769, 1-RTT 2025/04/30 11:59:14 server Short Header{DestConnectionID: 4bec2769, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:14 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 192µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:14 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:14 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:14 Replacing connection for connection IDs [9a0238d8 4bec2769 edd27eae ae8d6dbd e6f7f3c7 1fd815b4] with a closed connection. 2025/04/30 11:59:14 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:14 server Connection 63458af2d70d9770e27e68e691583a closed. 2025/04/30 11:59:15 Tracking 56 connection IDs and 0 reset tokens. 2025/04/30 11:59:15 server <- Received Initial packet. 2025/04/30 11:59:15 Created qlog file: /logs/qlog/888b7600de0a3fd0.sqlog 2025/04/30 11:59:15 server Changing connection ID to 3d3052dc. 2025/04/30 11:59:15 Adding connection IDs 888b7600de0a3fd0 and 3d3052dc for a new connection. 2025/04/30 11:59:15 server <- Reading packet 0 (1252 bytes) for connection 888b7600de0a3fd0, Initial 2025/04/30 11:59:15 server Long Header{Type: Initial, DestConnectionID: 888b7600de0a3fd0, SrcConnectionID: (empty), Token: 0x80a6b865c811d58bf42d0fcbe51315983726459e1f7b0c53b025f7eca22c7c894420611838524f2ab90d1b08e0709bcb76aaec0de89f1ae4b42513d7eaadb0b405aa88c794f3fa0f7a199bccbb58b205f769400c6093, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:15 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:15 server -> Sending packet 0 (40 bytes) for connection 888b7600de0a3fd0, Initial 2025/04/30 11:59:15 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d3052dc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:15 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:15 server <- Reading packet 2 (1252 bytes) for connection 888b7600de0a3fd0, Initial 2025/04/30 11:59:15 server Long Header{Type: Initial, DestConnectionID: 888b7600de0a3fd0, SrcConnectionID: (empty), Token: 0x80a6b865c811d58bf42d0fcbe51315983726459e1f7b0c53b025f7eca22c7c894420611838524f2ab90d1b08e0709bcb76aaec0de89f1ae4b42513d7eaadb0b405aa88c794f3fa0f7a199bccbb58b205f769400c6093, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:15 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:15 server -> Sending packet 1 (42 bytes) for connection 888b7600de0a3fd0, Initial 2025/04/30 11:59:15 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d3052dc, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:15 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:15 Removing connection ID 69c3fcf256cd2ff0a9b8e5 after it has been retired. 2025/04/30 11:59:15 Removing connection IDs [b643effb ad0f8b08 395dddf9 786cdab4 1be76150 356014d8] for a closed connection after it has been retired. 2025/04/30 11:59:15 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:15 server <- Reading packet 5 (704 bytes) for connection 3d3052dc, Initial 2025/04/30 11:59:15 server Long Header{Type: Initial, DestConnectionID: 3d3052dc, SrcConnectionID: (empty), Token: 0x80a6b865c811d58bf42d0fcbe51315983726459e1f7b0c53b025f7eca22c7c894420611838524f2ab90d1b08e0709bcb76aaec0de89f1ae4b42513d7eaadb0b405aa88c794f3fa0f7a199bccbb58b205f769400c6093, PacketNumber: 5, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:15 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:15 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:15 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:15 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:15 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:15 Adding connection ID 9046ae58. 2025/04/30 11:59:15 Adding connection ID 2115a06a. 2025/04/30 11:59:15 Adding connection ID dc6dd62f. 2025/04/30 11:59:15 Adding connection ID 00ece923. 2025/04/30 11:59:15 Adding connection ID 55c00349. 2025/04/30 11:59:15 server coalesced packet has different destination connection ID: 00000000, expected 3d3052dc 2025/04/30 11:59:15 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 888b7600de0a3fd0 2025/04/30 11:59:15 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d3052dc, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 932, Version: v1} 2025/04/30 11:59:15 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:15 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3d3052dc, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:15 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9046ae58, StatelessResetToken: 0xbdfc4342770506ece7f0f50d413c3e5d} 2025/04/30 11:59:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 00ece923, StatelessResetToken: 0x0cf7fa6882716a8309344fd641885fa8} 2025/04/30 11:59:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dc6dd62f, StatelessResetToken: 0x36d7b6a674aab8acc319c46e383a55ef} 2025/04/30 11:59:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 55c00349, StatelessResetToken: 0x809f7e5bd4ed86bbe767b0d253e2302e} 2025/04/30 11:59:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2115a06a, StatelessResetToken: 0x0e52fb8976dc5d507454f17af4dd4fb0} 2025/04/30 11:59:15 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:59:15 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:15 server -> Sending packet 3 (1280 bytes) for connection 888b7600de0a3fd0, Initial 2025/04/30 11:59:15 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d3052dc, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:15 server -> Sending packet 4 (1280 bytes) for connection 888b7600de0a3fd0, Initial 2025/04/30 11:59:15 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3d3052dc, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:15 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:59:15 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:15 server -> Sending packet 1 (195 bytes) for connection 888b7600de0a3fd0, Handshake 2025/04/30 11:59:15 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3d3052dc, PacketNumber: 1, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:15 server -> Sending packet 2 (195 bytes) for connection 888b7600de0a3fd0, Handshake 2025/04/30 11:59:15 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3d3052dc, PacketNumber: 2, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:15 server <- Reading packet 1 (76 bytes) for connection 3d3052dc, Handshake 2025/04/30 11:59:15 server Long Header{Type: Handshake, DestConnectionID: 3d3052dc, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 11:59:15 server Dropping Initial keys. 2025/04/30 11:59:15 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs} 2025/04/30 11:59:15 server newly acked packets (1): [2] 2025/04/30 11:59:15 server updated RTT: 31.278504ms (σ: 15.639252ms) 2025/04/30 11:59:15 server Canceling loss detection timer. 2025/04/30 11:59:15 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:15 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:15 Retiring connection ID 888b7600de0a3fd0 in 5s. 2025/04/30 11:59:15 server Dropping Handshake keys. 2025/04/30 11:59:15 server -> Sending packet 1 (251 bytes) for connection 888b7600de0a3fd0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:15 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:15 server -> &wire.NewTokenFrame{Token: 0xa07feba3c99f4377d3fcdc5b493d41fb6860991cdf5302241b4ce295c485299fbc4d6e4a611d37058e081b8d0a984d723fde2e60ac73ab9afc3adf59eb7cc1744b42a664ace345ad1479fc7ee8767b9a10c57cebe609} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:15 server <- Reading packet 0 (42 bytes) for connection 3d3052dc, 1-RTT 2025/04/30 11:59:15 server Short Header{DestConnectionID: 3d3052dc, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:15 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:15 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:15 server <- Reading packet 1 (28 bytes) for connection 3d3052dc, 1-RTT 2025/04/30 11:59:15 server Short Header{DestConnectionID: 3d3052dc, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:15 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.504ms} 2025/04/30 11:59:15 server newly acked packets (1): [0] 2025/04/30 11:59:15 server updated RTT: 31.41ms (σ: 11.994ms) 2025/04/30 11:59:15 server -> Sending packet 2 (28 bytes) for connection 888b7600de0a3fd0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:15 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:15 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 47.955688ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:15 Received request: GET /tnbvefeqel 2025/04/30 11:59:15 server -> Sending packet 3 (1045 bytes) for connection 888b7600de0a3fd0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:15 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:15 server <- Reading packet 2 (30 bytes) for connection 3d3052dc, 1-RTT 2025/04/30 11:59:15 server Short Header{DestConnectionID: 3d3052dc, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:15 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:15 server newly acked packets (1): [3] 2025/04/30 11:59:15 server updated RTT: 31.431ms (σ: 9.037ms) 2025/04/30 11:59:15 server ECN capability confirmed. 2025/04/30 11:59:15 server setting loss timer for packet 1 (1-RTT) to 35.526096ms (in 2025-04-30 11:59:15.668822878 +0000 UTC m=+6.436687014) 2025/04/30 11:59:15 server -> Sending packet 4 (22 bytes) for connection 888b7600de0a3fd0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:15 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:15 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:15 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:59:15.668822878 +0000 UTC m=+6.436687014 2025/04/30 11:59:15 server lost packet 1 (time threshold) 2025/04/30 11:59:15 server -> Sending packet 5 (251 bytes) for connection 888b7600de0a3fd0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:15 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:15 server -> &wire.NewTokenFrame{Token: 0xa07feba3c99f4377d3fcdc5b493d41fb6860991cdf5302241b4ce295c485299fbc4d6e4a611d37058e081b8d0a984d723fde2e60ac73ab9afc3adf59eb7cc1744b42a664ace345ad1479fc7ee8767b9a10c57cebe609} 2025/04/30 11:59:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:15 server -> Sending packet 7 (22 bytes) for connection 888b7600de0a3fd0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:15 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:15 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:15 server Skipping packet number 6 2025/04/30 11:59:15 server -> Sending packet 8 (251 bytes) for connection 888b7600de0a3fd0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:15 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:15 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:15 server -> &wire.NewTokenFrame{Token: 0xa07feba3c99f4377d3fcdc5b493d41fb6860991cdf5302241b4ce295c485299fbc4d6e4a611d37058e081b8d0a984d723fde2e60ac73ab9afc3adf59eb7cc1744b42a664ace345ad1479fc7ee8767b9a10c57cebe609} 2025/04/30 11:59:15 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 42 bytes. 2025/04/30 11:59:15 server Dropping %!s(logging.PacketType=1) packet (44 bytes) because we already dropped the keys. 2025/04/30 11:59:15 server <- Reading packet 5 (42 bytes) for connection 3d3052dc, 1-RTT 2025/04/30 11:59:15 server Short Header{DestConnectionID: 3d3052dc, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:15 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 123.768ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:15 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:15 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:15 Replacing connection for connection IDs [00ece923 55c00349 3d3052dc 9046ae58 2115a06a dc6dd62f] with a closed connection. 2025/04/30 11:59:15 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:15 server Connection 888b7600de0a3fd0 closed. 2025/04/30 11:59:16 server <- Received Initial packet. 2025/04/30 11:59:16 Created qlog file: /logs/qlog/1e578aa56cd4be6b.sqlog 2025/04/30 11:59:16 server Changing connection ID to c23e08d3. 2025/04/30 11:59:16 Adding connection IDs 1e578aa56cd4be6b and c23e08d3 for a new connection. 2025/04/30 11:59:16 server <- Reading packet 0 (1252 bytes) for connection 1e578aa56cd4be6b, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: 1e578aa56cd4be6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:59:16 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:59:16 server -> Sending packet 0 (40 bytes) for connection 1e578aa56cd4be6b, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c23e08d3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:16 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:16 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:59:16 server <- Reading packet 1 (366 bytes) for connection 1e578aa56cd4be6b, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: 1e578aa56cd4be6b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:59:16 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:59:16 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:16 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:16 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:16 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:16 Adding connection ID 085e05d4. 2025/04/30 11:59:16 Adding connection ID 87b81795. 2025/04/30 11:59:16 Adding connection ID 1e954030. 2025/04/30 11:59:16 Adding connection ID ab8b47e8. 2025/04/30 11:59:16 Adding connection ID 433e3af2. 2025/04/30 11:59:16 server coalesced packet has different destination connection ID: 00000000, expected 1e578aa56cd4be6b 2025/04/30 11:59:16 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1e578aa56cd4be6b 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c23e08d3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 386, Version: v1} 2025/04/30 11:59:16 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c23e08d3, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 433e3af2, StatelessResetToken: 0xe14ba1a942d8a24afee274d1260cd8f1} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 87b81795, StatelessResetToken: 0x60d7c175a0ebc4a60d677ab4efae036d} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1e954030, StatelessResetToken: 0xc24a9aea3f82b366940cd162d314b40c} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ab8b47e8, StatelessResetToken: 0x697b8852f423bcded0e68cb6767e007b} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 085e05d4, StatelessResetToken: 0xa194c278b830f9cf034c4617b983aa85} 2025/04/30 11:59:16 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:16 server -> Sending packet 2 (1280 bytes) for connection 1e578aa56cd4be6b, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c23e08d3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:16 server -> Sending packet 3 (1280 bytes) for connection 1e578aa56cd4be6b, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c23e08d3, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:16 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 1215 bytes. 2025/04/30 11:59:16 server <- Reading packet 2 (37 bytes) for connection c23e08d3, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: c23e08d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:16 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 536µs} 2025/04/30 11:59:16 server coalesced packet has different destination connection ID: 00000000, expected c23e08d3 2025/04/30 11:59:16 server <- Reading packet 3 (1252 bytes) for connection c23e08d3, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: c23e08d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1238, Version: v1} 2025/04/30 11:59:16 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 40µs} 2025/04/30 11:59:16 server newly acked packets (1): [3] 2025/04/30 11:59:16 server updated RTT: 34.471337ms (σ: 17.235668ms) 2025/04/30 11:59:16 server <- &wire.CryptoFrame{Offset: 0, Data length: 1212, Offset + Data length: 1212} 2025/04/30 11:59:16 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:16 server -> Sending packet 1 (741 bytes) for connection 1e578aa56cd4be6b, Handshake 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c23e08d3, PacketNumber: 1, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:59:16 server -> Sending packet 2 (741 bytes) for connection 1e578aa56cd4be6b, Handshake 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c23e08d3, PacketNumber: 2, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:59:16 server -> Sending packet 4 (40 bytes) for connection 1e578aa56cd4be6b, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c23e08d3, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:16 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:16 server Parsed a coalesced packet. Part 1: 363 bytes. Remaining: 889 bytes. 2025/04/30 11:59:16 server <- Reading packet 4 (363 bytes) for connection c23e08d3, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: c23e08d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 349, Version: v1} 2025/04/30 11:59:16 server <- &wire.CryptoFrame{Offset: 1212, Data length: 327, Offset + Data length: 1539} 2025/04/30 11:59:16 server coalesced packet has different destination connection ID: 00000000, expected c23e08d3 2025/04/30 11:59:16 server -> Sending packet 5 (40 bytes) for connection 1e578aa56cd4be6b, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c23e08d3, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:16 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:16 Removing connection ID 4ba7ab7ef747fadc after it has been retired. 2025/04/30 11:59:16 server Parsed a coalesced packet. Part 1: 34 bytes. Remaining: 1218 bytes. 2025/04/30 11:59:16 server <- Reading packet 5 (34 bytes) for connection c23e08d3, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: c23e08d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 11:59:16 server <- &wire.PingFrame{} 2025/04/30 11:59:16 server coalesced packet has different destination connection ID: 00000000, expected c23e08d3 2025/04/30 11:59:16 server -> Sending packet 6 (40 bytes) for connection 1e578aa56cd4be6b, Initial 2025/04/30 11:59:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c23e08d3, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:16 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:59:16 Removing connection IDs [e14a00b3 21cb3cbe d302ea34 2828e07a 77bc480f fe6d699a] for a closed connection after it has been retired. 2025/04/30 11:59:16 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:16 server -> Sending packet 3 (741 bytes) for connection 1e578aa56cd4be6b, Handshake 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c23e08d3, PacketNumber: 3, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:59:16 server -> Sending packet 4 (741 bytes) for connection 1e578aa56cd4be6b, Handshake 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c23e08d3, PacketNumber: 4, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:59:16 server <- Reading packet 0 (36 bytes) for connection c23e08d3, Handshake 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: c23e08d3, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:16 server Dropping Initial keys. 2025/04/30 11:59:16 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 888µs} 2025/04/30 11:59:16 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:16 server -> Sending packet 5 (741 bytes) for connection 1e578aa56cd4be6b, Handshake 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c23e08d3, PacketNumber: 5, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:59:16 server -> Sending packet 6 (741 bytes) for connection 1e578aa56cd4be6b, Handshake 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c23e08d3, PacketNumber: 6, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:59:16 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:16 server <- Reading packet 2 (75 bytes) for connection c23e08d3, Handshake 2025/04/30 11:59:16 server Long Header{Type: Handshake, DestConnectionID: c23e08d3, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:16 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 85.816ms} 2025/04/30 11:59:16 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:16 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:16 Retiring connection ID 1e578aa56cd4be6b in 5s. 2025/04/30 11:59:16 server Dropping Handshake keys. 2025/04/30 11:59:16 server <- Reading packet 1 (42 bytes) for connection c23e08d3, 1-RTT 2025/04/30 11:59:16 server Short Header{DestConnectionID: c23e08d3, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:16 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:16 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:16 server -> Sending packet 2 (379 bytes) for connection 1e578aa56cd4be6b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:16 Received request: GET /xwtkelobqa 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 287.238µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 87b81795, StatelessResetToken: 0x60d7c175a0ebc4a60d677ab4efae036d} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1e954030, StatelessResetToken: 0xc24a9aea3f82b366940cd162d314b40c} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 085e05d4, StatelessResetToken: 0xa194c278b830f9cf034c4617b983aa85} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:16 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ab8b47e8, StatelessResetToken: 0x697b8852f423bcded0e68cb6767e007b} 2025/04/30 11:59:16 server -> &wire.NewTokenFrame{Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 433e3af2, StatelessResetToken: 0xe14ba1a942d8a24afee274d1260cd8f1} 2025/04/30 11:59:16 server -> Sending packet 3 (1280 bytes) for connection 1e578aa56cd4be6b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 87b81795, StatelessResetToken: 0x60d7c175a0ebc4a60d677ab4efae036d} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 085e05d4, StatelessResetToken: 0xa194c278b830f9cf034c4617b983aa85} 2025/04/30 11:59:16 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1e954030, StatelessResetToken: 0xc24a9aea3f82b366940cd162d314b40c} 2025/04/30 11:59:16 server -> &wire.NewTokenFrame{Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ab8b47e8, StatelessResetToken: 0x697b8852f423bcded0e68cb6767e007b} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 433e3af2, StatelessResetToken: 0xe14ba1a942d8a24afee274d1260cd8f1} 2025/04/30 11:59:16 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:59:16 server -> Sending packet 4 (140 bytes) for connection 1e578aa56cd4be6b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:16 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 11:59:16 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 11:59:16 server <- Reading packet 3 (1392 bytes) for connection c23e08d3, 1-RTT 2025/04/30 11:59:16 server Short Header{DestConnectionID: c23e08d3, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:16 server <- &wire.PingFrame{} 2025/04/30 11:59:16 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:16 server -> Sending packet 5 (29 bytes) for connection 1e578aa56cd4be6b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 78.347µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:16 server <- Reading packet 6 (25 bytes) for connection c23e08d3, 1-RTT 2025/04/30 11:59:16 server Short Header{DestConnectionID: c23e08d3, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:16 server <- &wire.PingFrame{} 2025/04/30 11:59:16 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:16 server <- Reading packet 7 (25 bytes) for connection c23e08d3, 1-RTT 2025/04/30 11:59:16 server Short Header{DestConnectionID: c23e08d3, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:16 server <- &wire.PingFrame{} 2025/04/30 11:59:16 server -> Sending packet 6 (31 bytes) for connection 1e578aa56cd4be6b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 121.647µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:59:16 server -> Sending packet 8 (1280 bytes) for connection 1e578aa56cd4be6b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 87b81795, StatelessResetToken: 0x60d7c175a0ebc4a60d677ab4efae036d} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 085e05d4, StatelessResetToken: 0xa194c278b830f9cf034c4617b983aa85} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 433e3af2, StatelessResetToken: 0xe14ba1a942d8a24afee274d1260cd8f1} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ab8b47e8, StatelessResetToken: 0x697b8852f423bcded0e68cb6767e007b} 2025/04/30 11:59:16 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1e954030, StatelessResetToken: 0xc24a9aea3f82b366940cd162d314b40c} 2025/04/30 11:59:16 server -> &wire.NewTokenFrame{Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76} 2025/04/30 11:59:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:16 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:59:16 server Skipping packet number 7 2025/04/30 11:59:16 server -> Sending packet 9 (140 bytes) for connection 1e578aa56cd4be6b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:16 server -> Sending packet 10 (1366 bytes) for connection 1e578aa56cd4be6b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:16 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:16 server -> &wire.PingFrame{} 2025/04/30 11:59:16 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 11:59:16 server <- Reading packet 9 (45 bytes) for connection c23e08d3, 1-RTT 2025/04/30 11:59:16 server Short Header{DestConnectionID: c23e08d3, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:16 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 96µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:16 server newly acked packets (2): [8 9] 2025/04/30 11:59:16 server updated RTT: 34.369ms (σ: 13.129ms) 2025/04/30 11:59:16 server ECN capability confirmed. 2025/04/30 11:59:16 server Canceling loss detection timer. 2025/04/30 11:59:16 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:16 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:16 Replacing connection for connection IDs [1e954030 ab8b47e8 433e3af2 c23e08d3 085e05d4 87b81795] with a closed connection. 2025/04/30 11:59:16 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:16 server Connection 1e578aa56cd4be6b closed. 2025/04/30 11:59:17 Removing connection ID 38b9a75b7a3fcf50 after it has been retired. 2025/04/30 11:59:17 Tracking 55 connection IDs and 0 reset tokens. 2025/04/30 11:59:17 Removing connection IDs [520f8cba a989dfe7 87d255c9 f0624e3f f848b3d3 360f4c5c] for a closed connection after it has been retired. 2025/04/30 11:59:17 server <- Received Initial packet. 2025/04/30 11:59:17 Created qlog file: /logs/qlog/2135703407deb24f.sqlog 2025/04/30 11:59:17 server Changing connection ID to c07b9691. 2025/04/30 11:59:17 Adding connection IDs 2135703407deb24f and c07b9691 for a new connection. 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:17 server <- Reading packet 3 (708 bytes) for connection 2135703407deb24f, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: 2135703407deb24f, SrcConnectionID: (empty), Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:17 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:17 server coalesced packet has different destination connection ID: 00000000, expected 2135703407deb24f 2025/04/30 11:59:17 server -> Sending packet 0 (40 bytes) for connection 2135703407deb24f, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c07b9691, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:59:17 server <- Reading packet 4 (1248 bytes) for connection c07b9691, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: c07b9691, SrcConnectionID: (empty), Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76, PacketNumber: 4, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:17 Adding connection ID 209743d6. 2025/04/30 11:59:17 Adding connection ID 7dc9637e. 2025/04/30 11:59:17 Adding connection ID 820ce89e. 2025/04/30 11:59:17 Adding connection ID 732b3c92. 2025/04/30 11:59:17 Adding connection ID cdfc739b. 2025/04/30 11:59:17 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:59:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2135703407deb24f 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c07b9691, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 934, Version: v1} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c07b9691, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7dc9637e, StatelessResetToken: 0xa9f3e968d59cc68ff06d751f245fab48} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: cdfc739b, StatelessResetToken: 0xfd0644c1cdce84aa625f785e091c813d} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 820ce89e, StatelessResetToken: 0x489f632b40c51609a9fb6e0ff5e9f9fa} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 732b3c92, StatelessResetToken: 0xffd5aa0228727c4cef7db5d9272ee687} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 209743d6, StatelessResetToken: 0x13bd99ebb28af9219676b0bbd81d5b73} 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:59:17 server <- Reading packet 5 (1248 bytes) for connection c07b9691, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: c07b9691, SrcConnectionID: (empty), Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76, PacketNumber: 5, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:17 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:59:17 server -> Sending packet 2 (40 bytes) for connection 2135703407deb24f, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c07b9691, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:17 server -> Sending packet 3 (1280 bytes) for connection 2135703407deb24f, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c07b9691, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:17 server -> Sending packet 4 (1280 bytes) for connection 2135703407deb24f, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c07b9691, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 1: 126 bytes. Remaining: 1126 bytes. 2025/04/30 11:59:17 server <- Reading packet 6 (126 bytes) for connection c07b9691, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: c07b9691, SrcConnectionID: (empty), Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76, PacketNumber: 6, PacketNumberLen: 1, Length: 25, Version: v1} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 512µs} 2025/04/30 11:59:17 server coalesced packet has different destination connection ID: 00000000, expected c07b9691 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:59:17 server <- Reading packet 7 (125 bytes) for connection c07b9691, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: c07b9691, SrcConnectionID: (empty), Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76, PacketNumber: 7, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/04/30 11:59:17 server newly acked packets (1): [4] 2025/04/30 11:59:17 server updated RTT: 34.45157ms (σ: 17.225785ms) 2025/04/30 11:59:17 server coalesced packet has different destination connection ID: 00000000, expected c07b9691 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 1: 127 bytes. Remaining: 1125 bytes. 2025/04/30 11:59:17 server <- Reading packet 8 (127 bytes) for connection c07b9691, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: c07b9691, SrcConnectionID: (empty), Token: 0xedc913b02f62f4c2c147e6084ad9a99df7e1f9f866ceec22e0cfcafd8da1c48e54632fe7b047c7598d2dcd20dba858e00aa8094bc7946f875cd22a9fbf23e15f5484d3d94466769fbad4f07d386be0731587acb6fd76, PacketNumber: 8, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 19.36ms} 2025/04/30 11:59:17 server <- &wire.PingFrame{} 2025/04/30 11:59:17 server coalesced packet has different destination connection ID: 00000000, expected c07b9691 2025/04/30 11:59:17 server -> Sending packet 5 (40 bytes) for connection 2135703407deb24f, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c07b9691, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, DelayTime: 0s, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:17 server -> Sending packet 1 (193 bytes) for connection 2135703407deb24f, Handshake 2025/04/30 11:59:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c07b9691, PacketNumber: 1, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:59:17 server -> Sending packet 2 (193 bytes) for connection 2135703407deb24f, Handshake 2025/04/30 11:59:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c07b9691, PacketNumber: 2, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:59:17 server <- Reading packet 0 (74 bytes) for connection c07b9691, Handshake 2025/04/30 11:59:17 server Long Header{Type: Handshake, DestConnectionID: c07b9691, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:17 server Dropping Initial keys. 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 480µs} 2025/04/30 11:59:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:17 Retiring connection ID 2135703407deb24f in 5s. 2025/04/30 11:59:17 server Dropping Handshake keys. 2025/04/30 11:59:17 server <- Reading packet 0 (42 bytes) for connection c07b9691, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: c07b9691, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:17 server -> Sending packet 2 (376 bytes) for connection 2135703407deb24f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 325.489µs} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 209743d6, StatelessResetToken: 0x13bd99ebb28af9219676b0bbd81d5b73} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 820ce89e, StatelessResetToken: 0x489f632b40c51609a9fb6e0ff5e9f9fa} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: cdfc739b, StatelessResetToken: 0xfd0644c1cdce84aa625f785e091c813d} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7dc9637e, StatelessResetToken: 0xa9f3e968d59cc68ff06d751f245fab48} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:17 Received request: GET /pwgrcjcapf 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 732b3c92, StatelessResetToken: 0xffd5aa0228727c4cef7db5d9272ee687} 2025/04/30 11:59:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:17 server -> &wire.NewTokenFrame{Token: 0x94a56d1036065e1d58ed3d120baec5196ed957c16fc50042740150d34c62b7fdf71fb12ed4ea066de3b408e6674f0305413a2dc8e0a7b808dbe8ec68964dc8bdd01afa217231e8333f243c85e99e3ed6f6f44b1fb8d6} 2025/04/30 11:59:17 server -> Sending packet 3 (1280 bytes) for connection 2135703407deb24f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 209743d6, StatelessResetToken: 0x13bd99ebb28af9219676b0bbd81d5b73} 2025/04/30 11:59:17 server -> &wire.NewTokenFrame{Token: 0x94a56d1036065e1d58ed3d120baec5196ed957c16fc50042740150d34c62b7fdf71fb12ed4ea066de3b408e6674f0305413a2dc8e0a7b808dbe8ec68964dc8bdd01afa217231e8333f243c85e99e3ed6f6f44b1fb8d6} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 732b3c92, StatelessResetToken: 0xffd5aa0228727c4cef7db5d9272ee687} 2025/04/30 11:59:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7dc9637e, StatelessResetToken: 0xa9f3e968d59cc68ff06d751f245fab48} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 820ce89e, StatelessResetToken: 0x489f632b40c51609a9fb6e0ff5e9f9fa} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: cdfc739b, StatelessResetToken: 0xfd0644c1cdce84aa625f785e091c813d} 2025/04/30 11:59:17 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:59:17 server -> Sending packet 4 (140 bytes) for connection 2135703407deb24f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:17 server <- Reading packet 1 (1352 bytes) for connection c07b9691, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: c07b9691, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 320µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server newly acked packets (1): [3] 2025/04/30 11:59:17 server updated RTT: 34.426ms (σ: 12.967ms) 2025/04/30 11:59:17 server ECN capability confirmed. 2025/04/30 11:59:17 server <- &wire.PingFrame{} 2025/04/30 11:59:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:17 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:17 server -> Sending packet 5 (25 bytes) for connection 2135703407deb24f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.43327ms} 2025/04/30 11:59:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:17 server -> Sending packet 7 (140 bytes) for connection 2135703407deb24f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:17 server -> Sending packet 8 (140 bytes) for connection 2135703407deb24f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:17 server <- Reading packet 3 (42 bytes) for connection c07b9691, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: c07b9691, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 104.816ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:17 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:17 Replacing connection for connection IDs [209743d6 7dc9637e 820ce89e 732b3c92 cdfc739b c07b9691] with a closed connection. 2025/04/30 11:59:17 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:17 server Connection 2135703407deb24f closed. 2025/04/30 11:59:17 Removing connection ID 842d544c8cf9cd31 after it has been retired. 2025/04/30 11:59:17 Removing connection IDs [83a76a12 dea2fa15 1e2fed9d 4b51f621 3898ad01 fd3d74e4] for a closed connection after it has been retired. 2025/04/30 11:59:17 server <- Received Initial packet. 2025/04/30 11:59:17 Created qlog file: /logs/qlog/1a90a617cf1bbc58.sqlog 2025/04/30 11:59:17 server Changing connection ID to eccbc5e2. 2025/04/30 11:59:17 Adding connection IDs 1a90a617cf1bbc58 and eccbc5e2 for a new connection. 2025/04/30 11:59:17 server <- Reading packet 0 (1252 bytes) for connection 1a90a617cf1bbc58, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: 1a90a617cf1bbc58, SrcConnectionID: (empty), Token: 0x94a56d1036065e1d58ed3d120baec5196ed957c16fc50042740150d34c62b7fdf71fb12ed4ea066de3b408e6674f0305413a2dc8e0a7b808dbe8ec68964dc8bdd01afa217231e8333f243c85e99e3ed6f6f44b1fb8d6, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:17 server -> Sending packet 0 (40 bytes) for connection 1a90a617cf1bbc58, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eccbc5e2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:17 server <- Reading packet 1 (708 bytes) for connection 1a90a617cf1bbc58, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: 1a90a617cf1bbc58, SrcConnectionID: (empty), Token: 0x94a56d1036065e1d58ed3d120baec5196ed957c16fc50042740150d34c62b7fdf71fb12ed4ea066de3b408e6674f0305413a2dc8e0a7b808dbe8ec68964dc8bdd01afa217231e8333f243c85e99e3ed6f6f44b1fb8d6, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:17 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:17 Adding connection ID 46147ac7. 2025/04/30 11:59:17 Adding connection ID a30c601e. 2025/04/30 11:59:17 Adding connection ID 69048a29. 2025/04/30 11:59:17 Adding connection ID db3e659a. 2025/04/30 11:59:17 Adding connection ID e90c1ec9. 2025/04/30 11:59:17 server coalesced packet has different destination connection ID: 00000000, expected 1a90a617cf1bbc58 2025/04/30 11:59:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1a90a617cf1bbc58 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eccbc5e2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 935, Version: v1} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eccbc5e2, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a30c601e, StatelessResetToken: 0xddcaf4a01eed84bdf60440051951dfd0} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 69048a29, StatelessResetToken: 0xc7634a652c766fecdc9fc5293c88ca39} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 46147ac7, StatelessResetToken: 0x75bf761eb11a0bfa257100868ff3ef3b} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: db3e659a, StatelessResetToken: 0xbc9d550a52e9facec62b10d59b54064c} 2025/04/30 11:59:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e90c1ec9, StatelessResetToken: 0xe1d0edaf9e78e8545fb9099f10db88c5} 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:17 server <- Reading packet 2 (124 bytes) for connection eccbc5e2, Initial 2025/04/30 11:59:17 server Long Header{Type: Initial, DestConnectionID: eccbc5e2, SrcConnectionID: (empty), Token: 0x94a56d1036065e1d58ed3d120baec5196ed957c16fc50042740150d34c62b7fdf71fb12ed4ea066de3b408e6674f0305413a2dc8e0a7b808dbe8ec68964dc8bdd01afa217231e8333f243c85e99e3ed6f6f44b1fb8d6, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 752µs} 2025/04/30 11:59:17 server newly acked packets (1): [1] 2025/04/30 11:59:17 server updated RTT: 32.714358ms (σ: 16.357179ms) 2025/04/30 11:59:17 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:17 server <- Reading packet 0 (75 bytes) for connection eccbc5e2, Handshake 2025/04/30 11:59:17 server Long Header{Type: Handshake, DestConnectionID: eccbc5e2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:17 server Dropping Initial keys. 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 752µs} 2025/04/30 11:59:17 server newly acked packets (1): [0] 2025/04/30 11:59:17 server updated RTT: 32.714ms (σ: 12.267ms) 2025/04/30 11:59:17 server Canceling loss detection timer. 2025/04/30 11:59:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:17 Retiring connection ID 1a90a617cf1bbc58 in 5s. 2025/04/30 11:59:17 server Dropping Handshake keys. 2025/04/30 11:59:17 server <- Reading packet 0 (42 bytes) for connection eccbc5e2, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: eccbc5e2, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:17 server -> Sending packet 1 (259 bytes) for connection 1a90a617cf1bbc58, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 421.879µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server -> &wire.NewTokenFrame{Token: 0xe42ed7440297f8e7d72601da73cc85109745ea6cbe003f0ee647d361578f073a5c8d265f7ba36e564c8abad3947a387748b4618ddc88234f9096b5710a9109fe4ea4aecb4a13d053578e683ac184c8e3862c538fa571} 2025/04/30 11:59:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:17 Received request: GET /cekzpcfgsl 2025/04/30 11:59:17 server -> Sending packet 2 (1045 bytes) for connection 1a90a617cf1bbc58, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:17 server <- Reading packet 1 (28 bytes) for connection eccbc5e2, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: eccbc5e2, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.176ms} 2025/04/30 11:59:17 server newly acked packets (1): [0] 2025/04/30 11:59:17 server updated RTT: 35.107ms (σ: 13.987ms) 2025/04/30 11:59:17 server <- Reading packet 2 (1352 bytes) for connection eccbc5e2, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: eccbc5e2, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.PingFrame{} 2025/04/30 11:59:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:17 server <- Reading packet 3 (31 bytes) for connection eccbc5e2, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: eccbc5e2, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 21.504ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server newly acked packets (1): [1] 2025/04/30 11:59:17 server updated RTT: 37.282ms (σ: 14.84ms) 2025/04/30 11:59:17 server ECN capability confirmed. 2025/04/30 11:59:17 server Ignoring all packets below 1. 2025/04/30 11:59:17 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:17 server -> Sending packet 3 (28 bytes) for connection 1a90a617cf1bbc58, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 5.188611ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:17 server -> Sending packet 5 (1045 bytes) for connection 1a90a617cf1bbc58, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:17 server -> Sending packet 6 (1045 bytes) for connection 1a90a617cf1bbc58, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:17 server <- Reading packet 4 (25 bytes) for connection eccbc5e2, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: eccbc5e2, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.PingFrame{} 2025/04/30 11:59:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:17 server <- Reading packet 5 (25 bytes) for connection eccbc5e2, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: eccbc5e2, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.PingFrame{} 2025/04/30 11:59:17 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:17 server -> Sending packet 7 (27 bytes) for connection 1a90a617cf1bbc58, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:17 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:17 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 130.615µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server <- Reading packet 7 (43 bytes) for connection eccbc5e2, 1-RTT 2025/04/30 11:59:17 server Short Header{DestConnectionID: eccbc5e2, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:17 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:17 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:17 Replacing connection for connection IDs [46147ac7 a30c601e 69048a29 db3e659a e90c1ec9 eccbc5e2] with a closed connection. 2025/04/30 11:59:17 server Connection 1a90a617cf1bbc58 closed. 2025/04/30 11:59:17 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:18 Removing connection ID 8c074d9cfde97325 after it has been retired. 2025/04/30 11:59:18 server <- Received Initial packet. 2025/04/30 11:59:18 Created qlog file: /logs/qlog/4e2e896d1e0d9fe310f43d12145ce4cdfc.sqlog 2025/04/30 11:59:18 server Changing connection ID to 0485967f. 2025/04/30 11:59:18 Adding connection IDs 4e2e896d1e0d9fe310f43d12145ce4cdfc and 0485967f for a new connection. 2025/04/30 11:59:18 server <- Reading packet 0 (1252 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, Initial 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: 4e2e896d1e0d9fe310f43d12145ce4cdfc, SrcConnectionID: (empty), Token: 0xe42ed7440297f8e7d72601da73cc85109745ea6cbe003f0ee647d361578f073a5c8d265f7ba36e564c8abad3947a387748b4618ddc88234f9096b5710a9109fe4ea4aecb4a13d053578e683ac184c8e3862c538fa571, PacketNumber: 0, PacketNumberLen: 1, Length: 1138, Version: v1} 2025/04/30 11:59:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 1117, Offset + Data length: 1117} 2025/04/30 11:59:18 server -> Sending packet 0 (40 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, Initial 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0485967f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:18 server Parsed a coalesced packet. Part 1: 726 bytes. Remaining: 526 bytes. 2025/04/30 11:59:18 server <- Reading packet 1 (726 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, Initial 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: 4e2e896d1e0d9fe310f43d12145ce4cdfc, SrcConnectionID: (empty), Token: 0xe42ed7440297f8e7d72601da73cc85109745ea6cbe003f0ee647d361578f073a5c8d265f7ba36e564c8abad3947a387748b4618ddc88234f9096b5710a9109fe4ea4aecb4a13d053578e683ac184c8e3862c538fa571, PacketNumber: 1, PacketNumberLen: 1, Length: 612, Version: v1} 2025/04/30 11:59:18 server <- &wire.CryptoFrame{Offset: 1117, Data length: 590, Offset + Data length: 1707} 2025/04/30 11:59:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:18 Adding connection ID cf1ca9ee. 2025/04/30 11:59:18 Adding connection ID a6f38709. 2025/04/30 11:59:18 Adding connection ID 05bf2519. 2025/04/30 11:59:18 Adding connection ID aa1781de. 2025/04/30 11:59:18 Adding connection ID df3b5021. 2025/04/30 11:59:18 server coalesced packet has different destination connection ID: 00000000, expected 4e2e896d1e0d9fe310f43d12145ce4cdfc 2025/04/30 11:59:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0485967f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 924, Version: v1} 2025/04/30 11:59:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0485967f, PacketNumber: 0, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:59:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: df3b5021, StatelessResetToken: 0x95566c7197ae069f1e5085c6c1607f3c} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cf1ca9ee, StatelessResetToken: 0xaecbcedd0eda1dcfa2034fea9a56533f} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: aa1781de, StatelessResetToken: 0x4bd56f5dc8ac8d60b68397a2d709af85} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a6f38709, StatelessResetToken: 0x9458c751c53b9d8f3c560e9b77d1022c} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 05bf2519, StatelessResetToken: 0xb2e39814264a14d0af94254afa24873b} 2025/04/30 11:59:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:18 server -> Sending packet 2 (1280 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, Initial 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0485967f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:18 server -> Sending packet 3 (1280 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, Initial 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0485967f, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:18 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:59:18 server <- Reading packet 2 (125 bytes) for connection 0485967f, Initial 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: 0485967f, SrcConnectionID: (empty), Token: 0xe42ed7440297f8e7d72601da73cc85109745ea6cbe003f0ee647d361578f073a5c8d265f7ba36e564c8abad3947a387748b4618ddc88234f9096b5710a9109fe4ea4aecb4a13d053578e683ac184c8e3862c538fa571, PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:59:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 488µs} 2025/04/30 11:59:18 server coalesced packet has different destination connection ID: 00000000, expected 0485967f 2025/04/30 11:59:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:18 server -> Sending packet 1 (203 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, Handshake 2025/04/30 11:59:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0485967f, PacketNumber: 1, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:59:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:59:18 server -> Sending packet 2 (203 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, Handshake 2025/04/30 11:59:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0485967f, PacketNumber: 2, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:59:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:59:18 server <- Reading packet 1 (74 bytes) for connection 0485967f, Handshake 2025/04/30 11:59:18 server Long Header{Type: Handshake, DestConnectionID: 0485967f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:18 server Dropping Initial keys. 2025/04/30 11:59:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:59:18 server newly acked packets (1): [2] 2025/04/30 11:59:18 server updated RTT: 31.688897ms (σ: 15.844448ms) 2025/04/30 11:59:18 server Canceling loss detection timer. 2025/04/30 11:59:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:18 Retiring connection ID 4e2e896d1e0d9fe310f43d12145ce4cdfc in 5s. 2025/04/30 11:59:18 server Dropping Handshake keys. 2025/04/30 11:59:18 server -> Sending packet 1 (251 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:18 server -> &wire.NewTokenFrame{Token: 0x4bea749f130bb55dc47787d1f38becf8e2097b771cd531108eb13bca06c57318c13b8b4f8460bd536ee9c8b62f7f2edfe02fc73fefb562fbbdd1781fdae4651c22e27491d514012d3baa8d8d2d16d550f63c4d115001} 2025/04/30 11:59:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:18 server <- Reading packet 0 (42 bytes) for connection 0485967f, 1-RTT 2025/04/30 11:59:18 server Short Header{DestConnectionID: 0485967f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:18 server -> Sending packet 2 (27 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 334.383µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:18 Received request: GET /ckoogmxbir 2025/04/30 11:59:18 server -> Sending packet 3 (1045 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:18 server <- Reading packet 1 (1352 bytes) for connection 0485967f, 1-RTT 2025/04/30 11:59:18 server Short Header{DestConnectionID: 0485967f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 264µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:18 server newly acked packets (1): [1] 2025/04/30 11:59:18 server updated RTT: 31.726ms (σ: 11.958ms) 2025/04/30 11:59:18 server ECN capability confirmed. 2025/04/30 11:59:18 server lost packet 0 (time threshold) 2025/04/30 11:59:18 server <- &wire.PingFrame{} 2025/04/30 11:59:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:18 server -> Sending packet 4 (147 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 170.429µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cf1ca9ee, StatelessResetToken: 0xaecbcedd0eda1dcfa2034fea9a56533f} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: aa1781de, StatelessResetToken: 0x4bd56f5dc8ac8d60b68397a2d709af85} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: df3b5021, StatelessResetToken: 0x95566c7197ae069f1e5085c6c1607f3c} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a6f38709, StatelessResetToken: 0x9458c751c53b9d8f3c560e9b77d1022c} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 05bf2519, StatelessResetToken: 0xb2e39814264a14d0af94254afa24873b} 2025/04/30 11:59:18 Removing connection IDs [63ca32b7 1f8379d5 ccb8478f 5ac1ffce ec8768c1 529cc711] for a closed connection after it has been retired. 2025/04/30 11:59:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:18 server -> Sending packet 6 (1045 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:18 server Skipping packet number 5 2025/04/30 11:59:18 server -> Sending packet 7 (139 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a6f38709, StatelessResetToken: 0x9458c751c53b9d8f3c560e9b77d1022c} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: aa1781de, StatelessResetToken: 0x4bd56f5dc8ac8d60b68397a2d709af85} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 05bf2519, StatelessResetToken: 0xb2e39814264a14d0af94254afa24873b} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: df3b5021, StatelessResetToken: 0x95566c7197ae069f1e5085c6c1607f3c} 2025/04/30 11:59:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cf1ca9ee, StatelessResetToken: 0xaecbcedd0eda1dcfa2034fea9a56533f} 2025/04/30 11:59:18 server <- Reading packet 4 (25 bytes) for connection 0485967f, 1-RTT 2025/04/30 11:59:18 server Short Header{DestConnectionID: 0485967f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:18 server <- &wire.PingFrame{} 2025/04/30 11:59:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:18 server -> Sending packet 8 (1366 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.PingFrame{} 2025/04/30 11:59:18 server -> Sending packet 9 (29 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 181.069µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:18 server <- Reading packet 6 (32 bytes) for connection 0485967f, 1-RTT 2025/04/30 11:59:18 server Short Header{DestConnectionID: 0485967f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:18 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 72µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:18 server newly acked packets (2): [7 8] 2025/04/30 11:59:18 server updated RTT: 31.751ms (σ: 9.019ms) 2025/04/30 11:59:18 server lost packet 6 (time threshold) 2025/04/30 11:59:18 server Canceling loss detection timer. 2025/04/30 11:59:18 server -> Sending packet 10 (1045 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:18 server <- Reading packet 7 (34 bytes) for connection 0485967f, 1-RTT 2025/04/30 11:59:18 server Short Header{DestConnectionID: 0485967f, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:18 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 80µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:18 server newly acked packets (1): [10] 2025/04/30 11:59:18 server updated RTT: 31.748ms (σ: 6.769ms) 2025/04/30 11:59:18 server Canceling loss detection timer. 2025/04/30 11:59:18 server -> Sending packet 11 (22 bytes) for connection 4e2e896d1e0d9fe310f43d12145ce4cdfc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:18 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:18 server <- Reading packet 8 (45 bytes) for connection 0485967f, 1-RTT 2025/04/30 11:59:18 server Short Header{DestConnectionID: 0485967f, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:18 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 352µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:18 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:18 Replacing connection for connection IDs [aa1781de df3b5021 0485967f cf1ca9ee a6f38709 05bf2519] with a closed connection. 2025/04/30 11:59:18 server Connection 4e2e896d1e0d9fe310f43d12145ce4cdfc closed. 2025/04/30 11:59:18 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:18 server <- Received Initial packet. 2025/04/30 11:59:18 Created qlog file: /logs/qlog/cd1019f6d28ad2c0e8b6a90024.sqlog 2025/04/30 11:59:18 server Changing connection ID to edc5021d. 2025/04/30 11:59:18 Adding connection IDs cd1019f6d28ad2c0e8b6a90024 and edc5021d for a new connection. 2025/04/30 11:59:18 server <- Reading packet 0 (1252 bytes) for connection cd1019f6d28ad2c0e8b6a90024, Initial 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: cd1019f6d28ad2c0e8b6a90024, SrcConnectionID: (empty), Token: 0x4bea749f130bb55dc47787d1f38becf8e2097b771cd531108eb13bca06c57318c13b8b4f8460bd536ee9c8b62f7f2edfe02fc73fefb562fbbdd1781fdae4651c22e27491d514012d3baa8d8d2d16d550f63c4d115001, PacketNumber: 0, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:59:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:59:18 server -> Sending packet 0 (40 bytes) for connection cd1019f6d28ad2c0e8b6a90024, Initial 2025/04/30 11:59:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: edc5021d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:18 Removing connection ID 97890ecf0174ca400c after it has been retired. 2025/04/30 11:59:19 server Parsed a coalesced packet. Part 1: 709 bytes. Remaining: 543 bytes. 2025/04/30 11:59:19 server <- Reading packet 2 (709 bytes) for connection edc5021d, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: edc5021d, SrcConnectionID: (empty), Token: 0x4bea749f130bb55dc47787d1f38becf8e2097b771cd531108eb13bca06c57318c13b8b4f8460bd536ee9c8b62f7f2edfe02fc73fefb562fbbdd1781fdae4651c22e27491d514012d3baa8d8d2d16d550f63c4d115001, PacketNumber: 2, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:59:19 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:59:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:19 Adding connection ID 45fc555e. 2025/04/30 11:59:19 Adding connection ID 9e94b465. 2025/04/30 11:59:19 Adding connection ID 6f528a1e. 2025/04/30 11:59:19 Adding connection ID 70a3292b. 2025/04/30 11:59:19 Adding connection ID 51481600. 2025/04/30 11:59:19 server coalesced packet has different destination connection ID: 00000000, expected edc5021d 2025/04/30 11:59:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cd1019f6d28ad2c0e8b6a90024 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: edc5021d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 935, Version: v1} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: edc5021d, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e94b465, StatelessResetToken: 0x11348a36f71a98e4cb2ceca3a694bdca} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 51481600, StatelessResetToken: 0xe9a1d2d4156908eca5c7f1174a360942} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 45fc555e, StatelessResetToken: 0xed221f0d3ad695ae7134a07996d06794} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f528a1e, StatelessResetToken: 0x30b476139b9eefe6a999fb6225c23f96} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70a3292b, StatelessResetToken: 0x83d39952f46359be36ebd1b4f83eff50} 2025/04/30 11:59:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:19 server -> Sending packet 2 (1280 bytes) for connection cd1019f6d28ad2c0e8b6a90024, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: edc5021d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:19 server -> Sending packet 3 (1280 bytes) for connection cd1019f6d28ad2c0e8b6a90024, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: edc5021d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:19 server -> Sending packet 1 (192 bytes) for connection cd1019f6d28ad2c0e8b6a90024, Handshake 2025/04/30 11:59:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: edc5021d, PacketNumber: 1, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:19 server -> Sending packet 2 (192 bytes) for connection cd1019f6d28ad2c0e8b6a90024, Handshake 2025/04/30 11:59:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: edc5021d, PacketNumber: 2, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:19 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:59:19 server <- Reading packet 3 (125 bytes) for connection edc5021d, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: edc5021d, SrcConnectionID: (empty), Token: 0x4bea749f130bb55dc47787d1f38becf8e2097b771cd531108eb13bca06c57318c13b8b4f8460bd536ee9c8b62f7f2edfe02fc73fefb562fbbdd1781fdae4651c22e27491d514012d3baa8d8d2d16d550f63c4d115001, PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 496µs} 2025/04/30 11:59:19 server coalesced packet has different destination connection ID: 00000000, expected edc5021d 2025/04/30 11:59:19 server <- Reading packet 0 (74 bytes) for connection edc5021d, Handshake 2025/04/30 11:59:19 server Long Header{Type: Handshake, DestConnectionID: edc5021d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:19 server Dropping Initial keys. 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 456µs} 2025/04/30 11:59:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:19 Retiring connection ID cd1019f6d28ad2c0e8b6a90024 in 5s. 2025/04/30 11:59:19 server Dropping Handshake keys. 2025/04/30 11:59:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:19 server -> Sending packet 2 (371 bytes) for connection cd1019f6d28ad2c0e8b6a90024, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:19 server -> &wire.NewTokenFrame{Token: 0x38a482037f9024125412e9960d98b73ff58df2cbb615ab950c63a3ba1dd4892ecb9acef855a26a7011b243014c35e53116d1cde9bc87f32eb1165aaaa2312e18cb2b8515202b1d21fa5536ed87958b0b1b40d7a96340} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70a3292b, StatelessResetToken: 0x83d39952f46359be36ebd1b4f83eff50} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f528a1e, StatelessResetToken: 0x30b476139b9eefe6a999fb6225c23f96} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e94b465, StatelessResetToken: 0x11348a36f71a98e4cb2ceca3a694bdca} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 45fc555e, StatelessResetToken: 0xed221f0d3ad695ae7134a07996d06794} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 51481600, StatelessResetToken: 0xe9a1d2d4156908eca5c7f1174a360942} 2025/04/30 11:59:19 server -> Sending packet 3 (371 bytes) for connection cd1019f6d28ad2c0e8b6a90024, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 45fc555e, StatelessResetToken: 0xed221f0d3ad695ae7134a07996d06794} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70a3292b, StatelessResetToken: 0x83d39952f46359be36ebd1b4f83eff50} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e94b465, StatelessResetToken: 0x11348a36f71a98e4cb2ceca3a694bdca} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 51481600, StatelessResetToken: 0xe9a1d2d4156908eca5c7f1174a360942} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f528a1e, StatelessResetToken: 0x30b476139b9eefe6a999fb6225c23f96} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:19 server -> &wire.NewTokenFrame{Token: 0x38a482037f9024125412e9960d98b73ff58df2cbb615ab950c63a3ba1dd4892ecb9acef855a26a7011b243014c35e53116d1cde9bc87f32eb1165aaaa2312e18cb2b8515202b1d21fa5536ed87958b0b1b40d7a96340} 2025/04/30 11:59:19 server <- Reading packet 0 (42 bytes) for connection edc5021d, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: edc5021d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:19 server -> Sending packet 4 (27 bytes) for connection cd1019f6d28ad2c0e8b6a90024, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 423.895µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:19 Received request: GET /bkfhlpqlcn 2025/04/30 11:59:19 server -> Sending packet 5 (1045 bytes) for connection cd1019f6d28ad2c0e8b6a90024, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:19 Removing connection IDs [6808655a e35245f3 c91eb6a1 5d48e734 4364e45f 24f4bc8a] for a closed connection after it has been retired. 2025/04/30 11:59:19 server <- Reading packet 1 (1352 bytes) for connection edc5021d, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: edc5021d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 296µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server newly acked packets (1): [3] 2025/04/30 11:59:19 server updated RTT: 32.838227ms (σ: 16.419113ms) 2025/04/30 11:59:19 server ECN capability confirmed. 2025/04/30 11:59:19 server <- &wire.PingFrame{} 2025/04/30 11:59:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:19 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:19 server -> Sending packet 6 (28 bytes) for connection cd1019f6d28ad2c0e8b6a90024, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.342446ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:19 Tracking 56 connection IDs and 0 reset tokens. 2025/04/30 11:59:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:19 server -> Sending packet 8 (1045 bytes) for connection cd1019f6d28ad2c0e8b6a90024, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:19 server -> Sending packet 9 (1045 bytes) for connection cd1019f6d28ad2c0e8b6a90024, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:19 server <- Reading packet 3 (32 bytes) for connection edc5021d, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: edc5021d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server <- Reading packet 4 (43 bytes) for connection edc5021d, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: edc5021d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 248µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:19 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:19 Replacing connection for connection IDs [70a3292b 51481600 edc5021d 45fc555e 9e94b465 6f528a1e] with a closed connection. 2025/04/30 11:59:19 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:19 server Connection cd1019f6d28ad2c0e8b6a90024 closed. 2025/04/30 11:59:19 Removing connection ID f7e5c3b107364e16 after it has been retired. 2025/04/30 11:59:19 Removing connection IDs [6182f310 839533d7 fadf3fbb e994b727 ee0459e4 860e4e7d] for a closed connection after it has been retired. 2025/04/30 11:59:19 server <- Received Initial packet. 2025/04/30 11:59:19 Created qlog file: /logs/qlog/f56f040a6ffbfcce.sqlog 2025/04/30 11:59:19 server Changing connection ID to 7d9d6824. 2025/04/30 11:59:19 Adding connection IDs f56f040a6ffbfcce and 7d9d6824 for a new connection. 2025/04/30 11:59:19 server <- Reading packet 2 (1252 bytes) for connection f56f040a6ffbfcce, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: f56f040a6ffbfcce, SrcConnectionID: (empty), Token: 0x38a482037f9024125412e9960d98b73ff58df2cbb615ab950c63a3ba1dd4892ecb9acef855a26a7011b243014c35e53116d1cde9bc87f32eb1165aaaa2312e18cb2b8515202b1d21fa5536ed87958b0b1b40d7a96340, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:19 server -> Sending packet 0 (40 bytes) for connection f56f040a6ffbfcce, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7d9d6824, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:19 server <- Reading packet 3 (708 bytes) for connection f56f040a6ffbfcce, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: f56f040a6ffbfcce, SrcConnectionID: (empty), Token: 0x38a482037f9024125412e9960d98b73ff58df2cbb615ab950c63a3ba1dd4892ecb9acef855a26a7011b243014c35e53116d1cde9bc87f32eb1165aaaa2312e18cb2b8515202b1d21fa5536ed87958b0b1b40d7a96340, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:19 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:19 Adding connection ID a9116eda. 2025/04/30 11:59:19 Adding connection ID 3483bdf1. 2025/04/30 11:59:19 Adding connection ID a58eecd2. 2025/04/30 11:59:19 Adding connection ID a88eabd9. 2025/04/30 11:59:19 Adding connection ID 63302c30. 2025/04/30 11:59:19 server coalesced packet has different destination connection ID: 00000000, expected f56f040a6ffbfcce 2025/04/30 11:59:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f56f040a6ffbfcce 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7d9d6824, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7d9d6824, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3483bdf1, StatelessResetToken: 0x2170bd188002ace457980a6f9893b877} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a88eabd9, StatelessResetToken: 0xcd3cdea3268a6967567b2bdb36bb31ca} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a58eecd2, StatelessResetToken: 0x4302294e0317ff7577ca737a9336b461} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 63302c30, StatelessResetToken: 0x7a3941675f18617fdfba9bff7274cf4c} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a9116eda, StatelessResetToken: 0x18fe5cd01b1e9d7492a40c16a7fd6266} 2025/04/30 11:59:19 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:19 server <- Reading packet 4 (704 bytes) for connection 7d9d6824, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: 7d9d6824, SrcConnectionID: (empty), Token: 0x38a482037f9024125412e9960d98b73ff58df2cbb615ab950c63a3ba1dd4892ecb9acef855a26a7011b243014c35e53116d1cde9bc87f32eb1165aaaa2312e18cb2b8515202b1d21fa5536ed87958b0b1b40d7a96340, PacketNumber: 4, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:19 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:19 server coalesced packet has different destination connection ID: 00000000, expected 7d9d6824 2025/04/30 11:59:19 server -> Sending packet 2 (40 bytes) for connection f56f040a6ffbfcce, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7d9d6824, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:59:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:19 server -> Sending packet 3 (1280 bytes) for connection f56f040a6ffbfcce, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7d9d6824, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:19 server -> Sending packet 4 (1280 bytes) for connection f56f040a6ffbfcce, Initial 2025/04/30 11:59:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7d9d6824, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:19 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:59:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:19 server -> Sending packet 1 (194 bytes) for connection f56f040a6ffbfcce, Handshake 2025/04/30 11:59:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7d9d6824, PacketNumber: 1, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:59:19 server -> Sending packet 2 (194 bytes) for connection f56f040a6ffbfcce, Handshake 2025/04/30 11:59:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7d9d6824, PacketNumber: 2, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:59:19 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:19 server <- Reading packet 1 (75 bytes) for connection 7d9d6824, Handshake 2025/04/30 11:59:19 server Long Header{Type: Handshake, DestConnectionID: 7d9d6824, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:19 server Dropping Initial keys. 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.952ms} 2025/04/30 11:59:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:19 Retiring connection ID f56f040a6ffbfcce in 5s. 2025/04/30 11:59:19 server Dropping Handshake keys. 2025/04/30 11:59:19 server <- Reading packet 2 (42 bytes) for connection 7d9d6824, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: 7d9d6824, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:19 Received request: GET /qcxlawvffk 2025/04/30 11:59:19 server -> Sending packet 2 (379 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 293.78µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a58eecd2, StatelessResetToken: 0x4302294e0317ff7577ca737a9336b461} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 63302c30, StatelessResetToken: 0x7a3941675f18617fdfba9bff7274cf4c} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a9116eda, StatelessResetToken: 0x18fe5cd01b1e9d7492a40c16a7fd6266} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a88eabd9, StatelessResetToken: 0xcd3cdea3268a6967567b2bdb36bb31ca} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3483bdf1, StatelessResetToken: 0x2170bd188002ace457980a6f9893b877} 2025/04/30 11:59:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:19 server -> &wire.NewTokenFrame{Token: 0x96d65d62d9bd45b82fa9c2bb41bc99628175453bc3c0e776eeda82e777835daff80729d4ffca8a36d8a71b471859580c9ff2296b024193c86574aea9d0347a2fd074607f5869169e405b17be55a3c86809ff771bf435} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:19 server -> Sending packet 3 (1280 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.NewTokenFrame{Token: 0x96d65d62d9bd45b82fa9c2bb41bc99628175453bc3c0e776eeda82e777835daff80729d4ffca8a36d8a71b471859580c9ff2296b024193c86574aea9d0347a2fd074607f5869169e405b17be55a3c86809ff771bf435} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a9116eda, StatelessResetToken: 0x18fe5cd01b1e9d7492a40c16a7fd6266} 2025/04/30 11:59:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a58eecd2, StatelessResetToken: 0x4302294e0317ff7577ca737a9336b461} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a88eabd9, StatelessResetToken: 0xcd3cdea3268a6967567b2bdb36bb31ca} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3483bdf1, StatelessResetToken: 0x2170bd188002ace457980a6f9893b877} 2025/04/30 11:59:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 63302c30, StatelessResetToken: 0x7a3941675f18617fdfba9bff7274cf4c} 2025/04/30 11:59:19 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:59:19 server -> Sending packet 4 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:19 server <- Reading packet 0 (42 bytes) for connection 7d9d6824, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: 7d9d6824, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:19 server Queueing ACK because packet 0 was missing before. 2025/04/30 11:59:19 server <- Reading packet 1 (28 bytes) for connection 7d9d6824, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: 7d9d6824, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.232ms} 2025/04/30 11:59:19 server -> Sending packet 5 (28 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 676.206µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server <- Reading packet 3 (1352 bytes) for connection 7d9d6824, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: 7d9d6824, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 480µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server <- &wire.PingFrame{} 2025/04/30 11:59:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:19 server <- Reading packet 4 (1392 bytes) for connection 7d9d6824, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: 7d9d6824, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.PingFrame{} 2025/04/30 11:59:19 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:19 server -> Sending packet 6 (27 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:19 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 86.422µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:19 Removing connection ID 63458af2d70d9770e27e68e691583a after it has been retired. 2025/04/30 11:59:19 server <- Reading packet 5 (33 bytes) for connection 7d9d6824, 1-RTT 2025/04/30 11:59:19 server Short Header{DestConnectionID: 7d9d6824, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 20.344ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:19 server newly acked packets (1): [3] 2025/04/30 11:59:19 server updated RTT: 52.801448ms (σ: 26.400724ms) 2025/04/30 11:59:19 server ECN capability confirmed. 2025/04/30 11:59:19 Removing connection IDs [9a0238d8 4bec2769 edd27eae ae8d6dbd e6f7f3c7 1fd815b4] for a closed connection after it has been retired. 2025/04/30 11:59:20 server <- Reading packet 7 (25 bytes) for connection 7d9d6824, 1-RTT 2025/04/30 11:59:20 server Short Header{DestConnectionID: 7d9d6824, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:20 server <- &wire.PingFrame{} 2025/04/30 11:59:20 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:20 server -> Sending packet 7 (29 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 0}}, DelayTime: 105.097µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:20 server -> Sending packet 9 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:20 server -> Sending packet 10 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:20 server <- Reading packet 9 (32 bytes) for connection 7d9d6824, 1-RTT 2025/04/30 11:59:20 server Short Header{DestConnectionID: 7d9d6824, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:20 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 80µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server <- Received Initial packet. 2025/04/30 11:59:20 Created qlog file: /logs/qlog/189958cd3a0e7bd6.sqlog 2025/04/30 11:59:20 server Changing connection ID to 7f5af08f. 2025/04/30 11:59:20 Adding connection IDs 189958cd3a0e7bd6 and 7f5af08f for a new connection. 2025/04/30 11:59:20 server <- Reading packet 0 (1252 bytes) for connection 189958cd3a0e7bd6, Initial 2025/04/30 11:59:20 server Long Header{Type: Initial, DestConnectionID: 189958cd3a0e7bd6, SrcConnectionID: (empty), Token: 0x96d65d62d9bd45b82fa9c2bb41bc99628175453bc3c0e776eeda82e777835daff80729d4ffca8a36d8a71b471859580c9ff2296b024193c86574aea9d0347a2fd074607f5869169e405b17be55a3c86809ff771bf435, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:20 server -> Sending packet 0 (40 bytes) for connection 189958cd3a0e7bd6, Initial 2025/04/30 11:59:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7f5af08f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:59:20 server -> Sending packet 12 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:20 server -> Sending packet 13 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:20 server -> Sending packet 14 (1366 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.PingFrame{} 2025/04/30 11:59:20 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:20 server <- Reading packet 2 (704 bytes) for connection 7f5af08f, Initial 2025/04/30 11:59:20 server Long Header{Type: Initial, DestConnectionID: 7f5af08f, SrcConnectionID: (empty), Token: 0x96d65d62d9bd45b82fa9c2bb41bc99628175453bc3c0e776eeda82e777835daff80729d4ffca8a36d8a71b471859580c9ff2296b024193c86574aea9d0347a2fd074607f5869169e405b17be55a3c86809ff771bf435, PacketNumber: 2, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:20 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:20 Adding connection ID 05655902. 2025/04/30 11:59:20 Adding connection ID 8edbd98e. 2025/04/30 11:59:20 Adding connection ID 23cd07e3. 2025/04/30 11:59:20 Adding connection ID 10c8d1bb. 2025/04/30 11:59:20 Adding connection ID c75232f2. 2025/04/30 11:59:20 server coalesced packet has different destination connection ID: 00000000, expected 7f5af08f 2025/04/30 11:59:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 189958cd3a0e7bd6 2025/04/30 11:59:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7f5af08f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 935, Version: v1} 2025/04/30 11:59:20 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7f5af08f, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8edbd98e, StatelessResetToken: 0x2ffd38513b0bd30579631f2537e7a472} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10c8d1bb, StatelessResetToken: 0x8ede8574df19a4c7739d4208e0aa9bae} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c75232f2, StatelessResetToken: 0xb5ab3634c276a2ed7b54b8c36a43b2e2} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05655902, StatelessResetToken: 0xe9832f258e33661aa98529dfddf95124} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23cd07e3, StatelessResetToken: 0x900a10c2311d6046519d5c34ce5210ab} 2025/04/30 11:59:20 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:20 server -> Sending packet 2 (1280 bytes) for connection 189958cd3a0e7bd6, Initial 2025/04/30 11:59:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7f5af08f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:20 server -> Sending packet 3 (1280 bytes) for connection 189958cd3a0e7bd6, Initial 2025/04/30 11:59:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7f5af08f, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:20 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:59:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:20 server -> Sending packet 1 (192 bytes) for connection 189958cd3a0e7bd6, Handshake 2025/04/30 11:59:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7f5af08f, PacketNumber: 1, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:20 server -> Sending packet 2 (192 bytes) for connection 189958cd3a0e7bd6, Handshake 2025/04/30 11:59:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7f5af08f, PacketNumber: 2, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:20 server <- Reading packet 1 (74 bytes) for connection 7f5af08f, Handshake 2025/04/30 11:59:20 server Long Header{Type: Handshake, DestConnectionID: 7f5af08f, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:20 server Dropping Initial keys. 2025/04/30 11:59:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 11:59:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:20 Retiring connection ID 189958cd3a0e7bd6 in 5s. 2025/04/30 11:59:20 server Dropping Handshake keys. 2025/04/30 11:59:20 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:59:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:20 server -> Sending packet 2 (371 bytes) for connection 189958cd3a0e7bd6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05655902, StatelessResetToken: 0xe9832f258e33661aa98529dfddf95124} 2025/04/30 11:59:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c75232f2, StatelessResetToken: 0xb5ab3634c276a2ed7b54b8c36a43b2e2} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8edbd98e, StatelessResetToken: 0x2ffd38513b0bd30579631f2537e7a472} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23cd07e3, StatelessResetToken: 0x900a10c2311d6046519d5c34ce5210ab} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10c8d1bb, StatelessResetToken: 0x8ede8574df19a4c7739d4208e0aa9bae} 2025/04/30 11:59:20 server -> &wire.NewTokenFrame{Token: 0x81981678ed39b1b5744604bdcaeeae2e4e01b5bc5878d4c0d186b15c2d0c41916f1c4d71a867b241be6935a3f4793e82b2f4db189356812559e66c2ee846dbfdc06a4b5de15ff545d58b7bd4a1e86cf50e98deb28040} 2025/04/30 11:59:20 server -> Sending packet 3 (371 bytes) for connection 189958cd3a0e7bd6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10c8d1bb, StatelessResetToken: 0x8ede8574df19a4c7739d4208e0aa9bae} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8edbd98e, StatelessResetToken: 0x2ffd38513b0bd30579631f2537e7a472} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c75232f2, StatelessResetToken: 0xb5ab3634c276a2ed7b54b8c36a43b2e2} 2025/04/30 11:59:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23cd07e3, StatelessResetToken: 0x900a10c2311d6046519d5c34ce5210ab} 2025/04/30 11:59:20 server -> &wire.NewTokenFrame{Token: 0x81981678ed39b1b5744604bdcaeeae2e4e01b5bc5878d4c0d186b15c2d0c41916f1c4d71a867b241be6935a3f4793e82b2f4db189356812559e66c2ee846dbfdc06a4b5de15ff545d58b7bd4a1e86cf50e98deb28040} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05655902, StatelessResetToken: 0xe9832f258e33661aa98529dfddf95124} 2025/04/30 11:59:20 server <- Reading packet 1 (28 bytes) for connection 7f5af08f, 1-RTT 2025/04/30 11:59:20 server Short Header{DestConnectionID: 7f5af08f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.464ms} 2025/04/30 11:59:20 Removing connection ID 888b7600de0a3fd0 after it has been retired. 2025/04/30 11:59:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:59:20 server -> Sending packet 5 (371 bytes) for connection 189958cd3a0e7bd6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c75232f2, StatelessResetToken: 0xb5ab3634c276a2ed7b54b8c36a43b2e2} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23cd07e3, StatelessResetToken: 0x900a10c2311d6046519d5c34ce5210ab} 2025/04/30 11:59:20 server -> &wire.NewTokenFrame{Token: 0x81981678ed39b1b5744604bdcaeeae2e4e01b5bc5878d4c0d186b15c2d0c41916f1c4d71a867b241be6935a3f4793e82b2f4db189356812559e66c2ee846dbfdc06a4b5de15ff545d58b7bd4a1e86cf50e98deb28040} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8edbd98e, StatelessResetToken: 0x2ffd38513b0bd30579631f2537e7a472} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10c8d1bb, StatelessResetToken: 0x8ede8574df19a4c7739d4208e0aa9bae} 2025/04/30 11:59:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05655902, StatelessResetToken: 0xe9832f258e33661aa98529dfddf95124} 2025/04/30 11:59:20 server -> Sending packet 6 (371 bytes) for connection 189958cd3a0e7bd6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8edbd98e, StatelessResetToken: 0x2ffd38513b0bd30579631f2537e7a472} 2025/04/30 11:59:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 05655902, StatelessResetToken: 0xe9832f258e33661aa98529dfddf95124} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c75232f2, StatelessResetToken: 0xb5ab3634c276a2ed7b54b8c36a43b2e2} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23cd07e3, StatelessResetToken: 0x900a10c2311d6046519d5c34ce5210ab} 2025/04/30 11:59:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10c8d1bb, StatelessResetToken: 0x8ede8574df19a4c7739d4208e0aa9bae} 2025/04/30 11:59:20 server -> &wire.NewTokenFrame{Token: 0x81981678ed39b1b5744604bdcaeeae2e4e01b5bc5878d4c0d186b15c2d0c41916f1c4d71a867b241be6935a3f4793e82b2f4db189356812559e66c2ee846dbfdc06a4b5de15ff545d58b7bd4a1e86cf50e98deb28040} 2025/04/30 11:59:20 server <- Reading packet 3 (1392 bytes) for connection 7f5af08f, 1-RTT 2025/04/30 11:59:20 server Short Header{DestConnectionID: 7f5af08f, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:20 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 136µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server newly acked packets (1): [6] 2025/04/30 11:59:20 server updated RTT: 32.853988ms (σ: 16.426994ms) 2025/04/30 11:59:20 server ECN capability confirmed. 2025/04/30 11:59:20 server Canceling loss detection timer. 2025/04/30 11:59:20 server <- &wire.PingFrame{} 2025/04/30 11:59:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:20 server -> Sending packet 7 (29 bytes) for connection 189958cd3a0e7bd6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 175.088µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server <- Reading packet 4 (1444 bytes) for connection 7f5af08f, 1-RTT 2025/04/30 11:59:20 server Short Header{DestConnectionID: 7f5af08f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:20 server <- &wire.PingFrame{} 2025/04/30 11:59:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:20 server -> Sending packet 8 (1366 bytes) for connection 189958cd3a0e7bd6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.PingFrame{} 2025/04/30 11:59:20 Received request: GET /rfgvpfojjg 2025/04/30 11:59:20 server -> Sending packet 9 (1055 bytes) for connection 189958cd3a0e7bd6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:20 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 355.919µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:20 server <- Reading packet 5 (30 bytes) for connection 7f5af08f, 1-RTT 2025/04/30 11:59:20 server Short Header{DestConnectionID: 7f5af08f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:20 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 72µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server newly acked packets (1): [8] 2025/04/30 11:59:20 server updated RTT: 32.747ms (σ: 12.531ms) 2025/04/30 11:59:20 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 11:59:20 server <- Reading packet 7 (41 bytes) for connection 7f5af08f, 1-RTT 2025/04/30 11:59:20 server Short Header{DestConnectionID: 7f5af08f, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:20 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, DelayTime: 344µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:20 server newly acked packets (1): [9] 2025/04/30 11:59:20 server updated RTT: 32.827ms (σ: 9.56ms) 2025/04/30 11:59:20 server Canceling loss detection timer. 2025/04/30 11:59:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:20 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:20 Replacing connection for connection IDs [05655902 8edbd98e 23cd07e3 10c8d1bb c75232f2 7f5af08f] with a closed connection. 2025/04/30 11:59:20 server Connection 189958cd3a0e7bd6 closed. 2025/04/30 11:59:20 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:20 Removing connection IDs [00ece923 55c00349 3d3052dc 9046ae58 2115a06a dc6dd62f] for a closed connection after it has been retired. 2025/04/30 11:59:21 server <- Received Initial packet. 2025/04/30 11:59:21 Created qlog file: /logs/qlog/103009399f473a31.sqlog 2025/04/30 11:59:21 server Changing connection ID to 28bcc778. 2025/04/30 11:59:21 Adding connection IDs 103009399f473a31 and 28bcc778 for a new connection. 2025/04/30 11:59:21 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:21 server <- Reading packet 3 (708 bytes) for connection 103009399f473a31, Initial 2025/04/30 11:59:21 server Long Header{Type: Initial, DestConnectionID: 103009399f473a31, SrcConnectionID: (empty), Token: 0x81981678ed39b1b5744604bdcaeeae2e4e01b5bc5878d4c0d186b15c2d0c41916f1c4d71a867b241be6935a3f4793e82b2f4db189356812559e66c2ee846dbfdc06a4b5de15ff545d58b7bd4a1e86cf50e98deb28040, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:21 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:21 server coalesced packet has different destination connection ID: 00000000, expected 103009399f473a31 2025/04/30 11:59:21 server -> Sending packet 0 (40 bytes) for connection 103009399f473a31, Initial 2025/04/30 11:59:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28bcc778, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:21 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:59:21 server -> Sending packet 16 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:21 server -> Sending packet 17 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:21 Tracking 51 connection IDs and 0 reset tokens. 2025/04/30 11:59:21 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:59:21 server <- Reading packet 6 (1248 bytes) for connection 28bcc778, Initial 2025/04/30 11:59:21 server Long Header{Type: Initial, DestConnectionID: 28bcc778, SrcConnectionID: (empty), Token: 0x81981678ed39b1b5744604bdcaeeae2e4e01b5bc5878d4c0d186b15c2d0c41916f1c4d71a867b241be6935a3f4793e82b2f4db189356812559e66c2ee846dbfdc06a4b5de15ff545d58b7bd4a1e86cf50e98deb28040, PacketNumber: 6, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:21 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:21 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:21 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:21 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:21 Adding connection ID eff21041. 2025/04/30 11:59:21 Adding connection ID 69d148d9. 2025/04/30 11:59:21 Adding connection ID ce0396b2. 2025/04/30 11:59:21 Adding connection ID 002777e9. 2025/04/30 11:59:21 Adding connection ID 4839b2a2. 2025/04/30 11:59:21 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:59:21 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 103009399f473a31 2025/04/30 11:59:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28bcc778, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 941, Version: v1} 2025/04/30 11:59:21 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 28bcc778, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 69d148d9, StatelessResetToken: 0xaefc09446adc0cfc8319d45ccb39834a} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 002777e9, StatelessResetToken: 0xbca57df1a16362aef0290eaee610a372} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eff21041, StatelessResetToken: 0xd1443cd2b303ef6b236f45a4fa34d8f4} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ce0396b2, StatelessResetToken: 0x24a73d75287480358e3bad22e6603f97} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4839b2a2, StatelessResetToken: 0x4aa0b627e68a3f5da50af9b3bcd6096a} 2025/04/30 11:59:21 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:21 server -> Sending packet 2 (1280 bytes) for connection 103009399f473a31, Initial 2025/04/30 11:59:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28bcc778, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:21 server -> Sending packet 3 (1280 bytes) for connection 103009399f473a31, Initial 2025/04/30 11:59:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 28bcc778, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:21 server -> Sending packet 1 (186 bytes) for connection 103009399f473a31, Handshake 2025/04/30 11:59:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 28bcc778, PacketNumber: 1, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:21 server -> Sending packet 2 (186 bytes) for connection 103009399f473a31, Handshake 2025/04/30 11:59:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 28bcc778, PacketNumber: 2, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:21 server <- Reading packet 1 (74 bytes) for connection 28bcc778, Handshake 2025/04/30 11:59:21 server Long Header{Type: Handshake, DestConnectionID: 28bcc778, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:21 server Dropping Initial keys. 2025/04/30 11:59:21 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs} 2025/04/30 11:59:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:21 Retiring connection ID 103009399f473a31 in 5s. 2025/04/30 11:59:21 server Dropping Handshake keys. 2025/04/30 11:59:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:21 server -> Sending packet 2 (371 bytes) for connection 103009399f473a31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ce0396b2, StatelessResetToken: 0x24a73d75287480358e3bad22e6603f97} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eff21041, StatelessResetToken: 0xd1443cd2b303ef6b236f45a4fa34d8f4} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 002777e9, StatelessResetToken: 0xbca57df1a16362aef0290eaee610a372} 2025/04/30 11:59:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 69d148d9, StatelessResetToken: 0xaefc09446adc0cfc8319d45ccb39834a} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4839b2a2, StatelessResetToken: 0x4aa0b627e68a3f5da50af9b3bcd6096a} 2025/04/30 11:59:21 server -> &wire.NewTokenFrame{Token: 0xd027f6cc4f80101137a39a1280420f8bd56b035f7ff72e4479b8a858b891e2b9bdb2217dbbc82766ed2f5a073f6205516d5d273293a470cfeba6a34e4c17cb943c79c6bb44c00736457e4c78a637d9e05892551abf0a} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:21 server -> Sending packet 3 (371 bytes) for connection 103009399f473a31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eff21041, StatelessResetToken: 0xd1443cd2b303ef6b236f45a4fa34d8f4} 2025/04/30 11:59:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4839b2a2, StatelessResetToken: 0x4aa0b627e68a3f5da50af9b3bcd6096a} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 002777e9, StatelessResetToken: 0xbca57df1a16362aef0290eaee610a372} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 69d148d9, StatelessResetToken: 0xaefc09446adc0cfc8319d45ccb39834a} 2025/04/30 11:59:21 server -> &wire.NewTokenFrame{Token: 0xd027f6cc4f80101137a39a1280420f8bd56b035f7ff72e4479b8a858b891e2b9bdb2217dbbc82766ed2f5a073f6205516d5d273293a470cfeba6a34e4c17cb943c79c6bb44c00736457e4c78a637d9e05892551abf0a} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ce0396b2, StatelessResetToken: 0x24a73d75287480358e3bad22e6603f97} 2025/04/30 11:59:21 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:59:21 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:21 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:59:21 server <- Reading packet 2 (42 bytes) for connection 28bcc778, 1-RTT 2025/04/30 11:59:21 server Short Header{DestConnectionID: 28bcc778, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:21 server -> Sending packet 4 (24 bytes) for connection 103009399f473a31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 156.152µs} 2025/04/30 11:59:21 Received request: GET /qjwszkykgl 2025/04/30 11:59:21 server -> Sending packet 5 (1045 bytes) for connection 103009399f473a31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:59:21 server -> Sending packet 7 (371 bytes) for connection 103009399f473a31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 002777e9, StatelessResetToken: 0xbca57df1a16362aef0290eaee610a372} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 69d148d9, StatelessResetToken: 0xaefc09446adc0cfc8319d45ccb39834a} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eff21041, StatelessResetToken: 0xd1443cd2b303ef6b236f45a4fa34d8f4} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4839b2a2, StatelessResetToken: 0x4aa0b627e68a3f5da50af9b3bcd6096a} 2025/04/30 11:59:21 server -> &wire.NewTokenFrame{Token: 0xd027f6cc4f80101137a39a1280420f8bd56b035f7ff72e4479b8a858b891e2b9bdb2217dbbc82766ed2f5a073f6205516d5d273293a470cfeba6a34e4c17cb943c79c6bb44c00736457e4c78a637d9e05892551abf0a} 2025/04/30 11:59:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ce0396b2, StatelessResetToken: 0x24a73d75287480358e3bad22e6603f97} 2025/04/30 11:59:21 server Skipping packet number 6 2025/04/30 11:59:21 server -> Sending packet 8 (1045 bytes) for connection 103009399f473a31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:21 server -> Sending packet 9 (1366 bytes) for connection 103009399f473a31, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:21 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:21 server -> &wire.PingFrame{} 2025/04/30 11:59:21 Removing connection ID 1e578aa56cd4be6b after it has been retired. 2025/04/30 11:59:21 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 45 bytes. 2025/04/30 11:59:21 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 11:59:21 server <- Reading packet 5 (45 bytes) for connection 28bcc778, 1-RTT 2025/04/30 11:59:21 server Short Header{DestConnectionID: 28bcc778, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:21 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 368µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:21 server newly acked packets (1): [8] 2025/04/30 11:59:21 server updated RTT: 33.047861ms (σ: 16.52393ms) 2025/04/30 11:59:21 server ECN capability confirmed. 2025/04/30 11:59:21 server setting loss timer for packet 7 (1-RTT) to 37.178843ms (in 2025-04-30 11:59:21.603675584 +0000 UTC m=+12.371539720) 2025/04/30 11:59:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:21 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:21 Replacing connection for connection IDs [ce0396b2 002777e9 4839b2a2 28bcc778 eff21041 69d148d9] with a closed connection. 2025/04/30 11:59:21 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:21 server Connection 103009399f473a31 closed. 2025/04/30 11:59:21 server <- Received Initial packet. 2025/04/30 11:59:21 Created qlog file: /logs/qlog/ca4d3bd6f76544d7.sqlog 2025/04/30 11:59:21 server Changing connection ID to 689389f1. 2025/04/30 11:59:21 Adding connection IDs ca4d3bd6f76544d7 and 689389f1 for a new connection. 2025/04/30 11:59:21 server <- Reading packet 0 (1252 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:21 server Long Header{Type: Initial, DestConnectionID: ca4d3bd6f76544d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:59:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:59:21 server -> Sending packet 0 (40 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 689389f1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:21 Removing connection IDs [1e954030 ab8b47e8 433e3af2 c23e08d3 085e05d4 87b81795] for a closed connection after it has been retired. 2025/04/30 11:59:22 server <- Reading packet 2 (1252 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: ca4d3bd6f76544d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:59:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:59:22 server -> Sending packet 1 (42 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 689389f1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:22 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:22 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:59:22 server <- Reading packet 3 (366 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: ca4d3bd6f76544d7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:59:22 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:59:22 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:22 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:22 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:22 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:22 Adding connection ID c9ae0d3a. 2025/04/30 11:59:22 Adding connection ID 63d8080c. 2025/04/30 11:59:22 Adding connection ID 984e5702. 2025/04/30 11:59:22 Adding connection ID ccbe1c75. 2025/04/30 11:59:22 Adding connection ID c5d3d2cf. 2025/04/30 11:59:22 server coalesced packet has different destination connection ID: 00000000, expected ca4d3bd6f76544d7 2025/04/30 11:59:22 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ca4d3bd6f76544d7 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 689389f1, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 395, Version: v1} 2025/04/30 11:59:22 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 689389f1, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:59:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:59:22 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63d8080c, StatelessResetToken: 0x4b157c0988a4cd31d4b88ed226aa487a} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c5d3d2cf, StatelessResetToken: 0x0cceba9d9a8491200fee5c802608eb4c} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9ae0d3a, StatelessResetToken: 0xa65e42635d67e3366149acf2934403c6} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ccbe1c75, StatelessResetToken: 0x23e4f33bab94da24420b2feafd137657} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 984e5702, StatelessResetToken: 0x4fe81158e7734c8f987e3dd4cb8cbce2} 2025/04/30 11:59:22 server Parsed a coalesced packet. Part 1: 362 bytes. Remaining: 890 bytes. 2025/04/30 11:59:22 server <- Reading packet 4 (362 bytes) for connection 689389f1, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: 689389f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:59:22 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:59:22 server coalesced packet has different destination connection ID: 00000000, expected 689389f1 2025/04/30 11:59:22 server -> Sending packet 3 (42 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 689389f1, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:22 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:22 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:22 server -> Sending packet 4 (1280 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 689389f1, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:22 server -> Sending packet 5 (1280 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 689389f1, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:22 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 1210 bytes. 2025/04/30 11:59:22 server <- Reading packet 7 (42 bytes) for connection 689389f1, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: 689389f1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 28, Version: v1} 2025/04/30 11:59:22 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 38.784ms} 2025/04/30 11:59:22 server newly acked packets (1): [5] 2025/04/30 11:59:22 server updated RTT: 73.051725ms (σ: 36.525862ms) 2025/04/30 11:59:22 server <- &wire.PingFrame{} 2025/04/30 11:59:22 server coalesced packet has different destination connection ID: 00000000, expected 689389f1 2025/04/30 11:59:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:22 server -> Sending packet 1 (732 bytes) for connection ca4d3bd6f76544d7, Handshake 2025/04/30 11:59:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 689389f1, PacketNumber: 1, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:59:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:59:22 server -> Sending packet 2 (732 bytes) for connection ca4d3bd6f76544d7, Handshake 2025/04/30 11:59:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 689389f1, PacketNumber: 2, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:59:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:59:22 server -> Sending packet 6 (44 bytes) for connection ca4d3bd6f76544d7, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 689389f1, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 11:59:22 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:22 Removing connection ID 2135703407deb24f after it has been retired. 2025/04/30 11:59:22 server <- Reading packet 0 (36 bytes) for connection 689389f1, Handshake 2025/04/30 11:59:22 server Long Header{Type: Handshake, DestConnectionID: 689389f1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:22 server Dropping Initial keys. 2025/04/30 11:59:22 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 752µs} 2025/04/30 11:59:22 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:59:22 server <- Reading packet 1 (69 bytes) for connection 689389f1, Handshake 2025/04/30 11:59:22 server Long Header{Type: Handshake, DestConnectionID: 689389f1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:59:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:22 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:22 Retiring connection ID ca4d3bd6f76544d7 in 5s. 2025/04/30 11:59:22 server Dropping Handshake keys. 2025/04/30 11:59:22 server <- Reading packet 0 (42 bytes) for connection 689389f1, 1-RTT 2025/04/30 11:59:22 server Short Header{DestConnectionID: 689389f1, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:22 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:22 Received request: GET /tdwcvbxova 2025/04/30 11:59:22 server -> Sending packet 2 (379 bytes) for connection ca4d3bd6f76544d7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:22 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:22 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272.811µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:22 server -> &wire.NewTokenFrame{Token: 0xe753eb3ce43600d4e3adba82e2fbaf80de2a647f7169169084556628ea28909a33862e1e3b01adc71d72b1fc8b1ed97f5878d06597b1f8e4369a896464638707ae906d15ae9b4d44dd3e3b24ce66f74fa8eca8ad586d} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 984e5702, StatelessResetToken: 0x4fe81158e7734c8f987e3dd4cb8cbce2} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9ae0d3a, StatelessResetToken: 0xa65e42635d67e3366149acf2934403c6} 2025/04/30 11:59:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63d8080c, StatelessResetToken: 0x4b157c0988a4cd31d4b88ed226aa487a} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c5d3d2cf, StatelessResetToken: 0x0cceba9d9a8491200fee5c802608eb4c} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ccbe1c75, StatelessResetToken: 0x23e4f33bab94da24420b2feafd137657} 2025/04/30 11:59:22 server -> Sending packet 3 (1280 bytes) for connection ca4d3bd6f76544d7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:22 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c5d3d2cf, StatelessResetToken: 0x0cceba9d9a8491200fee5c802608eb4c} 2025/04/30 11:59:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:22 server -> &wire.NewTokenFrame{Token: 0xe753eb3ce43600d4e3adba82e2fbaf80de2a647f7169169084556628ea28909a33862e1e3b01adc71d72b1fc8b1ed97f5878d06597b1f8e4369a896464638707ae906d15ae9b4d44dd3e3b24ce66f74fa8eca8ad586d} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9ae0d3a, StatelessResetToken: 0xa65e42635d67e3366149acf2934403c6} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 984e5702, StatelessResetToken: 0x4fe81158e7734c8f987e3dd4cb8cbce2} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63d8080c, StatelessResetToken: 0x4b157c0988a4cd31d4b88ed226aa487a} 2025/04/30 11:59:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ccbe1c75, StatelessResetToken: 0x23e4f33bab94da24420b2feafd137657} 2025/04/30 11:59:22 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:59:22 server -> Sending packet 4 (140 bytes) for connection ca4d3bd6f76544d7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:22 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:22 server <- Reading packet 1 (1352 bytes) for connection 689389f1, 1-RTT 2025/04/30 11:59:22 server Short Header{DestConnectionID: 689389f1, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:22 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 384µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:22 server <- &wire.PingFrame{} 2025/04/30 11:59:22 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:22 server <- Reading packet 2 (1392 bytes) for connection 689389f1, 1-RTT 2025/04/30 11:59:22 server Short Header{DestConnectionID: 689389f1, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:22 server <- &wire.PingFrame{} 2025/04/30 11:59:22 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:22 server -> Sending packet 5 (27 bytes) for connection ca4d3bd6f76544d7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:22 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:22 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 75.141µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:22 server <- Reading packet 3 (30 bytes) for connection 689389f1, 1-RTT 2025/04/30 11:59:22 server Short Header{DestConnectionID: 689389f1, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:22 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 16µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:22 server newly acked packets (2): [3 4] 2025/04/30 11:59:22 server updated RTT: 68.151ms (σ: 37.192ms) 2025/04/30 11:59:22 server ECN capability confirmed. 2025/04/30 11:59:22 server Canceling loss detection timer. 2025/04/30 11:59:22 server <- Reading packet 4 (41 bytes) for connection 689389f1, 1-RTT 2025/04/30 11:59:22 server Short Header{DestConnectionID: 689389f1, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:22 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 160µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:22 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:22 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:22 Replacing connection for connection IDs [c5d3d2cf 689389f1 c9ae0d3a 63d8080c 984e5702 ccbe1c75] with a closed connection. 2025/04/30 11:59:22 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:22 server Connection ca4d3bd6f76544d7 closed. 2025/04/30 11:59:22 Removing connection IDs [209743d6 7dc9637e 820ce89e 732b3c92 cdfc739b c07b9691] for a closed connection after it has been retired. 2025/04/30 11:59:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:59:22 server -> Sending packet 19 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:22 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:22 server -> Sending packet 20 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:22 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:22 server <- Received Initial packet. 2025/04/30 11:59:22 Created qlog file: /logs/qlog/0e99fc2886d38706008afe.sqlog 2025/04/30 11:59:22 server Changing connection ID to 09fceaf0. 2025/04/30 11:59:22 Adding connection IDs 0e99fc2886d38706008afe and 09fceaf0 for a new connection. 2025/04/30 11:59:22 server <- Reading packet 0 (1252 bytes) for connection 0e99fc2886d38706008afe, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: 0e99fc2886d38706008afe, SrcConnectionID: (empty), Token: 0xe753eb3ce43600d4e3adba82e2fbaf80de2a647f7169169084556628ea28909a33862e1e3b01adc71d72b1fc8b1ed97f5878d06597b1f8e4369a896464638707ae906d15ae9b4d44dd3e3b24ce66f74fa8eca8ad586d, PacketNumber: 0, PacketNumberLen: 1, Length: 1144, Version: v1} 2025/04/30 11:59:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 1123, Offset + Data length: 1123} 2025/04/30 11:59:22 server -> Sending packet 0 (40 bytes) for connection 0e99fc2886d38706008afe, Initial 2025/04/30 11:59:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 09fceaf0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:22 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:22 Removing connection ID 1a90a617cf1bbc58 after it has been retired. 2025/04/30 11:59:22 Removing connection IDs [46147ac7 a30c601e 69048a29 db3e659a e90c1ec9 eccbc5e2] for a closed connection after it has been retired. 2025/04/30 11:59:23 server Parsed a coalesced packet. Part 1: 707 bytes. Remaining: 545 bytes. 2025/04/30 11:59:23 server <- Reading packet 3 (707 bytes) for connection 09fceaf0, Initial 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: 09fceaf0, SrcConnectionID: (empty), Token: 0xe753eb3ce43600d4e3adba82e2fbaf80de2a647f7169169084556628ea28909a33862e1e3b01adc71d72b1fc8b1ed97f5878d06597b1f8e4369a896464638707ae906d15ae9b4d44dd3e3b24ce66f74fa8eca8ad586d, PacketNumber: 3, PacketNumberLen: 1, Length: 606, Version: v1} 2025/04/30 11:59:23 server <- &wire.CryptoFrame{Offset: 1123, Data length: 584, Offset + Data length: 1707} 2025/04/30 11:59:23 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:23 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:23 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:23 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:23 Adding connection ID 9da525f4. 2025/04/30 11:59:23 Adding connection ID 32678d94. 2025/04/30 11:59:23 Adding connection ID 74e72688. 2025/04/30 11:59:23 Adding connection ID 230ad931. 2025/04/30 11:59:23 Adding connection ID 3a79d606. 2025/04/30 11:59:23 server coalesced packet has different destination connection ID: 00000000, expected 09fceaf0 2025/04/30 11:59:23 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0e99fc2886d38706008afe 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 09fceaf0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 931, Version: v1} 2025/04/30 11:59:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:23 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 09fceaf0, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:59:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:59:23 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 230ad931, StatelessResetToken: 0xe3c37d33fdc56129019e972afca9785f} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 3a79d606, StatelessResetToken: 0x1c3bb3e8d755f3eb25c9768713d51ecf} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 32678d94, StatelessResetToken: 0x76139c592ca362fb42f7e2deb4788ee2} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 74e72688, StatelessResetToken: 0xe8e5259b422e50812295362f8d0e1b5a} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9da525f4, StatelessResetToken: 0xb67ac5f3e867d3d6f863e8e2591c89b7} 2025/04/30 11:59:23 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:23 server <- Reading packet 4 (124 bytes) for connection 09fceaf0, Initial 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: 09fceaf0, SrcConnectionID: (empty), Token: 0xe753eb3ce43600d4e3adba82e2fbaf80de2a647f7169169084556628ea28909a33862e1e3b01adc71d72b1fc8b1ed97f5878d06597b1f8e4369a896464638707ae906d15ae9b4d44dd3e3b24ce66f74fa8eca8ad586d, PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 992µs} 2025/04/30 11:59:23 server newly acked packets (1): [1] 2025/04/30 11:59:23 server updated RTT: 33.157141ms (σ: 16.57857ms) 2025/04/30 11:59:23 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:23 server <- Reading packet 0 (75 bytes) for connection 09fceaf0, Handshake 2025/04/30 11:59:23 server Long Header{Type: Handshake, DestConnectionID: 09fceaf0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:23 server Dropping Initial keys. 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 992µs} 2025/04/30 11:59:23 server newly acked packets (1): [0] 2025/04/30 11:59:23 server updated RTT: 33.157ms (σ: 12.433ms) 2025/04/30 11:59:23 server Canceling loss detection timer. 2025/04/30 11:59:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:23 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:23 Retiring connection ID 0e99fc2886d38706008afe in 5s. 2025/04/30 11:59:23 server Dropping Handshake keys. 2025/04/30 11:59:23 server <- Reading packet 0 (42 bytes) for connection 09fceaf0, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: 09fceaf0, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:23 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:23 server -> Sending packet 1 (259 bytes) for connection 0e99fc2886d38706008afe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:23 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:23 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368.99µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:23 server -> &wire.NewTokenFrame{Token: 0xe60bcf9b0dc791811ccf6714632ee9a97be994ee3682d0c6c9de49fe60ed9466038979976c71e63e716a8812ec8fa6e6477a8aedfbe3afbc585684d4776a854fc9557ef213b08a919b8de69f118479238a40e5d0e2d1} 2025/04/30 11:59:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:23 Received request: GET /ectxivnxhf 2025/04/30 11:59:23 server -> Sending packet 2 (1045 bytes) for connection 0e99fc2886d38706008afe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:23 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:23 server <- Reading packet 1 (28 bytes) for connection 09fceaf0, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: 09fceaf0, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.48ms} 2025/04/30 11:59:23 server newly acked packets (1): [0] 2025/04/30 11:59:23 server updated RTT: 35.559ms (σ: 14.129ms) 2025/04/30 11:59:23 server <- Reading packet 2 (1352 bytes) for connection 09fceaf0, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: 09fceaf0, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.PingFrame{} 2025/04/30 11:59:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:23 server <- Reading packet 3 (30 bytes) for connection 09fceaf0, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: 09fceaf0, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server newly acked packets (2): [1 2] 2025/04/30 11:59:23 server updated RTT: 35.151ms (σ: 11.411ms) 2025/04/30 11:59:23 server ECN capability confirmed. 2025/04/30 11:59:23 server Canceling loss detection timer. 2025/04/30 11:59:23 server Ignoring all packets below 1. 2025/04/30 11:59:23 server -> Sending packet 3 (30 bytes) for connection 0e99fc2886d38706008afe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:23 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 169.828µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:23 server <- Reading packet 4 (41 bytes) for connection 09fceaf0, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: 09fceaf0, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 232µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:23 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:23 Replacing connection for connection IDs [74e72688 230ad931 3a79d606 09fceaf0 9da525f4 32678d94] with a closed connection. 2025/04/30 11:59:23 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:23 server Connection 0e99fc2886d38706008afe closed. 2025/04/30 11:59:23 Tracking 49 connection IDs and 0 reset tokens. 2025/04/30 11:59:23 Removing connection ID 4e2e896d1e0d9fe310f43d12145ce4cdfc after it has been retired. 2025/04/30 11:59:23 server <- Received Initial packet. 2025/04/30 11:59:23 Created qlog file: /logs/qlog/de088032a6cc8960ac0e6a842a205998ab.sqlog 2025/04/30 11:59:23 server Changing connection ID to b44ff5db. 2025/04/30 11:59:23 Adding connection IDs de088032a6cc8960ac0e6a842a205998ab and b44ff5db for a new connection. 2025/04/30 11:59:23 server <- Reading packet 0 (1252 bytes) for connection de088032a6cc8960ac0e6a842a205998ab, Initial 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: de088032a6cc8960ac0e6a842a205998ab, SrcConnectionID: (empty), Token: 0xe60bcf9b0dc791811ccf6714632ee9a97be994ee3682d0c6c9de49fe60ed9466038979976c71e63e716a8812ec8fa6e6477a8aedfbe3afbc585684d4776a854fc9557ef213b08a919b8de69f118479238a40e5d0e2d1, PacketNumber: 0, PacketNumberLen: 1, Length: 1138, Version: v1} 2025/04/30 11:59:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 1117, Offset + Data length: 1117} 2025/04/30 11:59:23 server -> Sending packet 0 (40 bytes) for connection de088032a6cc8960ac0e6a842a205998ab, Initial 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b44ff5db, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:23 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server Parsed a coalesced packet. Part 1: 726 bytes. Remaining: 526 bytes. 2025/04/30 11:59:23 server <- Reading packet 1 (726 bytes) for connection de088032a6cc8960ac0e6a842a205998ab, Initial 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: de088032a6cc8960ac0e6a842a205998ab, SrcConnectionID: (empty), Token: 0xe60bcf9b0dc791811ccf6714632ee9a97be994ee3682d0c6c9de49fe60ed9466038979976c71e63e716a8812ec8fa6e6477a8aedfbe3afbc585684d4776a854fc9557ef213b08a919b8de69f118479238a40e5d0e2d1, PacketNumber: 1, PacketNumberLen: 1, Length: 612, Version: v1} 2025/04/30 11:59:23 server <- &wire.CryptoFrame{Offset: 1117, Data length: 590, Offset + Data length: 1707} 2025/04/30 11:59:23 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:23 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:23 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:23 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:23 Adding connection ID 4b397dea. 2025/04/30 11:59:23 Adding connection ID 6b772488. 2025/04/30 11:59:23 Adding connection ID 312d7c5b. 2025/04/30 11:59:23 Adding connection ID 13a361a3. 2025/04/30 11:59:23 Adding connection ID 16d044ef. 2025/04/30 11:59:23 server coalesced packet has different destination connection ID: 00000000, expected de088032a6cc8960ac0e6a842a205998ab 2025/04/30 11:59:23 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection de088032a6cc8960ac0e6a842a205998ab 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b44ff5db, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 920, Version: v1} 2025/04/30 11:59:23 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:23 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b44ff5db, PacketNumber: 0, PacketNumberLen: 2, Length: 194, Version: v1} 2025/04/30 11:59:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 172, Offset + Data length: 172} 2025/04/30 11:59:23 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 16d044ef, StatelessResetToken: 0x5247016213276c98b60baa8959857c3e} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 13a361a3, StatelessResetToken: 0x8ec51f1a14bdefc97a286f61217a7b85} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4b397dea, StatelessResetToken: 0xacb8ead6a1dbfb37951efdb71d62b1f8} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 312d7c5b, StatelessResetToken: 0x4740895130e8f703c6506db7b64fd8f0} 2025/04/30 11:59:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b772488, StatelessResetToken: 0x83a09a9a566bbd6fb36ada869ae5e665} 2025/04/30 11:59:23 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:23 server <- Reading packet 2 (124 bytes) for connection b44ff5db, Initial 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: b44ff5db, SrcConnectionID: (empty), Token: 0xe60bcf9b0dc791811ccf6714632ee9a97be994ee3682d0c6c9de49fe60ed9466038979976c71e63e716a8812ec8fa6e6477a8aedfbe3afbc585684d4776a854fc9557ef213b08a919b8de69f118479238a40e5d0e2d1, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 952µs} 2025/04/30 11:59:23 server newly acked packets (1): [1] 2025/04/30 11:59:23 server updated RTT: 33.208842ms (σ: 16.604421ms) 2025/04/30 11:59:23 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:23 server <- Reading packet 0 (75 bytes) for connection b44ff5db, Handshake 2025/04/30 11:59:23 server Long Header{Type: Handshake, DestConnectionID: b44ff5db, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:23 server Dropping Initial keys. 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 952µs} 2025/04/30 11:59:23 server newly acked packets (1): [0] 2025/04/30 11:59:23 server updated RTT: 33.208ms (σ: 12.453ms) 2025/04/30 11:59:23 server Canceling loss detection timer. 2025/04/30 11:59:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:23 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:23 Retiring connection ID de088032a6cc8960ac0e6a842a205998ab in 5s. 2025/04/30 11:59:23 server Dropping Handshake keys. 2025/04/30 11:59:23 server -> Sending packet 1 (251 bytes) for connection de088032a6cc8960ac0e6a842a205998ab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:23 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:23 server -> &wire.NewTokenFrame{Token: 0x0161a5015e52ee642cf45049ec52e95de845bfbd7aec8fda29dc5991baef394f45d009487e9272a094ae6e043c732fae6bcf7c21a526d9e6024cb8602aa2bbdfca3bbf862b5d133cc4440eecaf3f73c71c04fd479e49} 2025/04/30 11:59:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:23 server <- Reading packet 1 (28 bytes) for connection b44ff5db, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: b44ff5db, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.464ms} 2025/04/30 11:59:23 server newly acked packets (1): [0] 2025/04/30 11:59:23 server updated RTT: 35.588ms (σ: 14.099ms) 2025/04/30 11:59:23 server <- Reading packet 2 (1352 bytes) for connection b44ff5db, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: b44ff5db, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.PingFrame{} 2025/04/30 11:59:23 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:23 server -> Sending packet 2 (27 bytes) for connection de088032a6cc8960ac0e6a842a205998ab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:23 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:23 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 98.023µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server <- Reading packet 3 (31 bytes) for connection b44ff5db, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: b44ff5db, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 20.48ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server newly acked packets (1): [1] 2025/04/30 11:59:23 server updated RTT: 37.564ms (σ: 14.527ms) 2025/04/30 11:59:23 server ECN capability confirmed. 2025/04/30 11:59:23 server Canceling loss detection timer. 2025/04/30 11:59:23 server <- Reading packet 4 (1392 bytes) for connection b44ff5db, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: b44ff5db, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.PingFrame{} 2025/04/30 11:59:23 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:23 Received request: GET /utfgxxtlqo 2025/04/30 11:59:23 server -> Sending packet 3 (1053 bytes) for connection de088032a6cc8960ac0e6a842a205998ab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:23 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:23 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 266.248µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:23 server <- Reading packet 5 (1444 bytes) for connection b44ff5db, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: b44ff5db, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 144µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server newly acked packets (1): [3] 2025/04/30 11:59:23 server updated RTT: 36.975ms (σ: 12.072ms) 2025/04/30 11:59:23 server Canceling loss detection timer. 2025/04/30 11:59:23 server <- &wire.PingFrame{} 2025/04/30 11:59:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:23 server Ignoring all packets below 5. 2025/04/30 11:59:23 server <- Reading packet 6 (41 bytes) for connection b44ff5db, 1-RTT 2025/04/30 11:59:23 server Short Header{DestConnectionID: b44ff5db, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:23 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 432µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:23 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:23 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:23 Replacing connection for connection IDs [6b772488 312d7c5b 13a361a3 16d044ef b44ff5db 4b397dea] with a closed connection. 2025/04/30 11:59:23 server Connection de088032a6cc8960ac0e6a842a205998ab closed. 2025/04/30 11:59:23 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:23 Removing connection IDs [aa1781de df3b5021 0485967f cf1ca9ee a6f38709 05bf2519] for a closed connection after it has been retired. 2025/04/30 11:59:23 server <- Received Initial packet. 2025/04/30 11:59:23 Created qlog file: /logs/qlog/aa47dfba6ce33d8ef7c5445f5b2363bd4f.sqlog 2025/04/30 11:59:23 server Changing connection ID to ac0aa733. 2025/04/30 11:59:23 Adding connection IDs aa47dfba6ce33d8ef7c5445f5b2363bd4f and ac0aa733 for a new connection. 2025/04/30 11:59:23 server Parsed a coalesced packet. Part 1: 726 bytes. Remaining: 526 bytes. 2025/04/30 11:59:23 server <- Reading packet 3 (726 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Initial 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: aa47dfba6ce33d8ef7c5445f5b2363bd4f, SrcConnectionID: (empty), Token: 0x0161a5015e52ee642cf45049ec52e95de845bfbd7aec8fda29dc5991baef394f45d009487e9272a094ae6e043c732fae6bcf7c21a526d9e6024cb8602aa2bbdfca3bbf862b5d133cc4440eecaf3f73c71c04fd479e49, PacketNumber: 3, PacketNumberLen: 1, Length: 612, Version: v1} 2025/04/30 11:59:23 server <- &wire.CryptoFrame{Offset: 1117, Data length: 590, Offset + Data length: 1707} 2025/04/30 11:59:23 server coalesced packet has different destination connection ID: 00000000, expected aa47dfba6ce33d8ef7c5445f5b2363bd4f 2025/04/30 11:59:23 server -> Sending packet 0 (40 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Initial 2025/04/30 11:59:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ac0aa733, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:24 Removing connection ID cd1019f6d28ad2c0e8b6a90024 after it has been retired. 2025/04/30 11:59:24 server <- Reading packet 4 (1252 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Initial 2025/04/30 11:59:24 server Long Header{Type: Initial, DestConnectionID: aa47dfba6ce33d8ef7c5445f5b2363bd4f, SrcConnectionID: (empty), Token: 0x0161a5015e52ee642cf45049ec52e95de845bfbd7aec8fda29dc5991baef394f45d009487e9272a094ae6e043c732fae6bcf7c21a526d9e6024cb8602aa2bbdfca3bbf862b5d133cc4440eecaf3f73c71c04fd479e49, PacketNumber: 4, PacketNumberLen: 1, Length: 1138, Version: v1} 2025/04/30 11:59:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 1117, Offset + Data length: 1117} 2025/04/30 11:59:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:24 Adding connection ID 2a06708c. 2025/04/30 11:59:24 Adding connection ID cfed9ec7. 2025/04/30 11:59:24 Adding connection ID 38681b7c. 2025/04/30 11:59:24 Adding connection ID 524a49a0. 2025/04/30 11:59:24 Adding connection ID aa6cb5d5. 2025/04/30 11:59:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f 2025/04/30 11:59:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ac0aa733, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 924, Version: v1} 2025/04/30 11:59:24 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ac0aa733, PacketNumber: 0, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: aa6cb5d5, StatelessResetToken: 0x3d85e9ec0bcaf53276257d49271bd719} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a06708c, StatelessResetToken: 0x09c25628bdc3b8cb85ea3f53dc1ad203} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cfed9ec7, StatelessResetToken: 0xd303f901c7129d4c76c18352e9f611ad} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 38681b7c, StatelessResetToken: 0xeab3e25288ae8c587a69757ed9ee635e} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 524a49a0, StatelessResetToken: 0x7d0ef9c703a197965dbec707fed7a425} 2025/04/30 11:59:24 server Parsed a coalesced packet. Part 1: 726 bytes. Remaining: 526 bytes. 2025/04/30 11:59:24 server <- Reading packet 5 (726 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Initial 2025/04/30 11:59:24 server Long Header{Type: Initial, DestConnectionID: aa47dfba6ce33d8ef7c5445f5b2363bd4f, SrcConnectionID: (empty), Token: 0x0161a5015e52ee642cf45049ec52e95de845bfbd7aec8fda29dc5991baef394f45d009487e9272a094ae6e043c732fae6bcf7c21a526d9e6024cb8602aa2bbdfca3bbf862b5d133cc4440eecaf3f73c71c04fd479e49, PacketNumber: 5, PacketNumberLen: 1, Length: 612, Version: v1} 2025/04/30 11:59:24 server <- &wire.CryptoFrame{Offset: 1117, Data length: 590, Offset + Data length: 1707} 2025/04/30 11:59:24 server coalesced packet has different destination connection ID: 00000000, expected aa47dfba6ce33d8ef7c5445f5b2363bd4f 2025/04/30 11:59:24 server -> Sending packet 2 (40 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Initial 2025/04/30 11:59:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ac0aa733, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:24 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:24 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:24 server -> Sending packet 3 (1280 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Initial 2025/04/30 11:59:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ac0aa733, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:24 server -> Sending packet 4 (1280 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Initial 2025/04/30 11:59:24 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ac0aa733, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:24 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:24 server -> Sending packet 1 (203 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Handshake 2025/04/30 11:59:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ac0aa733, PacketNumber: 1, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:59:24 server -> Sending packet 2 (203 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, Handshake 2025/04/30 11:59:24 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ac0aa733, PacketNumber: 2, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:59:24 server <- Reading packet 1 (74 bytes) for connection ac0aa733, Handshake 2025/04/30 11:59:24 server Long Header{Type: Handshake, DestConnectionID: ac0aa733, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:24 server Dropping Initial keys. 2025/04/30 11:59:24 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 72µs} 2025/04/30 11:59:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:24 Retiring connection ID aa47dfba6ce33d8ef7c5445f5b2363bd4f in 5s. 2025/04/30 11:59:24 server Dropping Handshake keys. 2025/04/30 11:59:24 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:59:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:24 server -> Sending packet 2 (371 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 38681b7c, StatelessResetToken: 0xeab3e25288ae8c587a69757ed9ee635e} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cfed9ec7, StatelessResetToken: 0xd303f901c7129d4c76c18352e9f611ad} 2025/04/30 11:59:24 server -> &wire.NewTokenFrame{Token: 0x2fd83fc7884552af15dc2c18651174085cb290a141763dadbcae5653ca77ce95236ded5d4db95f8e40469f154361ada6c487ed159166c8875c8cc7dd2a356dad26850b30a5d6a5a784cdd50fbab0b90d969af4eae0a1} 2025/04/30 11:59:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: aa6cb5d5, StatelessResetToken: 0x3d85e9ec0bcaf53276257d49271bd719} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a06708c, StatelessResetToken: 0x09c25628bdc3b8cb85ea3f53dc1ad203} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 524a49a0, StatelessResetToken: 0x7d0ef9c703a197965dbec707fed7a425} 2025/04/30 11:59:24 server -> Sending packet 3 (371 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.NewTokenFrame{Token: 0x2fd83fc7884552af15dc2c18651174085cb290a141763dadbcae5653ca77ce95236ded5d4db95f8e40469f154361ada6c487ed159166c8875c8cc7dd2a356dad26850b30a5d6a5a784cdd50fbab0b90d969af4eae0a1} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 38681b7c, StatelessResetToken: 0xeab3e25288ae8c587a69757ed9ee635e} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: aa6cb5d5, StatelessResetToken: 0x3d85e9ec0bcaf53276257d49271bd719} 2025/04/30 11:59:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a06708c, StatelessResetToken: 0x09c25628bdc3b8cb85ea3f53dc1ad203} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cfed9ec7, StatelessResetToken: 0xd303f901c7129d4c76c18352e9f611ad} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 524a49a0, StatelessResetToken: 0x7d0ef9c703a197965dbec707fed7a425} 2025/04/30 11:59:24 Removing connection IDs [70a3292b 51481600 edc5021d 45fc555e 9e94b465 6f528a1e] for a closed connection after it has been retired. 2025/04/30 11:59:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:59:24 server -> Sending packet 5 (371 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: aa6cb5d5, StatelessResetToken: 0x3d85e9ec0bcaf53276257d49271bd719} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 524a49a0, StatelessResetToken: 0x7d0ef9c703a197965dbec707fed7a425} 2025/04/30 11:59:24 server -> &wire.NewTokenFrame{Token: 0x2fd83fc7884552af15dc2c18651174085cb290a141763dadbcae5653ca77ce95236ded5d4db95f8e40469f154361ada6c487ed159166c8875c8cc7dd2a356dad26850b30a5d6a5a784cdd50fbab0b90d969af4eae0a1} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a06708c, StatelessResetToken: 0x09c25628bdc3b8cb85ea3f53dc1ad203} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 38681b7c, StatelessResetToken: 0xeab3e25288ae8c587a69757ed9ee635e} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cfed9ec7, StatelessResetToken: 0xd303f901c7129d4c76c18352e9f611ad} 2025/04/30 11:59:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:24 server -> Sending packet 6 (371 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: aa6cb5d5, StatelessResetToken: 0x3d85e9ec0bcaf53276257d49271bd719} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cfed9ec7, StatelessResetToken: 0xd303f901c7129d4c76c18352e9f611ad} 2025/04/30 11:59:24 server -> &wire.NewTokenFrame{Token: 0x2fd83fc7884552af15dc2c18651174085cb290a141763dadbcae5653ca77ce95236ded5d4db95f8e40469f154361ada6c487ed159166c8875c8cc7dd2a356dad26850b30a5d6a5a784cdd50fbab0b90d969af4eae0a1} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 524a49a0, StatelessResetToken: 0x7d0ef9c703a197965dbec707fed7a425} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a06708c, StatelessResetToken: 0x09c25628bdc3b8cb85ea3f53dc1ad203} 2025/04/30 11:59:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 38681b7c, StatelessResetToken: 0xeab3e25288ae8c587a69757ed9ee635e} 2025/04/30 11:59:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:24 server <- Reading packet 5 (1444 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 136µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:24 server newly acked packets (1): [6] 2025/04/30 11:59:24 server updated RTT: 32.939684ms (σ: 16.469842ms) 2025/04/30 11:59:24 server ECN capability confirmed. 2025/04/30 11:59:24 server Canceling loss detection timer. 2025/04/30 11:59:24 server <- &wire.PingFrame{} 2025/04/30 11:59:24 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:24 server -> Sending packet 7 (24 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 168.937µs} 2025/04/30 11:59:24 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 11:59:24 server <- Reading packet 7 (42 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:24 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:24 server <- Reading packet 8 (25 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.PingFrame{} 2025/04/30 11:59:24 Received request: GET /tmxxpxxusu 2025/04/30 11:59:24 server -> Sending packet 8 (1366 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.PingFrame{} 2025/04/30 11:59:24 server -> Sending packet 9 (26 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 246.171µs} 2025/04/30 11:59:24 server -> Sending packet 10 (1045 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:24 server -> Sending packet 11 (23 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:59:24 server <- Reading packet 9 (30 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 80µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:24 server newly acked packets (1): [8] 2025/04/30 11:59:24 server updated RTT: 32.837ms (σ: 12.554ms) 2025/04/30 11:59:24 server <- Reading packet 10 (31 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, DelayTime: 21.16ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:59:24 server newly acked packets (1): [10] 2025/04/30 11:59:24 server updated RTT: 32.981ms (σ: 9.703ms) 2025/04/30 11:59:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:24 server -> Sending packet 13 (23 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:59:24 server -> Sending packet 14 (23 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:59:24 server <- Reading packet 11 (25 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.PingFrame{} 2025/04/30 11:59:24 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:24 server <- Reading packet 12 (25 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.PingFrame{} 2025/04/30 11:59:24 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:24 server -> Sending packet 15 (26 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 5, AckRanges: {{Largest: 12, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 143.789µs} 2025/04/30 11:59:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:59:24 server -> Sending packet 17 (23 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:59:24 server -> Sending packet 18 (23 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:59:24 server -> Sending packet 19 (1409 bytes) for connection aa47dfba6ce33d8ef7c5445f5b2363bd4f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:24 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:24 server -> &wire.PingFrame{} 2025/04/30 11:59:24 server <- Reading packet 13 (32 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.AckFrame{LargestAcked: 17, LowestAcked: 15, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}}, DelayTime: 72µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 11:59:24 server <- Reading packet 14 (43 bytes) for connection ac0aa733, 1-RTT 2025/04/30 11:59:24 server Short Header{DestConnectionID: ac0aa733, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:24 server <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 15, AckRanges: {{Largest: 18, Smallest: 17}, {Largest: 15, Smallest: 15}}, DelayTime: 128µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 11:59:24 server newly acked packets (1): [18] 2025/04/30 11:59:24 server updated RTT: 32.781ms (σ: 7.676ms) 2025/04/30 11:59:24 server Canceling loss detection timer. 2025/04/30 11:59:24 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:24 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:24 Replacing connection for connection IDs [ac0aa733 2a06708c cfed9ec7 38681b7c 524a49a0 aa6cb5d5] with a closed connection. 2025/04/30 11:59:24 server Connection aa47dfba6ce33d8ef7c5445f5b2363bd4f closed. 2025/04/30 11:59:24 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:24 Removing connection ID f56f040a6ffbfcce after it has been retired. 2025/04/30 11:59:25 server <- Received Initial packet. 2025/04/30 11:59:25 Created qlog file: /logs/qlog/437307c51a19e27f.sqlog 2025/04/30 11:59:25 server Changing connection ID to 065d60fe. 2025/04/30 11:59:25 Adding connection IDs 437307c51a19e27f and 065d60fe for a new connection. 2025/04/30 11:59:25 server <- Reading packet 2 (1252 bytes) for connection 437307c51a19e27f, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: 437307c51a19e27f, SrcConnectionID: (empty), Token: 0x2fd83fc7884552af15dc2c18651174085cb290a141763dadbcae5653ca77ce95236ded5d4db95f8e40469f154361ada6c487ed159166c8875c8cc7dd2a356dad26850b30a5d6a5a784cdd50fbab0b90d969af4eae0a1, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:25 server -> Sending packet 0 (40 bytes) for connection 437307c51a19e27f, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 065d60fe, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:25 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:25 Tracking 50 connection IDs and 0 reset tokens. 2025/04/30 11:59:25 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:25 server <- Reading packet 5 (704 bytes) for connection 065d60fe, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: 065d60fe, SrcConnectionID: (empty), Token: 0x2fd83fc7884552af15dc2c18651174085cb290a141763dadbcae5653ca77ce95236ded5d4db95f8e40469f154361ada6c487ed159166c8875c8cc7dd2a356dad26850b30a5d6a5a784cdd50fbab0b90d969af4eae0a1, PacketNumber: 5, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:25 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:25 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:25 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:25 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:25 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:25 Adding connection ID 44a94eea. 2025/04/30 11:59:25 Adding connection ID 902549c9. 2025/04/30 11:59:25 Adding connection ID 870d9169. 2025/04/30 11:59:25 Adding connection ID 8fd785eb. 2025/04/30 11:59:25 Adding connection ID 5acca98f. 2025/04/30 11:59:25 server coalesced packet has different destination connection ID: 00000000, expected 065d60fe 2025/04/30 11:59:25 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 437307c51a19e27f 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 065d60fe, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 936, Version: v1} 2025/04/30 11:59:25 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:25 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 065d60fe, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:59:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8fd785eb, StatelessResetToken: 0xfe4b2394aece65de7373ffe16d2d6aa3} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44a94eea, StatelessResetToken: 0xf7a1f43b559fdd83ba2e6e72a496be42} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 5acca98f, StatelessResetToken: 0xfbabdd134178b666cdbea43f16dc9723} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 870d9169, StatelessResetToken: 0xe0ccd0d35ff4f7ab646ca3de77bf597c} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 902549c9, StatelessResetToken: 0x9d3b8e9ce8b9e99d0fca1f4990d5dd2b} 2025/04/30 11:59:25 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:25 server -> Sending packet 2 (1280 bytes) for connection 437307c51a19e27f, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 065d60fe, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:25 server -> Sending packet 3 (1280 bytes) for connection 437307c51a19e27f, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 065d60fe, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:25 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:59:25 server -> Sending packet 1 (191 bytes) for connection 437307c51a19e27f, Handshake 2025/04/30 11:59:25 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 065d60fe, PacketNumber: 1, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:59:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:59:25 server -> Sending packet 2 (191 bytes) for connection 437307c51a19e27f, Handshake 2025/04/30 11:59:25 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 065d60fe, PacketNumber: 2, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:59:25 server -> Sending packet 22 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:25 server -> Sending packet 23 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:25 server <- Reading packet 0 (75 bytes) for connection 065d60fe, Handshake 2025/04/30 11:59:25 server Long Header{Type: Handshake, DestConnectionID: 065d60fe, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:25 server Dropping Initial keys. 2025/04/30 11:59:25 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 528µs} 2025/04/30 11:59:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:25 Retiring connection ID 437307c51a19e27f in 5s. 2025/04/30 11:59:25 server Dropping Handshake keys. 2025/04/30 11:59:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:25 server -> Sending packet 2 (371 bytes) for connection 437307c51a19e27f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.NewTokenFrame{Token: 0x4469f89f605f614443482390dd0b53c95f9bcc67af129b1ebb6f99f5d2308647c9d5cfbb337771c37effbf5dd9fe53408d74159b3f7653f7baf0dadeee24e4ba5ad0408c3bcc12af94fcfbd0261536fb0addcffdd5ef} 2025/04/30 11:59:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 5acca98f, StatelessResetToken: 0xfbabdd134178b666cdbea43f16dc9723} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8fd785eb, StatelessResetToken: 0xfe4b2394aece65de7373ffe16d2d6aa3} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44a94eea, StatelessResetToken: 0xf7a1f43b559fdd83ba2e6e72a496be42} 2025/04/30 11:59:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 902549c9, StatelessResetToken: 0x9d3b8e9ce8b9e99d0fca1f4990d5dd2b} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 870d9169, StatelessResetToken: 0xe0ccd0d35ff4f7ab646ca3de77bf597c} 2025/04/30 11:59:25 server -> Sending packet 3 (371 bytes) for connection 437307c51a19e27f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.NewTokenFrame{Token: 0x4469f89f605f614443482390dd0b53c95f9bcc67af129b1ebb6f99f5d2308647c9d5cfbb337771c37effbf5dd9fe53408d74159b3f7653f7baf0dadeee24e4ba5ad0408c3bcc12af94fcfbd0261536fb0addcffdd5ef} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 870d9169, StatelessResetToken: 0xe0ccd0d35ff4f7ab646ca3de77bf597c} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 5acca98f, StatelessResetToken: 0xfbabdd134178b666cdbea43f16dc9723} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8fd785eb, StatelessResetToken: 0xfe4b2394aece65de7373ffe16d2d6aa3} 2025/04/30 11:59:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44a94eea, StatelessResetToken: 0xf7a1f43b559fdd83ba2e6e72a496be42} 2025/04/30 11:59:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 902549c9, StatelessResetToken: 0x9d3b8e9ce8b9e99d0fca1f4990d5dd2b} 2025/04/30 11:59:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:25 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:59:25 server <- Reading packet 1 (1352 bytes) for connection 065d60fe, 1-RTT 2025/04/30 11:59:25 server Short Header{DestConnectionID: 065d60fe, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:25 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 336µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:25 server newly acked packets (1): [3] 2025/04/30 11:59:25 server updated RTT: 32.897417ms (σ: 16.448708ms) 2025/04/30 11:59:25 server ECN capability confirmed. 2025/04/30 11:59:25 server Canceling loss detection timer. 2025/04/30 11:59:25 server <- &wire.PingFrame{} 2025/04/30 11:59:25 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:25 server -> Sending packet 4 (24 bytes) for connection 437307c51a19e27f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 170.299µs} 2025/04/30 11:59:25 server <- Reading packet 2 (1392 bytes) for connection 065d60fe, 1-RTT 2025/04/30 11:59:25 server Short Header{DestConnectionID: 065d60fe, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:25 server <- &wire.PingFrame{} 2025/04/30 11:59:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:25 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:25 Received request: GET /eoxwniprhy 2025/04/30 11:59:25 server -> Sending packet 5 (1050 bytes) for connection 437307c51a19e27f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 310.378µs} 2025/04/30 11:59:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:25 server <- Reading packet 3 (1444 bytes) for connection 065d60fe, 1-RTT 2025/04/30 11:59:25 server Short Header{DestConnectionID: 065d60fe, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:25 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 104µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:25 server newly acked packets (1): [5] 2025/04/30 11:59:25 server updated RTT: 32.902ms (σ: 12.347ms) 2025/04/30 11:59:25 server Canceling loss detection timer. 2025/04/30 11:59:25 server <- &wire.PingFrame{} 2025/04/30 11:59:25 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:25 server Ignoring all packets below 3. 2025/04/30 11:59:25 server -> Sending packet 6 (27 bytes) for connection 437307c51a19e27f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 173.064µs} 2025/04/30 11:59:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:25 Removing connection ID 189958cd3a0e7bd6 after it has been retired. 2025/04/30 11:59:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:25 server -> Sending packet 8 (22 bytes) for connection 437307c51a19e27f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:25 server -> Sending packet 9 (22 bytes) for connection 437307c51a19e27f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:25 server -> Sending packet 10 (1366 bytes) for connection 437307c51a19e27f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:25 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:25 server -> &wire.PingFrame{} 2025/04/30 11:59:25 server <- Reading packet 6 (44 bytes) for connection 065d60fe, 1-RTT 2025/04/30 11:59:25 server Short Header{DestConnectionID: 065d60fe, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:25 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 135.288ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:25 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:25 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:25 Replacing connection for connection IDs [44a94eea 902549c9 870d9169 8fd785eb 5acca98f 065d60fe] with a closed connection. 2025/04/30 11:59:25 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:25 server Connection 437307c51a19e27f closed. 2025/04/30 11:59:25 Removing connection IDs [05655902 8edbd98e 23cd07e3 10c8d1bb c75232f2 7f5af08f] for a closed connection after it has been retired. 2025/04/30 11:59:25 server <- Received Initial packet. 2025/04/30 11:59:25 Created qlog file: /logs/qlog/e797fd7711338110b9.sqlog 2025/04/30 11:59:25 server Changing connection ID to 4021bff0. 2025/04/30 11:59:25 Adding connection IDs e797fd7711338110b9 and 4021bff0 for a new connection. 2025/04/30 11:59:25 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:59:25 server <- Reading packet 1 (710 bytes) for connection e797fd7711338110b9, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: e797fd7711338110b9, SrcConnectionID: (empty), Token: 0x4469f89f605f614443482390dd0b53c95f9bcc67af129b1ebb6f99f5d2308647c9d5cfbb337771c37effbf5dd9fe53408d74159b3f7653f7baf0dadeee24e4ba5ad0408c3bcc12af94fcfbd0261536fb0addcffdd5ef, PacketNumber: 1, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:25 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:25 server coalesced packet has different destination connection ID: 00000000, expected e797fd7711338110b9 2025/04/30 11:59:25 server -> Sending packet 0 (40 bytes) for connection e797fd7711338110b9, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4021bff0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:25 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:25 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:59:25 server <- Reading packet 3 (710 bytes) for connection e797fd7711338110b9, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: e797fd7711338110b9, SrcConnectionID: (empty), Token: 0x4469f89f605f614443482390dd0b53c95f9bcc67af129b1ebb6f99f5d2308647c9d5cfbb337771c37effbf5dd9fe53408d74159b3f7653f7baf0dadeee24e4ba5ad0408c3bcc12af94fcfbd0261536fb0addcffdd5ef, PacketNumber: 3, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:25 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:25 server coalesced packet has different destination connection ID: 00000000, expected e797fd7711338110b9 2025/04/30 11:59:25 server -> Sending packet 1 (42 bytes) for connection e797fd7711338110b9, Initial 2025/04/30 11:59:25 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4021bff0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:25 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server <- Reading packet 4 (1252 bytes) for connection e797fd7711338110b9, Initial 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: e797fd7711338110b9, SrcConnectionID: (empty), Token: 0x4469f89f605f614443482390dd0b53c95f9bcc67af129b1ebb6f99f5d2308647c9d5cfbb337771c37effbf5dd9fe53408d74159b3f7653f7baf0dadeee24e4ba5ad0408c3bcc12af94fcfbd0261536fb0addcffdd5ef, PacketNumber: 4, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:59:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:59:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:26 Adding connection ID 6bf3ccb1. 2025/04/30 11:59:26 Adding connection ID 94ffa6d0. 2025/04/30 11:59:26 Adding connection ID 972f84e0. 2025/04/30 11:59:26 Adding connection ID cf66bd11. 2025/04/30 11:59:26 Adding connection ID 7b93eb01. 2025/04/30 11:59:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e797fd7711338110b9 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4021bff0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 930, Version: v1} 2025/04/30 11:59:26 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4021bff0, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cf66bd11, StatelessResetToken: 0x5e4e2f6b0e1c5d42fe10b258dbe81dac} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 94ffa6d0, StatelessResetToken: 0x87137ca9135dbb23cdf57b30a8efa1de} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bf3ccb1, StatelessResetToken: 0xbbf2ab5d52ec235eeaa55910c97df422} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7b93eb01, StatelessResetToken: 0x74b8a633f56d887d9103ba57243e9da4} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 972f84e0, StatelessResetToken: 0x07cab768d947f6b71295b330871062ef} 2025/04/30 11:59:26 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:59:26 server <- Reading packet 5 (710 bytes) for connection e797fd7711338110b9, Initial 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: e797fd7711338110b9, SrcConnectionID: (empty), Token: 0x4469f89f605f614443482390dd0b53c95f9bcc67af129b1ebb6f99f5d2308647c9d5cfbb337771c37effbf5dd9fe53408d74159b3f7653f7baf0dadeee24e4ba5ad0408c3bcc12af94fcfbd0261536fb0addcffdd5ef, PacketNumber: 5, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:26 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:26 server coalesced packet has different destination connection ID: 00000000, expected e797fd7711338110b9 2025/04/30 11:59:26 server -> Sending packet 3 (42 bytes) for connection e797fd7711338110b9, Initial 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4021bff0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:26 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:26 server <- Reading packet 6 (124 bytes) for connection 4021bff0, Initial 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: 4021bff0, SrcConnectionID: (empty), Token: 0x4469f89f605f614443482390dd0b53c95f9bcc67af129b1ebb6f99f5d2308647c9d5cfbb337771c37effbf5dd9fe53408d74159b3f7653f7baf0dadeee24e4ba5ad0408c3bcc12af94fcfbd0261536fb0addcffdd5ef, PacketNumber: 6, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:26 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 880µs} 2025/04/30 11:59:26 server newly acked packets (1): [2] 2025/04/30 11:59:26 server updated RTT: 32.980225ms (σ: 16.490112ms) 2025/04/30 11:59:26 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:26 server <- Reading packet 0 (75 bytes) for connection 4021bff0, Handshake 2025/04/30 11:59:26 server Long Header{Type: Handshake, DestConnectionID: 4021bff0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:26 server Dropping Initial keys. 2025/04/30 11:59:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 880µs} 2025/04/30 11:59:26 server newly acked packets (1): [0] 2025/04/30 11:59:26 server updated RTT: 32.98ms (σ: 12.367ms) 2025/04/30 11:59:26 server Canceling loss detection timer. 2025/04/30 11:59:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:26 Retiring connection ID e797fd7711338110b9 in 5s. 2025/04/30 11:59:26 server Dropping Handshake keys. 2025/04/30 11:59:26 server <- Reading packet 0 (42 bytes) for connection 4021bff0, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: 4021bff0, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:26 server -> Sending packet 1 (256 bytes) for connection e797fd7711338110b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 369.371µs} 2025/04/30 11:59:26 server -> &wire.NewTokenFrame{Token: 0x9ed34d22afd1d3627dee45406db1c350c51538e5ef0abbc345d052615581877713975ad715bad2259c3063e9e2f781f34b1a436a006a63d0a5d842568c0fe65318ca467ac3b3a594721e0f5496e7e993027a2c05f0a1} 2025/04/30 11:59:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:26 Received request: GET /yvitjfyjcn 2025/04/30 11:59:26 server -> Sending packet 2 (1045 bytes) for connection e797fd7711338110b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:26 server <- Reading packet 1 (28 bytes) for connection 4021bff0, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: 4021bff0, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.368ms} 2025/04/30 11:59:26 server newly acked packets (1): [0] 2025/04/30 11:59:26 server updated RTT: 33.017ms (σ: 9.349ms) 2025/04/30 11:59:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:26 server -> Sending packet 4 (251 bytes) for connection e797fd7711338110b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:26 server -> &wire.NewTokenFrame{Token: 0x9ed34d22afd1d3627dee45406db1c350c51538e5ef0abbc345d052615581877713975ad715bad2259c3063e9e2f781f34b1a436a006a63d0a5d842568c0fe65318ca467ac3b3a594721e0f5496e7e993027a2c05f0a1} 2025/04/30 11:59:26 server Skipping packet number 3 2025/04/30 11:59:26 server -> Sending packet 5 (1045 bytes) for connection e797fd7711338110b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:26 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:26 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:59:26 server <- Reading packet 2 (42 bytes) for connection 4021bff0, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: 4021bff0, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:26 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:26 server <- Reading packet 3 (32 bytes) for connection 4021bff0, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: 4021bff0, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 128µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server newly acked packets (1): [5] 2025/04/30 11:59:26 server updated RTT: 32.901ms (σ: 7.242ms) 2025/04/30 11:59:26 server ECN capability confirmed. 2025/04/30 11:59:26 server setting loss timer for packet 4 (1-RTT) to 37.013625ms (in 2025-04-30 11:59:26.302101925 +0000 UTC m=+17.069966050) 2025/04/30 11:59:26 server -> Sending packet 6 (27 bytes) for connection e797fd7711338110b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 189.796µs} 2025/04/30 11:59:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:26 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:59:26.302101925 +0000 UTC m=+17.069966050 2025/04/30 11:59:26 server lost packet 4 (time threshold) 2025/04/30 11:59:26 server -> Sending packet 7 (251 bytes) for connection e797fd7711338110b9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.NewTokenFrame{Token: 0x9ed34d22afd1d3627dee45406db1c350c51538e5ef0abbc345d052615581877713975ad715bad2259c3063e9e2f781f34b1a436a006a63d0a5d842568c0fe65318ca467ac3b3a594721e0f5496e7e993027a2c05f0a1} 2025/04/30 11:59:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:26 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 44 bytes. 2025/04/30 11:59:26 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 11:59:26 server <- Reading packet 6 (44 bytes) for connection 4021bff0, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: 4021bff0, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 36.76ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:26 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:26 Replacing connection for connection IDs [972f84e0 cf66bd11 7b93eb01 4021bff0 6bf3ccb1 94ffa6d0] with a closed connection. 2025/04/30 11:59:26 server Connection e797fd7711338110b9 closed. 2025/04/30 11:59:26 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:26 Removing connection ID 103009399f473a31 after it has been retired. 2025/04/30 11:59:26 Removing connection IDs [ce0396b2 002777e9 4839b2a2 28bcc778 eff21041 69d148d9] for a closed connection after it has been retired. 2025/04/30 11:59:26 server <- Received Initial packet. 2025/04/30 11:59:26 Created qlog file: /logs/qlog/b4589eaaec8eee89.sqlog 2025/04/30 11:59:26 server Changing connection ID to b15ce7c5. 2025/04/30 11:59:26 Adding connection IDs b4589eaaec8eee89 and b15ce7c5 for a new connection. 2025/04/30 11:59:26 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:59:26 server <- Reading packet 1 (366 bytes) for connection b4589eaaec8eee89, Initial 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: b4589eaaec8eee89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:59:26 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:59:26 server coalesced packet has different destination connection ID: 00000000, expected b4589eaaec8eee89 2025/04/30 11:59:26 server -> Sending packet 0 (40 bytes) for connection b4589eaaec8eee89, Initial 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b15ce7c5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:26 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server <- Reading packet 2 (1252 bytes) for connection b4589eaaec8eee89, Initial 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: b4589eaaec8eee89, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:59:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:59:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:26 Adding connection ID e52f3a97. 2025/04/30 11:59:26 Adding connection ID 45fffa2b. 2025/04/30 11:59:26 Adding connection ID 8634ce9a. 2025/04/30 11:59:26 Adding connection ID c512d723. 2025/04/30 11:59:26 Adding connection ID d5b90bb2. 2025/04/30 11:59:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b4589eaaec8eee89 2025/04/30 11:59:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b15ce7c5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 386, Version: v1} 2025/04/30 11:59:26 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b15ce7c5, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:59:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c512d723, StatelessResetToken: 0x6a029c0340f1c107422a2977f955aad0} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e52f3a97, StatelessResetToken: 0x6990a3dca827e5ba4c2b1fc1a97faa37} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8634ce9a, StatelessResetToken: 0x0b2a6a0aee5775d36e469e0f1bd3e7c2} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d5b90bb2, StatelessResetToken: 0x9e011eafc6b31ecffb201d421f39dcde} 2025/04/30 11:59:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 45fffa2b, StatelessResetToken: 0x0611956bc0e0edf59e52becd1483baf8} 2025/04/30 11:59:26 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:59:26 server <- Reading packet 1 (69 bytes) for connection b15ce7c5, Handshake 2025/04/30 11:59:26 server Long Header{Type: Handshake, DestConnectionID: b15ce7c5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:59:26 server Dropping Initial keys. 2025/04/30 11:59:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:26 Retiring connection ID b4589eaaec8eee89 in 5s. 2025/04/30 11:59:26 server Dropping Handshake keys. 2025/04/30 11:59:26 server <- Reading packet 0 (42 bytes) for connection b15ce7c5, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: b15ce7c5, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:26 server -> Sending packet 1 (1366 bytes) for connection b4589eaaec8eee89, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.PingFrame{} 2025/04/30 11:59:26 Received request: GET /zojgnannkr 2025/04/30 11:59:26 server -> Sending packet 2 (256 bytes) for connection b4589eaaec8eee89, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 305.782µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server -> &wire.NewTokenFrame{Token: 0x6ac5e819bce3d4cc6865ae28e20af6dee8946363842baa4682caf3affe4d1efdd6beeca3e79ccf4b0a8c28a3af8779a74511cde908ff2e097935f2bff77c478d7b6545d09a28bae34709dafd2153bc5f184d9e544cdb} 2025/04/30 11:59:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:59:26 server -> Sending packet 3 (1045 bytes) for connection b4589eaaec8eee89, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:26 server <- Reading packet 1 (28 bytes) for connection b15ce7c5, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: b15ce7c5, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.96ms} 2025/04/30 11:59:26 server newly acked packets (1): [0] 2025/04/30 11:59:26 server updated RTT: 52.851229ms (σ: 26.425614ms) 2025/04/30 11:59:26 server <- Reading packet 3 (32 bytes) for connection b15ce7c5, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: b15ce7c5, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server newly acked packets (2): [1 3] 2025/04/30 11:59:26 server updated RTT: 50.355ms (σ: 24.81ms) 2025/04/30 11:59:26 server ECN capability confirmed. 2025/04/30 11:59:26 server setting loss timer for packet 2 (1-RTT) to 56.649375ms (in 2025-04-30 11:59:26.995765631 +0000 UTC m=+17.763629766) 2025/04/30 11:59:26 server -> Sending packet 4 (22 bytes) for connection b4589eaaec8eee89, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:26 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:26 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:26 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 43 bytes. 2025/04/30 11:59:26 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 11:59:26 server <- Reading packet 4 (43 bytes) for connection b15ce7c5, 1-RTT 2025/04/30 11:59:26 server Short Header{DestConnectionID: b15ce7c5, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:26 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 192µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:26 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:26 Replacing connection for connection IDs [8634ce9a c512d723 d5b90bb2 b15ce7c5 e52f3a97 45fffa2b] with a closed connection. 2025/04/30 11:59:26 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:26 server Connection b4589eaaec8eee89 closed. 2025/04/30 11:59:27 Tracking 55 connection IDs and 0 reset tokens. 2025/04/30 11:59:27 server <- Received Initial packet. 2025/04/30 11:59:27 Created qlog file: /logs/qlog/d3c16ebb5b815c79.sqlog 2025/04/30 11:59:27 server Changing connection ID to 12704263. 2025/04/30 11:59:27 Adding connection IDs d3c16ebb5b815c79 and 12704263 for a new connection. 2025/04/30 11:59:27 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:59:27 server <- Reading packet 1 (366 bytes) for connection d3c16ebb5b815c79, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: d3c16ebb5b815c79, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:59:27 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:59:27 server coalesced packet has different destination connection ID: 00000000, expected d3c16ebb5b815c79 2025/04/30 11:59:27 server -> Sending packet 0 (40 bytes) for connection d3c16ebb5b815c79, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12704263, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:59:27 server <- Reading packet 2 (1248 bytes) for connection 12704263, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: 12704263, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:59:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:59:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:27 Adding connection ID 29a49df8. 2025/04/30 11:59:27 Adding connection ID 094e8e84. 2025/04/30 11:59:27 Adding connection ID 7d11cc74. 2025/04/30 11:59:27 Adding connection ID 27d0d069. 2025/04/30 11:59:27 Adding connection ID 37d9bfad. 2025/04/30 11:59:27 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:59:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d3c16ebb5b815c79 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12704263, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 382, Version: v1} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12704263, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:59:27 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 37d9bfad, StatelessResetToken: 0xe47e6a54a2ad609e2f2687813ae8eab0} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 27d0d069, StatelessResetToken: 0x90b5698a83e360068134c56566f71c48} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 094e8e84, StatelessResetToken: 0xd74bdd947e7195c96d36621a670712ff} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7d11cc74, StatelessResetToken: 0xb124bda7a3e8760fb51c45a3a36135a0} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 29a49df8, StatelessResetToken: 0x2626282fc49ed084d64461d43ec5db62} 2025/04/30 11:59:27 Removing connection ID ca4d3bd6f76544d7 after it has been retired. 2025/04/30 11:59:27 Removing connection IDs [c5d3d2cf 689389f1 c9ae0d3a 63d8080c 984e5702 ccbe1c75] for a closed connection after it has been retired. 2025/04/30 11:59:27 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:27 server -> Sending packet 2 (1280 bytes) for connection d3c16ebb5b815c79, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12704263, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:27 server -> Sending packet 3 (1280 bytes) for connection d3c16ebb5b815c79, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12704263, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:59:27 server <- Reading packet 5 (1252 bytes) for connection 12704263, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: 12704263, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1238, Version: v1} 2025/04/30 11:59:27 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/04/30 11:59:27 server newly acked packets (1): [3] 2025/04/30 11:59:27 server updated RTT: 34.673246ms (σ: 17.336623ms) 2025/04/30 11:59:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 1210, Offset + Data length: 1210} 2025/04/30 11:59:27 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:27 server -> Sending packet 1 (745 bytes) for connection d3c16ebb5b815c79, Handshake 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12704263, PacketNumber: 1, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:59:27 server -> Sending packet 2 (745 bytes) for connection d3c16ebb5b815c79, Handshake 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12704263, PacketNumber: 2, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:59:27 server -> Sending packet 4 (42 bytes) for connection d3c16ebb5b815c79, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12704263, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1214 bytes. 2025/04/30 11:59:27 server <- Reading packet 6 (38 bytes) for connection 12704263, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: 12704263, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:59:27 server <- &wire.CryptoFrame{Offset: 1210, Data length: 3, Offset + Data length: 1213} 2025/04/30 11:59:27 server coalesced packet has different destination connection ID: 00000000, expected 12704263 2025/04/30 11:59:27 server -> Sending packet 5 (42 bytes) for connection d3c16ebb5b815c79, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 12704263, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server <- Reading packet 1 (33 bytes) for connection 12704263, Handshake 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: 12704263, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 11:59:27 server Dropping Initial keys. 2025/04/30 11:59:27 server <- &wire.PingFrame{} 2025/04/30 11:59:27 server -> Sending packet 3 (39 bytes) for connection d3c16ebb5b815c79, Handshake 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12704263, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server <- Reading packet 2 (33 bytes) for connection 12704263, Handshake 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: 12704263, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 11:59:27 server <- &wire.PingFrame{} 2025/04/30 11:59:27 server -> Sending packet 4 (39 bytes) for connection d3c16ebb5b815c79, Handshake 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 12704263, PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:59:27 server <- Reading packet 3 (69 bytes) for connection 12704263, Handshake 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: 12704263, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:59:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:27 Retiring connection ID d3c16ebb5b815c79 in 5s. 2025/04/30 11:59:27 server Dropping Handshake keys. 2025/04/30 11:59:27 server <- Reading packet 0 (42 bytes) for connection 12704263, 1-RTT 2025/04/30 11:59:27 server Short Header{DestConnectionID: 12704263, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:27 server -> Sending packet 2 (376 bytes) for connection d3c16ebb5b815c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:27 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 219.471µs} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 094e8e84, StatelessResetToken: 0xd74bdd947e7195c96d36621a670712ff} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 29a49df8, StatelessResetToken: 0x2626282fc49ed084d64461d43ec5db62} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7d11cc74, StatelessResetToken: 0xb124bda7a3e8760fb51c45a3a36135a0} 2025/04/30 11:59:27 server -> &wire.NewTokenFrame{Token: 0xdb117d53ba99a8fe71ddc21492709cd49ed75e166dfa5a763adb9627ccd3a2fbf956786f94b845c877f8438bf259db6c0bb632f942fe89f50a322b4ffa9ffad95bf3db2c7160d4da7f4fedffe42d8803571cc4769c54} 2025/04/30 11:59:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 37d9bfad, StatelessResetToken: 0xe47e6a54a2ad609e2f2687813ae8eab0} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 27d0d069, StatelessResetToken: 0x90b5698a83e360068134c56566f71c48} 2025/04/30 11:59:27 server -> Sending packet 3 (371 bytes) for connection d3c16ebb5b815c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:27 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 37d9bfad, StatelessResetToken: 0xe47e6a54a2ad609e2f2687813ae8eab0} 2025/04/30 11:59:27 server -> &wire.NewTokenFrame{Token: 0xdb117d53ba99a8fe71ddc21492709cd49ed75e166dfa5a763adb9627ccd3a2fbf956786f94b845c877f8438bf259db6c0bb632f942fe89f50a322b4ffa9ffad95bf3db2c7160d4da7f4fedffe42d8803571cc4769c54} 2025/04/30 11:59:27 Received request: GET /zzhagxgqah 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 27d0d069, StatelessResetToken: 0x90b5698a83e360068134c56566f71c48} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 29a49df8, StatelessResetToken: 0x2626282fc49ed084d64461d43ec5db62} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7d11cc74, StatelessResetToken: 0xb124bda7a3e8760fb51c45a3a36135a0} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 094e8e84, StatelessResetToken: 0xd74bdd947e7195c96d36621a670712ff} 2025/04/30 11:59:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:27 server -> Sending packet 4 (1045 bytes) for connection d3c16ebb5b815c79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:27 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:27 server <- Reading packet 1 (1352 bytes) for connection 12704263, 1-RTT 2025/04/30 11:59:27 server Short Header{DestConnectionID: 12704263, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:27 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 344µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server <- &wire.PingFrame{} 2025/04/30 11:59:27 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:27 server <- Reading packet 3 (43 bytes) for connection 12704263, 1-RTT 2025/04/30 11:59:27 server Short Header{DestConnectionID: 12704263, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:27 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 168µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server newly acked packets (1): [4] 2025/04/30 11:59:27 server updated RTT: 34.387ms (σ: 13.573ms) 2025/04/30 11:59:27 server ECN capability confirmed. 2025/04/30 11:59:27 server setting loss timer for packet 3 (1-RTT) to 38.685375ms (in 2025-04-30 11:59:27.624979935 +0000 UTC m=+18.392844060) 2025/04/30 11:59:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:27 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:27 Replacing connection for connection IDs [12704263 29a49df8 094e8e84 7d11cc74 27d0d069 37d9bfad] with a closed connection. 2025/04/30 11:59:27 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:27 server Connection d3c16ebb5b815c79 closed. 2025/04/30 11:59:27 server <- Received Initial packet. 2025/04/30 11:59:27 Created qlog file: /logs/qlog/ddd5dc8fb8214a02.sqlog 2025/04/30 11:59:27 server Changing connection ID to a3b3c8d2. 2025/04/30 11:59:27 Adding connection IDs ddd5dc8fb8214a02 and a3b3c8d2 for a new connection. 2025/04/30 11:59:27 server <- Reading packet 0 (1252 bytes) for connection ddd5dc8fb8214a02, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: ddd5dc8fb8214a02, SrcConnectionID: (empty), Token: 0xdb117d53ba99a8fe71ddc21492709cd49ed75e166dfa5a763adb9627ccd3a2fbf956786f94b845c877f8438bf259db6c0bb632f942fe89f50a322b4ffa9ffad95bf3db2c7160d4da7f4fedffe42d8803571cc4769c54, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:27 server -> Sending packet 0 (40 bytes) for connection ddd5dc8fb8214a02, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a3b3c8d2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:27 server <- Reading packet 1 (708 bytes) for connection ddd5dc8fb8214a02, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: ddd5dc8fb8214a02, SrcConnectionID: (empty), Token: 0xdb117d53ba99a8fe71ddc21492709cd49ed75e166dfa5a763adb9627ccd3a2fbf956786f94b845c877f8438bf259db6c0bb632f942fe89f50a322b4ffa9ffad95bf3db2c7160d4da7f4fedffe42d8803571cc4769c54, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:27 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:27 Adding connection ID 37ae5862. 2025/04/30 11:59:27 Adding connection ID 14a74e39. 2025/04/30 11:59:27 Adding connection ID faf9267e. 2025/04/30 11:59:27 Adding connection ID dd71e113. 2025/04/30 11:59:27 Adding connection ID 6955f0fb. 2025/04/30 11:59:27 server coalesced packet has different destination connection ID: 00000000, expected ddd5dc8fb8214a02 2025/04/30 11:59:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ddd5dc8fb8214a02 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a3b3c8d2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 937, Version: v1} 2025/04/30 11:59:27 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3b3c8d2, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:27 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: faf9267e, StatelessResetToken: 0xff915110ae6c641e5ada35cf0d9b1fdc} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 6955f0fb, StatelessResetToken: 0xa943990c152e76af8a400d8cbf8ec6bd} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 14a74e39, StatelessResetToken: 0xcd6441348ec9d45a0538a4ee0d9e28cb} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dd71e113, StatelessResetToken: 0x4f69931042713459e66bf72afc33bcc6} 2025/04/30 11:59:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 37ae5862, StatelessResetToken: 0x6d946fc61919752acd04531b03643794} 2025/04/30 11:59:27 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:27 server -> Sending packet 2 (1280 bytes) for connection ddd5dc8fb8214a02, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a3b3c8d2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:27 server -> Sending packet 3 (1280 bytes) for connection ddd5dc8fb8214a02, Initial 2025/04/30 11:59:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a3b3c8d2, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:28 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:28 server -> Sending packet 1 (190 bytes) for connection ddd5dc8fb8214a02, Handshake 2025/04/30 11:59:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3b3c8d2, PacketNumber: 1, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:28 server -> Sending packet 2 (190 bytes) for connection ddd5dc8fb8214a02, Handshake 2025/04/30 11:59:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a3b3c8d2, PacketNumber: 2, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:28 server Parsed a coalesced packet. Part 1: 712 bytes. Remaining: 540 bytes. 2025/04/30 11:59:28 server <- Reading packet 3 (712 bytes) for connection a3b3c8d2, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: a3b3c8d2, SrcConnectionID: (empty), Token: 0xdb117d53ba99a8fe71ddc21492709cd49ed75e166dfa5a763adb9627ccd3a2fbf956786f94b845c877f8438bf259db6c0bb632f942fe89f50a322b4ffa9ffad95bf3db2c7160d4da7f4fedffe42d8803571cc4769c54, PacketNumber: 3, PacketNumberLen: 1, Length: 611, Version: v1} 2025/04/30 11:59:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 26.688ms} 2025/04/30 11:59:28 server newly acked packets (1): [3] 2025/04/30 11:59:28 server updated RTT: 60.798687ms (σ: 30.399343ms) 2025/04/30 11:59:28 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:28 server coalesced packet has different destination connection ID: 00000000, expected a3b3c8d2 2025/04/30 11:59:28 server -> Sending packet 4 (42 bytes) for connection ddd5dc8fb8214a02, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a3b3c8d2, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:28 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server <- Reading packet 0 (74 bytes) for connection a3b3c8d2, Handshake 2025/04/30 11:59:28 server Long Header{Type: Handshake, DestConnectionID: a3b3c8d2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:28 server Dropping Initial keys. 2025/04/30 11:59:28 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 488µs} 2025/04/30 11:59:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:28 Retiring connection ID ddd5dc8fb8214a02 in 5s. 2025/04/30 11:59:28 server Dropping Handshake keys. 2025/04/30 11:59:28 server -> Sending packet 1 (251 bytes) for connection ddd5dc8fb8214a02, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:28 server -> &wire.NewTokenFrame{Token: 0x140b713763efe8fff786bf9e400e4b46ad1bc492bf0f002b1b6bc0b895eed8a0b3e82e5575743c9bfdbeabf66ed6c9a51673b0aed3d8e440e4c5b39775929ddd84da60afc67f950c90a81830f388b2f53d65eff0d8f9} 2025/04/30 11:59:28 Removing connection ID 0e99fc2886d38706008afe after it has been retired. 2025/04/30 11:59:28 Removing connection IDs [74e72688 230ad931 3a79d606 09fceaf0 9da525f4 32678d94] for a closed connection after it has been retired. 2025/04/30 11:59:28 server <- Reading packet 2 (42 bytes) for connection a3b3c8d2, 1-RTT 2025/04/30 11:59:28 server Short Header{DestConnectionID: a3b3c8d2, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:28 server <- Reading packet 3 (25 bytes) for connection a3b3c8d2, 1-RTT 2025/04/30 11:59:28 server Short Header{DestConnectionID: a3b3c8d2, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:28 server <- &wire.PingFrame{} 2025/04/30 11:59:28 Received request: GET /lrolykpdib 2025/04/30 11:59:28 server -> Sending packet 2 (27 bytes) for connection ddd5dc8fb8214a02, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 194.835µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server -> Sending packet 3 (1045 bytes) for connection ddd5dc8fb8214a02, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:28 server <- Reading packet 4 (1352 bytes) for connection a3b3c8d2, 1-RTT 2025/04/30 11:59:28 server Short Header{DestConnectionID: a3b3c8d2, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:28 server <- &wire.PingFrame{} 2025/04/30 11:59:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:28 server <- Reading packet 5 (30 bytes) for connection a3b3c8d2, 1-RTT 2025/04/30 11:59:28 server Short Header{DestConnectionID: a3b3c8d2, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server newly acked packets (2): [1 3] 2025/04/30 11:59:28 server updated RTT: 57.192ms (σ: 30.01ms) 2025/04/30 11:59:28 server ECN capability confirmed. 2025/04/30 11:59:28 server lost packet 0 (time threshold) 2025/04/30 11:59:28 server Canceling loss detection timer. 2025/04/30 11:59:28 server -> Sending packet 4 (150 bytes) for connection ddd5dc8fb8214a02, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 155.361µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 6955f0fb, StatelessResetToken: 0xa943990c152e76af8a400d8cbf8ec6bd} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 14a74e39, StatelessResetToken: 0xcd6441348ec9d45a0538a4ee0d9e28cb} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: faf9267e, StatelessResetToken: 0xff915110ae6c641e5ada35cf0d9b1fdc} 2025/04/30 11:59:28 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dd71e113, StatelessResetToken: 0x4f69931042713459e66bf72afc33bcc6} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 37ae5862, StatelessResetToken: 0x6d946fc61919752acd04531b03643794} 2025/04/30 11:59:28 server <- Reading packet 6 (41 bytes) for connection a3b3c8d2, 1-RTT 2025/04/30 11:59:28 server Short Header{DestConnectionID: a3b3c8d2, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 256µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:28 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:28 Replacing connection for connection IDs [dd71e113 6955f0fb a3b3c8d2 37ae5862 14a74e39 faf9267e] with a closed connection. 2025/04/30 11:59:28 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:28 server Connection ddd5dc8fb8214a02 closed. 2025/04/30 11:59:28 Removing connection ID de088032a6cc8960ac0e6a842a205998ab after it has been retired. 2025/04/30 11:59:28 Removing connection IDs [6b772488 312d7c5b 13a361a3 16d044ef b44ff5db 4b397dea] for a closed connection after it has been retired. 2025/04/30 11:59:28 server <- Received Initial packet. 2025/04/30 11:59:28 Created qlog file: /logs/qlog/cb407c08347e5182.sqlog 2025/04/30 11:59:28 server Changing connection ID to c5c47fca. 2025/04/30 11:59:28 Adding connection IDs cb407c08347e5182 and c5c47fca for a new connection. 2025/04/30 11:59:28 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:28 server <- Reading packet 1 (708 bytes) for connection cb407c08347e5182, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: cb407c08347e5182, SrcConnectionID: (empty), Token: 0x140b713763efe8fff786bf9e400e4b46ad1bc492bf0f002b1b6bc0b895eed8a0b3e82e5575743c9bfdbeabf66ed6c9a51673b0aed3d8e440e4c5b39775929ddd84da60afc67f950c90a81830f388b2f53d65eff0d8f9, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:28 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:28 server coalesced packet has different destination connection ID: 00000000, expected cb407c08347e5182 2025/04/30 11:59:28 server -> Sending packet 0 (40 bytes) for connection cb407c08347e5182, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c5c47fca, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server <- Reading packet 2 (1252 bytes) for connection cb407c08347e5182, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: cb407c08347e5182, SrcConnectionID: (empty), Token: 0x140b713763efe8fff786bf9e400e4b46ad1bc492bf0f002b1b6bc0b895eed8a0b3e82e5575743c9bfdbeabf66ed6c9a51673b0aed3d8e440e4c5b39775929ddd84da60afc67f950c90a81830f388b2f53d65eff0d8f9, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:28 Adding connection ID 7de15f20. 2025/04/30 11:59:28 Adding connection ID ef76d055. 2025/04/30 11:59:28 Adding connection ID e50d7fc8. 2025/04/30 11:59:28 Adding connection ID c48cc7d1. 2025/04/30 11:59:28 Adding connection ID 834e50eb. 2025/04/30 11:59:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cb407c08347e5182 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c5c47fca, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 939, Version: v1} 2025/04/30 11:59:28 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c5c47fca, PacketNumber: 0, PacketNumberLen: 2, Length: 175, Version: v1} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e50d7fc8, StatelessResetToken: 0x2b2a0c2fc47e7c08c9bcaab79d75608a} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c48cc7d1, StatelessResetToken: 0xa26dd2a0afc2f308fbbba21e4b517a3d} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7de15f20, StatelessResetToken: 0x8451b3c7a751efbd6cfa814014fbb127} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ef76d055, StatelessResetToken: 0x3ceb6e657e9922a9415e11621670b0c1} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 834e50eb, StatelessResetToken: 0xbce160c9c07ceb3081a609049b136b73} 2025/04/30 11:59:28 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:28 server <- Reading packet 3 (708 bytes) for connection cb407c08347e5182, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: cb407c08347e5182, SrcConnectionID: (empty), Token: 0x140b713763efe8fff786bf9e400e4b46ad1bc492bf0f002b1b6bc0b895eed8a0b3e82e5575743c9bfdbeabf66ed6c9a51673b0aed3d8e440e4c5b39775929ddd84da60afc67f950c90a81830f388b2f53d65eff0d8f9, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:28 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:28 server coalesced packet has different destination connection ID: 00000000, expected cb407c08347e5182 2025/04/30 11:59:28 server -> Sending packet 2 (40 bytes) for connection cb407c08347e5182, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c5c47fca, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:28 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:28 server -> Sending packet 3 (1280 bytes) for connection cb407c08347e5182, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c5c47fca, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:28 server -> Sending packet 4 (1280 bytes) for connection cb407c08347e5182, Initial 2025/04/30 11:59:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c5c47fca, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:28 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:28 server -> Sending packet 1 (188 bytes) for connection cb407c08347e5182, Handshake 2025/04/30 11:59:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c5c47fca, PacketNumber: 1, PacketNumberLen: 2, Length: 175, Version: v1} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/04/30 11:59:28 server -> Sending packet 2 (188 bytes) for connection cb407c08347e5182, Handshake 2025/04/30 11:59:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c5c47fca, PacketNumber: 2, PacketNumberLen: 2, Length: 175, Version: v1} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/04/30 11:59:28 server <- Reading packet 1 (74 bytes) for connection c5c47fca, Handshake 2025/04/30 11:59:28 server Long Header{Type: Handshake, DestConnectionID: c5c47fca, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:28 server Dropping Initial keys. 2025/04/30 11:59:28 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:59:28 server newly acked packets (1): [2] 2025/04/30 11:59:28 server updated RTT: 31.829643ms (σ: 15.914821ms) 2025/04/30 11:59:28 server Canceling loss detection timer. 2025/04/30 11:59:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:28 Retiring connection ID cb407c08347e5182 in 5s. 2025/04/30 11:59:28 server Dropping Handshake keys. 2025/04/30 11:59:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:28 server -> Sending packet 2 (371 bytes) for connection cb407c08347e5182, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c48cc7d1, StatelessResetToken: 0xa26dd2a0afc2f308fbbba21e4b517a3d} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ef76d055, StatelessResetToken: 0x3ceb6e657e9922a9415e11621670b0c1} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7de15f20, StatelessResetToken: 0x8451b3c7a751efbd6cfa814014fbb127} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 834e50eb, StatelessResetToken: 0xbce160c9c07ceb3081a609049b136b73} 2025/04/30 11:59:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e50d7fc8, StatelessResetToken: 0x2b2a0c2fc47e7c08c9bcaab79d75608a} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:28 server -> &wire.NewTokenFrame{Token: 0x1c8751ca47596f448e819d9259b10ea347d718caba3454f1e9037bc36212eed821d08234a1027a9d51e56f8e8306f71c98020bad3eb9f0568f75f98cf012df42ac4740f5718bd98ef5a80ab2240e7669f8a8ccc0f53f} 2025/04/30 11:59:28 server -> Sending packet 3 (371 bytes) for connection cb407c08347e5182, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.NewTokenFrame{Token: 0x1c8751ca47596f448e819d9259b10ea347d718caba3454f1e9037bc36212eed821d08234a1027a9d51e56f8e8306f71c98020bad3eb9f0568f75f98cf012df42ac4740f5718bd98ef5a80ab2240e7669f8a8ccc0f53f} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 834e50eb, StatelessResetToken: 0xbce160c9c07ceb3081a609049b136b73} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c48cc7d1, StatelessResetToken: 0xa26dd2a0afc2f308fbbba21e4b517a3d} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7de15f20, StatelessResetToken: 0x8451b3c7a751efbd6cfa814014fbb127} 2025/04/30 11:59:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e50d7fc8, StatelessResetToken: 0x2b2a0c2fc47e7c08c9bcaab79d75608a} 2025/04/30 11:59:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ef76d055, StatelessResetToken: 0x3ceb6e657e9922a9415e11621670b0c1} 2025/04/30 11:59:28 server <- Reading packet 0 (42 bytes) for connection c5c47fca, 1-RTT 2025/04/30 11:59:28 server Short Header{DestConnectionID: c5c47fca, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:28 server -> Sending packet 4 (27 bytes) for connection cb407c08347e5182, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 394.105µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:28 Received request: GET /fstipxbtzz 2025/04/30 11:59:28 server -> Sending packet 5 (1045 bytes) for connection cb407c08347e5182, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:28 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:28 server <- Reading packet 2 (32 bytes) for connection c5c47fca, 1-RTT 2025/04/30 11:59:28 server Short Header{DestConnectionID: c5c47fca, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:28 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 24µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server newly acked packets (2): [3 5] 2025/04/30 11:59:28 server updated RTT: 31.905ms (σ: 12.087ms) 2025/04/30 11:59:28 server ECN capability confirmed. 2025/04/30 11:59:28 server Canceling loss detection timer. 2025/04/30 11:59:28 server <- Reading packet 3 (43 bytes) for connection c5c47fca, 1-RTT 2025/04/30 11:59:28 server Short Header{DestConnectionID: c5c47fca, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:28 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 280µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:28 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:28 Replacing connection for connection IDs [c48cc7d1 834e50eb c5c47fca 7de15f20 ef76d055 e50d7fc8] with a closed connection. 2025/04/30 11:59:28 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:28 server Connection cb407c08347e5182 closed. 2025/04/30 11:59:29 Tracking 55 connection IDs and 0 reset tokens. 2025/04/30 11:59:29 server <- Received Initial packet. 2025/04/30 11:59:29 Created qlog file: /logs/qlog/7c08ec4b40d23ddb72.sqlog 2025/04/30 11:59:29 server Changing connection ID to 64b11f37. 2025/04/30 11:59:29 Adding connection IDs 7c08ec4b40d23ddb72 and 64b11f37 for a new connection. 2025/04/30 11:59:29 server <- Reading packet 0 (1252 bytes) for connection 7c08ec4b40d23ddb72, Initial 2025/04/30 11:59:29 server Long Header{Type: Initial, DestConnectionID: 7c08ec4b40d23ddb72, SrcConnectionID: (empty), Token: 0x1c8751ca47596f448e819d9259b10ea347d718caba3454f1e9037bc36212eed821d08234a1027a9d51e56f8e8306f71c98020bad3eb9f0568f75f98cf012df42ac4740f5718bd98ef5a80ab2240e7669f8a8ccc0f53f, PacketNumber: 0, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:59:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:59:29 server -> Sending packet 0 (40 bytes) for connection 7c08ec4b40d23ddb72, Initial 2025/04/30 11:59:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 64b11f37, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:29 Removing connection ID aa47dfba6ce33d8ef7c5445f5b2363bd4f after it has been retired. 2025/04/30 11:59:29 server <- Reading packet 4 (1252 bytes) for connection 7c08ec4b40d23ddb72, Initial 2025/04/30 11:59:29 server Long Header{Type: Initial, DestConnectionID: 7c08ec4b40d23ddb72, SrcConnectionID: (empty), Token: 0x1c8751ca47596f448e819d9259b10ea347d718caba3454f1e9037bc36212eed821d08234a1027a9d51e56f8e8306f71c98020bad3eb9f0568f75f98cf012df42ac4740f5718bd98ef5a80ab2240e7669f8a8ccc0f53f, PacketNumber: 4, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:59:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:59:29 server -> Sending packet 1 (42 bytes) for connection 7c08ec4b40d23ddb72, Initial 2025/04/30 11:59:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 64b11f37, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:29 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:29 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:59:29 server <- Reading packet 5 (710 bytes) for connection 7c08ec4b40d23ddb72, Initial 2025/04/30 11:59:29 server Long Header{Type: Initial, DestConnectionID: 7c08ec4b40d23ddb72, SrcConnectionID: (empty), Token: 0x1c8751ca47596f448e819d9259b10ea347d718caba3454f1e9037bc36212eed821d08234a1027a9d51e56f8e8306f71c98020bad3eb9f0568f75f98cf012df42ac4740f5718bd98ef5a80ab2240e7669f8a8ccc0f53f, PacketNumber: 5, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:29 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:29 Adding connection ID a4293ce8. 2025/04/30 11:59:29 Adding connection ID 74917723. 2025/04/30 11:59:29 Adding connection ID 12306559. 2025/04/30 11:59:29 Adding connection ID 61c12827. 2025/04/30 11:59:29 Adding connection ID ac8bcc9d. 2025/04/30 11:59:29 server coalesced packet has different destination connection ID: 00000000, expected 7c08ec4b40d23ddb72 2025/04/30 11:59:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7c08ec4b40d23ddb72 2025/04/30 11:59:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 64b11f37, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 931, Version: v1} 2025/04/30 11:59:29 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 64b11f37, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:59:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12306559, StatelessResetToken: 0xf37eb79eb3d8dcee318f8e6a674792c8} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 74917723, StatelessResetToken: 0xee96f1bebf67d65dbc59cd63f7169484} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a4293ce8, StatelessResetToken: 0xc6da7d8605d974d9046bcd73436415cf} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 61c12827, StatelessResetToken: 0x0cefada0dafd338d4326bbb56b30ca22} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ac8bcc9d, StatelessResetToken: 0x644b3abd565c2ced9a71f7600887ac52} 2025/04/30 11:59:29 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:29 server <- Reading packet 7 (124 bytes) for connection 64b11f37, Initial 2025/04/30 11:59:29 server Long Header{Type: Initial, DestConnectionID: 64b11f37, SrcConnectionID: (empty), Token: 0x1c8751ca47596f448e819d9259b10ea347d718caba3454f1e9037bc36212eed821d08234a1027a9d51e56f8e8306f71c98020bad3eb9f0568f75f98cf012df42ac4740f5718bd98ef5a80ab2240e7669f8a8ccc0f53f, PacketNumber: 7, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:29 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 808µs} 2025/04/30 11:59:29 server newly acked packets (1): [2] 2025/04/30 11:59:29 server updated RTT: 32.662113ms (σ: 16.331056ms) 2025/04/30 11:59:29 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:29 server <- Reading packet 0 (75 bytes) for connection 64b11f37, Handshake 2025/04/30 11:59:29 server Long Header{Type: Handshake, DestConnectionID: 64b11f37, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:29 server Dropping Initial keys. 2025/04/30 11:59:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 808µs} 2025/04/30 11:59:29 server newly acked packets (1): [0] 2025/04/30 11:59:29 server updated RTT: 32.662ms (σ: 12.248ms) 2025/04/30 11:59:29 server Canceling loss detection timer. 2025/04/30 11:59:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:29 Retiring connection ID 7c08ec4b40d23ddb72 in 5s. 2025/04/30 11:59:29 server Dropping Handshake keys. 2025/04/30 11:59:29 server -> Sending packet 1 (251 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:29 server -> &wire.NewTokenFrame{Token: 0x62948967a87acd28a26c7e2db8658724ea9b87c28268f3108b1f22bbf29735f201734b4cca61e7d727de1748a573c465536d3bb755113f374c97ff407b5cbbf4878cd6aea2898e799c0889295ec05a702ec198466181} 2025/04/30 11:59:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:29 server <- Reading packet 2 (1352 bytes) for connection 64b11f37, 1-RTT 2025/04/30 11:59:29 server Short Header{DestConnectionID: 64b11f37, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:29 server <- &wire.PingFrame{} 2025/04/30 11:59:29 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:29 server -> Sending packet 2 (24 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 91.361µs} 2025/04/30 11:59:29 server <- Reading packet 4 (1392 bytes) for connection 64b11f37, 1-RTT 2025/04/30 11:59:29 server Short Header{DestConnectionID: 64b11f37, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:29 server <- &wire.PingFrame{} 2025/04/30 11:59:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:29 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:29 server -> Sending packet 3 (26 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 145.743µs} 2025/04/30 11:59:29 Received request: GET /zomkdjhupf 2025/04/30 11:59:29 server -> Sending packet 4 (1045 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:29 server <- Reading packet 5 (1444 bytes) for connection 64b11f37, 1-RTT 2025/04/30 11:59:29 server Short Header{DestConnectionID: 64b11f37, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:29 server <- &wire.PingFrame{} 2025/04/30 11:59:29 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:29 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:29 server -> Sending packet 5 (27 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25.312321ms} 2025/04/30 11:59:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:29 server -> Sending packet 7 (139 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 61c12827, StatelessResetToken: 0x0cefada0dafd338d4326bbb56b30ca22} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ac8bcc9d, StatelessResetToken: 0x644b3abd565c2ced9a71f7600887ac52} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12306559, StatelessResetToken: 0xf37eb79eb3d8dcee318f8e6a674792c8} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a4293ce8, StatelessResetToken: 0xc6da7d8605d974d9046bcd73436415cf} 2025/04/30 11:59:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 74917723, StatelessResetToken: 0xee96f1bebf67d65dbc59cd63f7169484} 2025/04/30 11:59:29 server Skipping packet number 6 2025/04/30 11:59:29 server -> Sending packet 8 (251 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:29 server -> &wire.NewTokenFrame{Token: 0x62948967a87acd28a26c7e2db8658724ea9b87c28268f3108b1f22bbf29735f201734b4cca61e7d727de1748a573c465536d3bb755113f374c97ff407b5cbbf4878cd6aea2898e799c0889295ec05a702ec198466181} 2025/04/30 11:59:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:29 server -> Sending packet 9 (1366 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.PingFrame{} 2025/04/30 11:59:29 server <- Reading packet 6 (25 bytes) for connection 64b11f37, 1-RTT 2025/04/30 11:59:29 server Short Header{DestConnectionID: 64b11f37, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:29 server <- &wire.PingFrame{} 2025/04/30 11:59:29 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:29 server <- Reading packet 7 (25 bytes) for connection 64b11f37, 1-RTT 2025/04/30 11:59:29 server Short Header{DestConnectionID: 64b11f37, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:29 server <- &wire.PingFrame{} 2025/04/30 11:59:29 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:29 server -> Sending packet 10 (26 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 52.844µs} 2025/04/30 11:59:29 server <- Reading packet 8 (32 bytes) for connection 64b11f37, 1-RTT 2025/04/30 11:59:29 server Short Header{DestConnectionID: 64b11f37, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:29 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 0}}, DelayTime: 64µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:29 server newly acked packets (1): [7] 2025/04/30 11:59:29 server updated RTT: 32.479ms (σ: 9.55ms) 2025/04/30 11:59:29 server ECN capability confirmed. 2025/04/30 11:59:29 server lost packet 4 (time threshold) 2025/04/30 11:59:29 server -> Sending packet 11 (1045 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:29 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 11:59:29 Removing connection IDs [ac0aa733 2a06708c cfed9ec7 38681b7c 524a49a0 aa6cb5d5] for a closed connection after it has been retired. 2025/04/30 11:59:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:29 server -> Sending packet 13 (251 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:29 server -> &wire.NewTokenFrame{Token: 0x62948967a87acd28a26c7e2db8658724ea9b87c28268f3108b1f22bbf29735f201734b4cca61e7d727de1748a573c465536d3bb755113f374c97ff407b5cbbf4878cd6aea2898e799c0889295ec05a702ec198466181} 2025/04/30 11:59:29 server Skipping packet number 12 2025/04/30 11:59:29 server -> Sending packet 14 (1045 bytes) for connection 7c08ec4b40d23ddb72, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:29 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:29 server <- Reading packet 12 (44 bytes) for connection 64b11f37, 1-RTT 2025/04/30 11:59:29 server Short Header{DestConnectionID: 64b11f37, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:29 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 7}, {Largest: 3, Smallest: 0}}, DelayTime: 91.368ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:59:29 server newly acked packets (1): [9] 2025/04/30 11:59:29 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:29 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:29 Replacing connection for connection IDs [ac8bcc9d 64b11f37 a4293ce8 74917723 12306559 61c12827] with a closed connection. 2025/04/30 11:59:29 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:29 server Connection 7c08ec4b40d23ddb72 closed. 2025/04/30 11:59:30 server <- Received Initial packet. 2025/04/30 11:59:30 Created qlog file: /logs/qlog/c52f7b4773d5899f.sqlog 2025/04/30 11:59:30 server Changing connection ID to 83d9c9cc. 2025/04/30 11:59:30 Adding connection IDs c52f7b4773d5899f and 83d9c9cc for a new connection. 2025/04/30 11:59:30 server <- Reading packet 0 (1252 bytes) for connection c52f7b4773d5899f, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: c52f7b4773d5899f, SrcConnectionID: (empty), Token: 0x62948967a87acd28a26c7e2db8658724ea9b87c28268f3108b1f22bbf29735f201734b4cca61e7d727de1748a573c465536d3bb755113f374c97ff407b5cbbf4878cd6aea2898e799c0889295ec05a702ec198466181, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:30 server -> Sending packet 0 (40 bytes) for connection c52f7b4773d5899f, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:30 server <- Reading packet 1 (708 bytes) for connection c52f7b4773d5899f, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: c52f7b4773d5899f, SrcConnectionID: (empty), Token: 0x62948967a87acd28a26c7e2db8658724ea9b87c28268f3108b1f22bbf29735f201734b4cca61e7d727de1748a573c465536d3bb755113f374c97ff407b5cbbf4878cd6aea2898e799c0889295ec05a702ec198466181, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:30 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:30 Adding connection ID ff76285c. 2025/04/30 11:59:30 Adding connection ID 310f4c9c. 2025/04/30 11:59:30 Adding connection ID b9c94b07. 2025/04/30 11:59:30 Adding connection ID fed4376f. 2025/04/30 11:59:30 Adding connection ID 9312a2e3. 2025/04/30 11:59:30 server coalesced packet has different destination connection ID: 00000000, expected c52f7b4773d5899f 2025/04/30 11:59:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c52f7b4773d5899f 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 934, Version: v1} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9312a2e3, StatelessResetToken: 0x76a06a3d88e747180615e1310d30c15b} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff76285c, StatelessResetToken: 0x7e74f867080fe4e523ba033c4d1790b4} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b9c94b07, StatelessResetToken: 0x345b85a96d8c5740296f6e7f87b0bedf} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fed4376f, StatelessResetToken: 0x5264c02262cf4601f051eb64135f914f} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 310f4c9c, StatelessResetToken: 0x0a0d95efc74b889266ee68d4f9e84598} 2025/04/30 11:59:30 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:30 server -> Sending packet 2 (1280 bytes) for connection c52f7b4773d5899f, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:30 server -> Sending packet 3 (1280 bytes) for connection c52f7b4773d5899f, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:30 server -> Sending packet 1 (193 bytes) for connection c52f7b4773d5899f, Handshake 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, PacketNumber: 1, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:59:30 server -> Sending packet 2 (193 bytes) for connection c52f7b4773d5899f, Handshake 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, PacketNumber: 2, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:59:30 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:59:30 server <- Reading packet 2 (125 bytes) for connection 83d9c9cc, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: 83d9c9cc, SrcConnectionID: (empty), Token: 0x62948967a87acd28a26c7e2db8658724ea9b87c28268f3108b1f22bbf29735f201734b4cca61e7d727de1748a573c465536d3bb755113f374c97ff407b5cbbf4878cd6aea2898e799c0889295ec05a702ec198466181, PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 464µs} 2025/04/30 11:59:30 server newly acked packets (1): [3] 2025/04/30 11:59:30 server updated RTT: 34.190242ms (σ: 17.095121ms) 2025/04/30 11:59:30 server coalesced packet has different destination connection ID: 00000000, expected 83d9c9cc 2025/04/30 11:59:30 server Parsed a coalesced packet. Part 1: 712 bytes. Remaining: 540 bytes. 2025/04/30 11:59:30 server <- Reading packet 3 (712 bytes) for connection 83d9c9cc, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: 83d9c9cc, SrcConnectionID: (empty), Token: 0x62948967a87acd28a26c7e2db8658724ea9b87c28268f3108b1f22bbf29735f201734b4cca61e7d727de1748a573c465536d3bb755113f374c97ff407b5cbbf4878cd6aea2898e799c0889295ec05a702ec198466181, PacketNumber: 3, PacketNumberLen: 1, Length: 611, Version: v1} 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 27.688ms} 2025/04/30 11:59:30 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:30 server coalesced packet has different destination connection ID: 00000000, expected 83d9c9cc 2025/04/30 11:59:30 server -> Sending packet 4 (40 bytes) for connection c52f7b4773d5899f, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:30 server -> Sending packet 3 (193 bytes) for connection c52f7b4773d5899f, Handshake 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, PacketNumber: 3, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:59:30 server -> Sending packet 4 (193 bytes) for connection c52f7b4773d5899f, Handshake 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, PacketNumber: 4, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:59:30 server Parsed a coalesced packet. Part 1: 121 bytes. Remaining: 1131 bytes. 2025/04/30 11:59:30 server <- Reading packet 4 (121 bytes) for connection 83d9c9cc, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: 83d9c9cc, SrcConnectionID: (empty), Token: 0x62948967a87acd28a26c7e2db8658724ea9b87c28268f3108b1f22bbf29735f201734b4cca61e7d727de1748a573c465536d3bb755113f374c97ff407b5cbbf4878cd6aea2898e799c0889295ec05a702ec198466181, PacketNumber: 4, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 11:59:30 server <- &wire.PingFrame{} 2025/04/30 11:59:30 server coalesced packet has different destination connection ID: 00000000, expected 83d9c9cc 2025/04/30 11:59:30 server -> Sending packet 5 (40 bytes) for connection c52f7b4773d5899f, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 83d9c9cc, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server <- Reading packet 0 (74 bytes) for connection 83d9c9cc, Handshake 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: 83d9c9cc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:30 server Dropping Initial keys. 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 496µs} 2025/04/30 11:59:30 server newly acked packets (1): [4] 2025/04/30 11:59:30 server updated RTT: 33.885ms (σ: 13.431ms) 2025/04/30 11:59:30 server Canceling loss detection timer. 2025/04/30 11:59:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:30 Retiring connection ID c52f7b4773d5899f in 5s. 2025/04/30 11:59:30 server Dropping Handshake keys. 2025/04/30 11:59:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:30 server -> Sending packet 2 (371 bytes) for connection c52f7b4773d5899f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff76285c, StatelessResetToken: 0x7e74f867080fe4e523ba033c4d1790b4} 2025/04/30 11:59:30 server -> &wire.NewTokenFrame{Token: 0x6f22dab8de5abc10dd6b212f74e792790c90919dd282c86e291c487e2b0724f3f557e1d61f616a20005afd7eacb221a5c60fa4945a6149960d6760aada0c7d7e5eb646a2305f7473490a6f172611d3c5289bfd5adfe8} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 310f4c9c, StatelessResetToken: 0x0a0d95efc74b889266ee68d4f9e84598} 2025/04/30 11:59:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fed4376f, StatelessResetToken: 0x5264c02262cf4601f051eb64135f914f} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9312a2e3, StatelessResetToken: 0x76a06a3d88e747180615e1310d30c15b} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b9c94b07, StatelessResetToken: 0x345b85a96d8c5740296f6e7f87b0bedf} 2025/04/30 11:59:30 server -> Sending packet 3 (371 bytes) for connection c52f7b4773d5899f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fed4376f, StatelessResetToken: 0x5264c02262cf4601f051eb64135f914f} 2025/04/30 11:59:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 310f4c9c, StatelessResetToken: 0x0a0d95efc74b889266ee68d4f9e84598} 2025/04/30 11:59:30 server -> &wire.NewTokenFrame{Token: 0x6f22dab8de5abc10dd6b212f74e792790c90919dd282c86e291c487e2b0724f3f557e1d61f616a20005afd7eacb221a5c60fa4945a6149960d6760aada0c7d7e5eb646a2305f7473490a6f172611d3c5289bfd5adfe8} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9312a2e3, StatelessResetToken: 0x76a06a3d88e747180615e1310d30c15b} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b9c94b07, StatelessResetToken: 0x345b85a96d8c5740296f6e7f87b0bedf} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff76285c, StatelessResetToken: 0x7e74f867080fe4e523ba033c4d1790b4} 2025/04/30 11:59:30 server <- Reading packet 0 (42 bytes) for connection 83d9c9cc, 1-RTT 2025/04/30 11:59:30 server Short Header{DestConnectionID: 83d9c9cc, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:30 server -> Sending packet 4 (27 bytes) for connection c52f7b4773d5899f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 356.81µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:30 Received request: GET /mipimlfzec 2025/04/30 11:59:30 server -> Sending packet 5 (1045 bytes) for connection c52f7b4773d5899f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:30 server <- Reading packet 1 (1352 bytes) for connection 83d9c9cc, 1-RTT 2025/04/30 11:59:30 server Short Header{DestConnectionID: 83d9c9cc, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 288µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server <- &wire.PingFrame{} 2025/04/30 11:59:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:30 server <- Reading packet 2 (1392 bytes) for connection 83d9c9cc, 1-RTT 2025/04/30 11:59:30 server Short Header{DestConnectionID: 83d9c9cc, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:30 server <- &wire.PingFrame{} 2025/04/30 11:59:30 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:30 server <- Reading packet 3 (32 bytes) for connection 83d9c9cc, 1-RTT 2025/04/30 11:59:30 server Short Header{DestConnectionID: 83d9c9cc, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server newly acked packets (2): [3 5] 2025/04/30 11:59:30 server updated RTT: 33.815ms (σ: 10.212ms) 2025/04/30 11:59:30 server ECN capability confirmed. 2025/04/30 11:59:30 server Canceling loss detection timer. 2025/04/30 11:59:30 server -> Sending packet 6 (30 bytes) for connection c52f7b4773d5899f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 141.235µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:30 server -> Sending packet 8 (22 bytes) for connection c52f7b4773d5899f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:30 server -> Sending packet 9 (22 bytes) for connection c52f7b4773d5899f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:30 server <- Reading packet 6 (44 bytes) for connection 83d9c9cc, 1-RTT 2025/04/30 11:59:30 server Short Header{DestConnectionID: 83d9c9cc, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 128.056ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:30 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:30 Replacing connection for connection IDs [83d9c9cc ff76285c 310f4c9c b9c94b07 fed4376f 9312a2e3] with a closed connection. 2025/04/30 11:59:30 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:30 server Connection c52f7b4773d5899f closed. 2025/04/30 11:59:30 Removing connection ID 437307c51a19e27f after it has been retired. 2025/04/30 11:59:30 server <- Received Initial packet. 2025/04/30 11:59:30 Created qlog file: /logs/qlog/c5190be8b8f9b7d9.sqlog 2025/04/30 11:59:30 server Changing connection ID to e0d24d70. 2025/04/30 11:59:30 Adding connection IDs c5190be8b8f9b7d9 and e0d24d70 for a new connection. 2025/04/30 11:59:30 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:30 server <- Reading packet 1 (708 bytes) for connection c5190be8b8f9b7d9, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: c5190be8b8f9b7d9, SrcConnectionID: (empty), Token: 0x6f22dab8de5abc10dd6b212f74e792790c90919dd282c86e291c487e2b0724f3f557e1d61f616a20005afd7eacb221a5c60fa4945a6149960d6760aada0c7d7e5eb646a2305f7473490a6f172611d3c5289bfd5adfe8, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:30 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:30 server coalesced packet has different destination connection ID: 00000000, expected c5190be8b8f9b7d9 2025/04/30 11:59:30 server -> Sending packet 0 (40 bytes) for connection c5190be8b8f9b7d9, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0d24d70, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:30 Removing connection IDs [44a94eea 902549c9 870d9169 8fd785eb 5acca98f 065d60fe] for a closed connection after it has been retired. 2025/04/30 11:59:30 server <- Reading packet 2 (1252 bytes) for connection c5190be8b8f9b7d9, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: c5190be8b8f9b7d9, SrcConnectionID: (empty), Token: 0x6f22dab8de5abc10dd6b212f74e792790c90919dd282c86e291c487e2b0724f3f557e1d61f616a20005afd7eacb221a5c60fa4945a6149960d6760aada0c7d7e5eb646a2305f7473490a6f172611d3c5289bfd5adfe8, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:30 Adding connection ID 35c84bc7. 2025/04/30 11:59:30 Adding connection ID d2e0e816. 2025/04/30 11:59:30 Adding connection ID add62a00. 2025/04/30 11:59:30 Adding connection ID 5828afef. 2025/04/30 11:59:30 Adding connection ID c3928b44. 2025/04/30 11:59:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c5190be8b8f9b7d9 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0d24d70, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e0d24d70, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5828afef, StatelessResetToken: 0xd11d05640f830dbdf1cd6ff7adb07b09} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 35c84bc7, StatelessResetToken: 0xd6911e6edb3f58e7aa795ed0f3bdcbfa} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c3928b44, StatelessResetToken: 0x749d3c3e64b2f5a0288c4b6f2dd3889c} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: add62a00, StatelessResetToken: 0xd45a76ad9ecadf16ca1e54951769f7da} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d2e0e816, StatelessResetToken: 0x2d6f56e320fdedae8c80e34b7a2cbb07} 2025/04/30 11:59:30 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:30 server <- Reading packet 3 (708 bytes) for connection c5190be8b8f9b7d9, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: c5190be8b8f9b7d9, SrcConnectionID: (empty), Token: 0x6f22dab8de5abc10dd6b212f74e792790c90919dd282c86e291c487e2b0724f3f557e1d61f616a20005afd7eacb221a5c60fa4945a6149960d6760aada0c7d7e5eb646a2305f7473490a6f172611d3c5289bfd5adfe8, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:30 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:30 server coalesced packet has different destination connection ID: 00000000, expected c5190be8b8f9b7d9 2025/04/30 11:59:30 server -> Sending packet 2 (40 bytes) for connection c5190be8b8f9b7d9, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0d24d70, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:30 server -> Sending packet 3 (1280 bytes) for connection c5190be8b8f9b7d9, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0d24d70, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:30 server -> Sending packet 4 (1280 bytes) for connection c5190be8b8f9b7d9, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0d24d70, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:30 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:59:30 server <- Reading packet 4 (125 bytes) for connection e0d24d70, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: e0d24d70, SrcConnectionID: (empty), Token: 0x6f22dab8de5abc10dd6b212f74e792790c90919dd282c86e291c487e2b0724f3f557e1d61f616a20005afd7eacb221a5c60fa4945a6149960d6760aada0c7d7e5eb646a2305f7473490a6f172611d3c5289bfd5adfe8, PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 456µs} 2025/04/30 11:59:30 server newly acked packets (1): [4] 2025/04/30 11:59:30 server updated RTT: 34.32816ms (σ: 17.16408ms) 2025/04/30 11:59:30 server coalesced packet has different destination connection ID: 00000000, expected e0d24d70 2025/04/30 11:59:30 server Parsed a coalesced packet. Part 1: 127 bytes. Remaining: 1125 bytes. 2025/04/30 11:59:30 server <- Reading packet 5 (127 bytes) for connection e0d24d70, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: e0d24d70, SrcConnectionID: (empty), Token: 0x6f22dab8de5abc10dd6b212f74e792790c90919dd282c86e291c487e2b0724f3f557e1d61f616a20005afd7eacb221a5c60fa4945a6149960d6760aada0c7d7e5eb646a2305f7473490a6f172611d3c5289bfd5adfe8, PacketNumber: 5, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 30.736ms} 2025/04/30 11:59:30 server <- &wire.PingFrame{} 2025/04/30 11:59:30 server coalesced packet has different destination connection ID: 00000000, expected e0d24d70 2025/04/30 11:59:30 server -> Sending packet 5 (40 bytes) for connection c5190be8b8f9b7d9, Initial 2025/04/30 11:59:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0d24d70, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:30 server -> Sending packet 1 (194 bytes) for connection c5190be8b8f9b7d9, Handshake 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e0d24d70, PacketNumber: 1, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:59:30 server -> Sending packet 2 (194 bytes) for connection c5190be8b8f9b7d9, Handshake 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e0d24d70, PacketNumber: 2, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:59:30 server <- Reading packet 0 (75 bytes) for connection e0d24d70, Handshake 2025/04/30 11:59:30 server Long Header{Type: Handshake, DestConnectionID: e0d24d70, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:30 server Dropping Initial keys. 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 632µs} 2025/04/30 11:59:30 server newly acked packets (1): [2] 2025/04/30 11:59:30 server updated RTT: 34.003ms (σ: 13.521ms) 2025/04/30 11:59:30 server Canceling loss detection timer. 2025/04/30 11:59:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:30 Retiring connection ID c5190be8b8f9b7d9 in 5s. 2025/04/30 11:59:30 server Dropping Handshake keys. 2025/04/30 11:59:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:30 server -> Sending packet 2 (371 bytes) for connection c5190be8b8f9b7d9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: add62a00, StatelessResetToken: 0xd45a76ad9ecadf16ca1e54951769f7da} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 35c84bc7, StatelessResetToken: 0xd6911e6edb3f58e7aa795ed0f3bdcbfa} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d2e0e816, StatelessResetToken: 0x2d6f56e320fdedae8c80e34b7a2cbb07} 2025/04/30 11:59:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c3928b44, StatelessResetToken: 0x749d3c3e64b2f5a0288c4b6f2dd3889c} 2025/04/30 11:59:30 server -> &wire.NewTokenFrame{Token: 0x77c7631d443597f1933f5c363cad3b713cc3de899ab683211c60f3f3f8b22caca44aee28adbc0882c526a76cdf91a1fafd9939a05879c198998811721543553632ebd9a1044ed0c30f1ea8d4dfafda117c65e16ad25f} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5828afef, StatelessResetToken: 0xd11d05640f830dbdf1cd6ff7adb07b09} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:30 server -> Sending packet 3 (371 bytes) for connection c5190be8b8f9b7d9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: add62a00, StatelessResetToken: 0xd45a76ad9ecadf16ca1e54951769f7da} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5828afef, StatelessResetToken: 0xd11d05640f830dbdf1cd6ff7adb07b09} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c3928b44, StatelessResetToken: 0x749d3c3e64b2f5a0288c4b6f2dd3889c} 2025/04/30 11:59:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:30 server -> &wire.NewTokenFrame{Token: 0x77c7631d443597f1933f5c363cad3b713cc3de899ab683211c60f3f3f8b22caca44aee28adbc0882c526a76cdf91a1fafd9939a05879c198998811721543553632ebd9a1044ed0c30f1ea8d4dfafda117c65e16ad25f} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d2e0e816, StatelessResetToken: 0x2d6f56e320fdedae8c80e34b7a2cbb07} 2025/04/30 11:59:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 35c84bc7, StatelessResetToken: 0xd6911e6edb3f58e7aa795ed0f3bdcbfa} 2025/04/30 11:59:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:30 server <- Reading packet 0 (42 bytes) for connection e0d24d70, 1-RTT 2025/04/30 11:59:30 server Short Header{DestConnectionID: e0d24d70, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:30 server -> Sending packet 4 (27 bytes) for connection c5190be8b8f9b7d9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 315.954µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:30 Received request: GET /kfwuwbpvav 2025/04/30 11:59:30 server -> Sending packet 5 (1045 bytes) for connection c5190be8b8f9b7d9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:30 server <- Reading packet 2 (1392 bytes) for connection e0d24d70, 1-RTT 2025/04/30 11:59:30 server Short Header{DestConnectionID: e0d24d70, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:30 server <- &wire.PingFrame{} 2025/04/30 11:59:30 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:30 server -> Sending packet 6 (29 bytes) for connection c5190be8b8f9b7d9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:30 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:30 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 132.868µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server <- Reading packet 4 (41 bytes) for connection e0d24d70, 1-RTT 2025/04/30 11:59:30 server Short Header{DestConnectionID: e0d24d70, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:30 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 176µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:30 server newly acked packets (2): [3 5] 2025/04/30 11:59:30 server updated RTT: 33.914ms (σ: 10.317ms) 2025/04/30 11:59:30 server ECN capability confirmed. 2025/04/30 11:59:30 server Canceling loss detection timer. 2025/04/30 11:59:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:30 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:30 Replacing connection for connection IDs [d2e0e816 add62a00 5828afef c3928b44 e0d24d70 35c84bc7] with a closed connection. 2025/04/30 11:59:30 server Connection c5190be8b8f9b7d9 closed. 2025/04/30 11:59:30 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:59:31 server -> Sending packet 25 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:31 server -> Sending packet 26 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:31 Removing connection ID e797fd7711338110b9 after it has been retired. 2025/04/30 11:59:31 server <- Received Initial packet. 2025/04/30 11:59:31 Created qlog file: /logs/qlog/10bfc6f7bc92aa1b5a.sqlog 2025/04/30 11:59:31 server Changing connection ID to 30866000. 2025/04/30 11:59:31 Adding connection IDs 10bfc6f7bc92aa1b5a and 30866000 for a new connection. 2025/04/30 11:59:31 server <- Reading packet 0 (1252 bytes) for connection 10bfc6f7bc92aa1b5a, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: 10bfc6f7bc92aa1b5a, SrcConnectionID: (empty), Token: 0x77c7631d443597f1933f5c363cad3b713cc3de899ab683211c60f3f3f8b22caca44aee28adbc0882c526a76cdf91a1fafd9939a05879c198998811721543553632ebd9a1044ed0c30f1ea8d4dfafda117c65e16ad25f, PacketNumber: 0, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:59:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:59:31 server -> Sending packet 0 (40 bytes) for connection 10bfc6f7bc92aa1b5a, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30866000, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:31 Tracking 63 connection IDs and 0 reset tokens. 2025/04/30 11:59:31 server Parsed a coalesced packet. Part 1: 705 bytes. Remaining: 547 bytes. 2025/04/30 11:59:31 server <- Reading packet 2 (705 bytes) for connection 30866000, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: 30866000, SrcConnectionID: (empty), Token: 0x77c7631d443597f1933f5c363cad3b713cc3de899ab683211c60f3f3f8b22caca44aee28adbc0882c526a76cdf91a1fafd9939a05879c198998811721543553632ebd9a1044ed0c30f1ea8d4dfafda117c65e16ad25f, PacketNumber: 2, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:31 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:31 Adding connection ID a5828a50. 2025/04/30 11:59:31 Adding connection ID bfb96227. 2025/04/30 11:59:31 Adding connection ID eb516d79. 2025/04/30 11:59:31 Adding connection ID 770ff814. 2025/04/30 11:59:31 Adding connection ID 76dbab61. 2025/04/30 11:59:31 server coalesced packet has different destination connection ID: 00000000, expected 30866000 2025/04/30 11:59:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 10bfc6f7bc92aa1b5a 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30866000, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 932, Version: v1} 2025/04/30 11:59:31 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 30866000, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 770ff814, StatelessResetToken: 0x838bb1924a44e1627dcccfdd48768568} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bfb96227, StatelessResetToken: 0xd1f833e149ac146e910c5499e6cee064} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a5828a50, StatelessResetToken: 0x0d9f515291b00069bfa84a70d3ee6d6d} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 76dbab61, StatelessResetToken: 0xb1d28d0e874cac5ca61b4b689208ff9c} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eb516d79, StatelessResetToken: 0xfa8074541350972a0111e962584de059} 2025/04/30 11:59:31 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:31 server -> Sending packet 2 (1280 bytes) for connection 10bfc6f7bc92aa1b5a, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30866000, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:31 server -> Sending packet 3 (1280 bytes) for connection 10bfc6f7bc92aa1b5a, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 30866000, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:31 Removing connection IDs [972f84e0 cf66bd11 7b93eb01 4021bff0 6bf3ccb1 94ffa6d0] for a closed connection after it has been retired. 2025/04/30 11:59:31 server Parsed a coalesced packet. Part 1: 126 bytes. Remaining: 1126 bytes. 2025/04/30 11:59:31 server <- Reading packet 3 (126 bytes) for connection 30866000, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: 30866000, SrcConnectionID: (empty), Token: 0x77c7631d443597f1933f5c363cad3b713cc3de899ab683211c60f3f3f8b22caca44aee28adbc0882c526a76cdf91a1fafd9939a05879c198998811721543553632ebd9a1044ed0c30f1ea8d4dfafda117c65e16ad25f, PacketNumber: 3, PacketNumberLen: 1, Length: 25, Version: v1} 2025/04/30 11:59:31 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 560µs} 2025/04/30 11:59:31 server coalesced packet has different destination connection ID: 00000000, expected 30866000 2025/04/30 11:59:31 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:31 server -> Sending packet 1 (195 bytes) for connection 10bfc6f7bc92aa1b5a, Handshake 2025/04/30 11:59:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 30866000, PacketNumber: 1, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:31 server -> Sending packet 2 (195 bytes) for connection 10bfc6f7bc92aa1b5a, Handshake 2025/04/30 11:59:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 30866000, PacketNumber: 2, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:31 server <- Reading packet 0 (75 bytes) for connection 30866000, Handshake 2025/04/30 11:59:31 server Long Header{Type: Handshake, DestConnectionID: 30866000, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:31 server Dropping Initial keys. 2025/04/30 11:59:31 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 520µs} 2025/04/30 11:59:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:31 Retiring connection ID 10bfc6f7bc92aa1b5a in 5s. 2025/04/30 11:59:31 server Dropping Handshake keys. 2025/04/30 11:59:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:31 server -> Sending packet 2 (371 bytes) for connection 10bfc6f7bc92aa1b5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eb516d79, StatelessResetToken: 0xfa8074541350972a0111e962584de059} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bfb96227, StatelessResetToken: 0xd1f833e149ac146e910c5499e6cee064} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a5828a50, StatelessResetToken: 0x0d9f515291b00069bfa84a70d3ee6d6d} 2025/04/30 11:59:31 server -> &wire.NewTokenFrame{Token: 0x8ec2d91904a8f60d075c3678258a0b28403f89d266a84376da81330bedb1c4d3e40d50ef16bb403cd34f0396d96a2a8d3a3b6cbaa3af4a32e68a9a017658711ec130a2d7d4d429a76f01a03df71ee5a0c921e62cab80} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 770ff814, StatelessResetToken: 0x838bb1924a44e1627dcccfdd48768568} 2025/04/30 11:59:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 76dbab61, StatelessResetToken: 0xb1d28d0e874cac5ca61b4b689208ff9c} 2025/04/30 11:59:31 server -> Sending packet 3 (371 bytes) for connection 10bfc6f7bc92aa1b5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 76dbab61, StatelessResetToken: 0xb1d28d0e874cac5ca61b4b689208ff9c} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 770ff814, StatelessResetToken: 0x838bb1924a44e1627dcccfdd48768568} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bfb96227, StatelessResetToken: 0xd1f833e149ac146e910c5499e6cee064} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:31 server -> &wire.NewTokenFrame{Token: 0x8ec2d91904a8f60d075c3678258a0b28403f89d266a84376da81330bedb1c4d3e40d50ef16bb403cd34f0396d96a2a8d3a3b6cbaa3af4a32e68a9a017658711ec130a2d7d4d429a76f01a03df71ee5a0c921e62cab80} 2025/04/30 11:59:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a5828a50, StatelessResetToken: 0x0d9f515291b00069bfa84a70d3ee6d6d} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eb516d79, StatelessResetToken: 0xfa8074541350972a0111e962584de059} 2025/04/30 11:59:31 server <- Reading packet 1 (1352 bytes) for connection 30866000, 1-RTT 2025/04/30 11:59:31 server Short Header{DestConnectionID: 30866000, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:31 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 312µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server <- &wire.PingFrame{} 2025/04/30 11:59:31 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:31 server -> Sending packet 4 (27 bytes) for connection 10bfc6f7bc92aa1b5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 120.986µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server <- Reading packet 2 (1392 bytes) for connection 30866000, 1-RTT 2025/04/30 11:59:31 server Short Header{DestConnectionID: 30866000, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:31 server <- &wire.PingFrame{} 2025/04/30 11:59:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:31 server <- Reading packet 3 (31 bytes) for connection 30866000, 1-RTT 2025/04/30 11:59:31 server Short Header{DestConnectionID: 30866000, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:31 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 20.368ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server newly acked packets (1): [3] 2025/04/30 11:59:31 server updated RTT: 52.036626ms (σ: 26.018313ms) 2025/04/30 11:59:31 server ECN capability confirmed. 2025/04/30 11:59:31 server Canceling loss detection timer. 2025/04/30 11:59:31 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:31 server -> Sending packet 5 (28 bytes) for connection 10bfc6f7bc92aa1b5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 7.151919ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server <- Reading packet 4 (42 bytes) for connection 30866000, 1-RTT 2025/04/30 11:59:31 server Short Header{DestConnectionID: 30866000, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:31 Received request: GET /ujmsbnzmfq 2025/04/30 11:59:31 server -> Sending packet 6 (1053 bytes) for connection 10bfc6f7bc92aa1b5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 241.953µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:31 server <- Reading packet 5 (1444 bytes) for connection 30866000, 1-RTT 2025/04/30 11:59:31 server Short Header{DestConnectionID: 30866000, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:31 server <- &wire.PingFrame{} 2025/04/30 11:59:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:31 server <- Reading packet 6 (30 bytes) for connection 30866000, 1-RTT 2025/04/30 11:59:31 server Short Header{DestConnectionID: 30866000, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:31 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 64µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server newly acked packets (1): [6] 2025/04/30 11:59:31 server updated RTT: 49.473ms (σ: 24.639ms) 2025/04/30 11:59:31 server Canceling loss detection timer. 2025/04/30 11:59:31 server Ignoring all packets below 5. 2025/04/30 11:59:31 server -> Sending packet 7 (30 bytes) for connection 10bfc6f7bc92aa1b5a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 152.867µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:31 server <- Reading packet 7 (41 bytes) for connection 30866000, 1-RTT 2025/04/30 11:59:31 server Short Header{DestConnectionID: 30866000, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:31 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, DelayTime: 232µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:31 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:31 Replacing connection for connection IDs [a5828a50 bfb96227 eb516d79 770ff814 76dbab61 30866000] with a closed connection. 2025/04/30 11:59:31 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:31 server Connection 10bfc6f7bc92aa1b5a closed. 2025/04/30 11:59:31 server <- Received Initial packet. 2025/04/30 11:59:31 Created qlog file: /logs/qlog/af46396a8e9edd79.sqlog 2025/04/30 11:59:31 server Changing connection ID to 899dbb56. 2025/04/30 11:59:31 Adding connection IDs af46396a8e9edd79 and 899dbb56 for a new connection. 2025/04/30 11:59:31 server <- Reading packet 0 (1252 bytes) for connection af46396a8e9edd79, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: af46396a8e9edd79, SrcConnectionID: (empty), Token: 0x8ec2d91904a8f60d075c3678258a0b28403f89d266a84376da81330bedb1c4d3e40d50ef16bb403cd34f0396d96a2a8d3a3b6cbaa3af4a32e68a9a017658711ec130a2d7d4d429a76f01a03df71ee5a0c921e62cab80, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:31 server -> Sending packet 0 (40 bytes) for connection af46396a8e9edd79, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 899dbb56, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:31 server <- Reading packet 2 (704 bytes) for connection 899dbb56, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: 899dbb56, SrcConnectionID: (empty), Token: 0x8ec2d91904a8f60d075c3678258a0b28403f89d266a84376da81330bedb1c4d3e40d50ef16bb403cd34f0396d96a2a8d3a3b6cbaa3af4a32e68a9a017658711ec130a2d7d4d429a76f01a03df71ee5a0c921e62cab80, PacketNumber: 2, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:31 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:31 Adding connection ID 92ba601e. 2025/04/30 11:59:31 Adding connection ID 5f0d0d49. 2025/04/30 11:59:31 Adding connection ID 431b72f4. 2025/04/30 11:59:31 Adding connection ID a53ab735. 2025/04/30 11:59:31 Adding connection ID 4f6012a7. 2025/04/30 11:59:31 server coalesced packet has different destination connection ID: 00000000, expected 899dbb56 2025/04/30 11:59:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection af46396a8e9edd79 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 899dbb56, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 930, Version: v1} 2025/04/30 11:59:31 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 899dbb56, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:31 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 431b72f4, StatelessResetToken: 0x901651770ba92345d0879a171e6912e2} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f0d0d49, StatelessResetToken: 0xf2ea46bd2d95cd71abaa5c40f8f56aa6} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a53ab735, StatelessResetToken: 0xedaefdd760073a61a686dbcb2e181785} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4f6012a7, StatelessResetToken: 0x5b5ab56eabb93bed3006e30f2ae68fe5} 2025/04/30 11:59:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92ba601e, StatelessResetToken: 0xc2314ba57b18ab4e5593006ebe7d00aa} 2025/04/30 11:59:31 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:59:31 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:31 server -> Sending packet 2 (1280 bytes) for connection af46396a8e9edd79, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 899dbb56, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:31 server -> Sending packet 3 (1280 bytes) for connection af46396a8e9edd79, Initial 2025/04/30 11:59:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 899dbb56, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:31 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:31 server -> Sending packet 1 (197 bytes) for connection af46396a8e9edd79, Handshake 2025/04/30 11:59:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 899dbb56, PacketNumber: 1, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:31 server -> Sending packet 2 (197 bytes) for connection af46396a8e9edd79, Handshake 2025/04/30 11:59:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 899dbb56, PacketNumber: 2, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:59:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:59:31 Removing connection ID b4589eaaec8eee89 after it has been retired. 2025/04/30 11:59:31 Removing connection IDs [8634ce9a c512d723 d5b90bb2 b15ce7c5 e52f3a97 45fffa2b] for a closed connection after it has been retired. 2025/04/30 11:59:32 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:59:32 server -> Sending packet 4 (1280 bytes) for connection af46396a8e9edd79, Initial 2025/04/30 11:59:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 899dbb56, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:32 server -> Sending packet 5 (1280 bytes) for connection af46396a8e9edd79, Initial 2025/04/30 11:59:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 899dbb56, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:32 server Parsed a coalesced packet. Part 1: 77 bytes. Remaining: 42 bytes. 2025/04/30 11:59:32 server <- Reading packet 2 (77 bytes) for connection 899dbb56, Handshake 2025/04/30 11:59:32 server Long Header{Type: Handshake, DestConnectionID: 899dbb56, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 11:59:32 server Dropping Initial keys. 2025/04/30 11:59:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 250.944ms} 2025/04/30 11:59:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:32 Retiring connection ID af46396a8e9edd79 in 5s. 2025/04/30 11:59:32 server Dropping Handshake keys. 2025/04/30 11:59:32 server <- Reading packet 3 (42 bytes) for connection 899dbb56, 1-RTT 2025/04/30 11:59:32 server Short Header{DestConnectionID: 899dbb56, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:32 server -> Sending packet 2 (379 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 311.182µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 431b72f4, StatelessResetToken: 0x901651770ba92345d0879a171e6912e2} 2025/04/30 11:59:32 server -> &wire.NewTokenFrame{Token: 0xd41f8226f7c9fcc6058ce64a8ebd21ece331f715bc57a2049edcf243c8efad87f6bedf27c76de35102f715659faf1bb21b0d0f0d657371f6b5b60e38854d25fa1d6f85f78f27f2785f499a76c449f2a8bef63d688d08} 2025/04/30 11:59:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a53ab735, StatelessResetToken: 0xedaefdd760073a61a686dbcb2e181785} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f0d0d49, StatelessResetToken: 0xf2ea46bd2d95cd71abaa5c40f8f56aa6} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4f6012a7, StatelessResetToken: 0x5b5ab56eabb93bed3006e30f2ae68fe5} 2025/04/30 11:59:32 Received request: GET /vbrkvradjf 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92ba601e, StatelessResetToken: 0xc2314ba57b18ab4e5593006ebe7d00aa} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:32 server -> Sending packet 3 (1280 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4f6012a7, StatelessResetToken: 0x5b5ab56eabb93bed3006e30f2ae68fe5} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f0d0d49, StatelessResetToken: 0xf2ea46bd2d95cd71abaa5c40f8f56aa6} 2025/04/30 11:59:32 server -> &wire.NewTokenFrame{Token: 0xd41f8226f7c9fcc6058ce64a8ebd21ece331f715bc57a2049edcf243c8efad87f6bedf27c76de35102f715659faf1bb21b0d0f0d657371f6b5b60e38854d25fa1d6f85f78f27f2785f499a76c449f2a8bef63d688d08} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a53ab735, StatelessResetToken: 0xedaefdd760073a61a686dbcb2e181785} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92ba601e, StatelessResetToken: 0xc2314ba57b18ab4e5593006ebe7d00aa} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 431b72f4, StatelessResetToken: 0x901651770ba92345d0879a171e6912e2} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:32 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:59:32 server -> Sending packet 4 (140 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:32 server <- Reading packet 0 (42 bytes) for connection 899dbb56, 1-RTT 2025/04/30 11:59:32 server Short Header{DestConnectionID: 899dbb56, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:32 server Queueing ACK because packet 0 was missing before. 2025/04/30 11:59:32 server -> Sending packet 5 (30 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 616.783µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server <- Reading packet 4 (32 bytes) for connection 899dbb56, 1-RTT 2025/04/30 11:59:32 server Short Header{DestConnectionID: 899dbb56, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:32 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 136µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server newly acked packets (1): [4] 2025/04/30 11:59:32 server updated RTT: 32.722952ms (σ: 16.361476ms) 2025/04/30 11:59:32 server ECN capability confirmed. 2025/04/30 11:59:32 server setting loss timer for packet 3 (1-RTT) to 36.813321ms (in 2025-04-30 11:59:32.173349687 +0000 UTC m=+22.941213812) 2025/04/30 11:59:32 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:59:32.173349687 +0000 UTC m=+22.941213812 2025/04/30 11:59:32 server lost packet 3 (time threshold) 2025/04/30 11:59:32 server Canceling loss detection timer. 2025/04/30 11:59:32 server -> Sending packet 6 (1280 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92ba601e, StatelessResetToken: 0xc2314ba57b18ab4e5593006ebe7d00aa} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a53ab735, StatelessResetToken: 0xedaefdd760073a61a686dbcb2e181785} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f0d0d49, StatelessResetToken: 0xf2ea46bd2d95cd71abaa5c40f8f56aa6} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 431b72f4, StatelessResetToken: 0x901651770ba92345d0879a171e6912e2} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4f6012a7, StatelessResetToken: 0x5b5ab56eabb93bed3006e30f2ae68fe5} 2025/04/30 11:59:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:32 server -> &wire.NewTokenFrame{Token: 0xd41f8226f7c9fcc6058ce64a8ebd21ece331f715bc57a2049edcf243c8efad87f6bedf27c76de35102f715659faf1bb21b0d0f0d657371f6b5b60e38854d25fa1d6f85f78f27f2785f499a76c449f2a8bef63d688d08} 2025/04/30 11:59:32 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:59:32 server <- Reading packet 5 (1352 bytes) for connection 899dbb56, 1-RTT 2025/04/30 11:59:32 server Short Header{DestConnectionID: 899dbb56, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:32 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 320µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server newly acked packets (1): [6] 2025/04/30 11:59:32 server updated RTT: 32.758ms (σ: 12.343ms) 2025/04/30 11:59:32 server Canceling loss detection timer. 2025/04/30 11:59:32 server <- &wire.PingFrame{} 2025/04/30 11:59:32 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:32 server -> Sending packet 7 (32 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 154.96µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:32 server -> Sending packet 9 (22 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:32 server -> Sending packet 10 (22 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:32 server -> Sending packet 11 (1366 bytes) for connection af46396a8e9edd79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.PingFrame{} 2025/04/30 11:59:32 server <- Reading packet 7 (46 bytes) for connection 899dbb56, 1-RTT 2025/04/30 11:59:32 server Short Header{DestConnectionID: 899dbb56, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:32 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 135.152ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:32 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:32 Replacing connection for connection IDs [92ba601e 5f0d0d49 431b72f4 a53ab735 4f6012a7 899dbb56] with a closed connection. 2025/04/30 11:59:32 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:32 server Connection af46396a8e9edd79 closed. 2025/04/30 11:59:32 server <- Received Initial packet. 2025/04/30 11:59:32 Created qlog file: /logs/qlog/054012f97220eb89562d8afd8e40fe565e865164.sqlog 2025/04/30 11:59:32 server Changing connection ID to 88c31b8b. 2025/04/30 11:59:32 Adding connection IDs 054012f97220eb89562d8afd8e40fe565e865164 and 88c31b8b for a new connection. 2025/04/30 11:59:32 server Parsed a coalesced packet. Part 1: 732 bytes. Remaining: 520 bytes. 2025/04/30 11:59:32 server <- Reading packet 1 (732 bytes) for connection 054012f97220eb89562d8afd8e40fe565e865164, Initial 2025/04/30 11:59:32 server Long Header{Type: Initial, DestConnectionID: 054012f97220eb89562d8afd8e40fe565e865164, SrcConnectionID: (empty), Token: 0xd41f8226f7c9fcc6058ce64a8ebd21ece331f715bc57a2049edcf243c8efad87f6bedf27c76de35102f715659faf1bb21b0d0f0d657371f6b5b60e38854d25fa1d6f85f78f27f2785f499a76c449f2a8bef63d688d08, PacketNumber: 1, PacketNumberLen: 1, Length: 615, Version: v1} 2025/04/30 11:59:32 server <- &wire.CryptoFrame{Offset: 1114, Data length: 593, Offset + Data length: 1707} 2025/04/30 11:59:32 server coalesced packet has different destination connection ID: 00000000, expected 054012f97220eb89562d8afd8e40fe565e865164 2025/04/30 11:59:32 server -> Sending packet 0 (40 bytes) for connection 054012f97220eb89562d8afd8e40fe565e865164, Initial 2025/04/30 11:59:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 88c31b8b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:32 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server Parsed a coalesced packet. Part 1: 1236 bytes. Remaining: 16 bytes. 2025/04/30 11:59:32 server <- Reading packet 2 (1236 bytes) for connection 88c31b8b, Initial 2025/04/30 11:59:32 server Long Header{Type: Initial, DestConnectionID: 88c31b8b, SrcConnectionID: (empty), Token: 0xd41f8226f7c9fcc6058ce64a8ebd21ece331f715bc57a2049edcf243c8efad87f6bedf27c76de35102f715659faf1bb21b0d0f0d657371f6b5b60e38854d25fa1d6f85f78f27f2785f499a76c449f2a8bef63d688d08, PacketNumber: 2, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 11:59:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 1114, Offset + Data length: 1114} 2025/04/30 11:59:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:32 Adding connection ID 5ccdc3a7. 2025/04/30 11:59:32 Adding connection ID 8e0d590e. 2025/04/30 11:59:32 Adding connection ID 2ea5ef2e. 2025/04/30 11:59:32 Adding connection ID b1ad8967. 2025/04/30 11:59:32 Adding connection ID 9d0236c7. 2025/04/30 11:59:32 server coalesced packet has different destination connection ID: 00000000, expected 88c31b8b 2025/04/30 11:59:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 054012f97220eb89562d8afd8e40fe565e865164 2025/04/30 11:59:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 88c31b8b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 923, Version: v1} 2025/04/30 11:59:32 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:32 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 88c31b8b, PacketNumber: 0, PacketNumberLen: 2, Length: 191, Version: v1} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 169, Offset + Data length: 169} 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ccdc3a7, StatelessResetToken: 0xdba7507b2143564cea6ef40dfc92d557} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b1ad8967, StatelessResetToken: 0x8455cab5ca4eea78ddc0fdb052954924} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2ea5ef2e, StatelessResetToken: 0x176800c77fe50e9f0e03cc4b4d01e457} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e0d590e, StatelessResetToken: 0x6a555a4e166bb3b1a669c90620ee8a1d} 2025/04/30 11:59:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9d0236c7, StatelessResetToken: 0x3a6adcb6620af862c5383358b28a0bf4} 2025/04/30 11:59:32 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:32 server <- Reading packet 3 (124 bytes) for connection 88c31b8b, Initial 2025/04/30 11:59:32 server Long Header{Type: Initial, DestConnectionID: 88c31b8b, SrcConnectionID: (empty), Token: 0xd41f8226f7c9fcc6058ce64a8ebd21ece331f715bc57a2049edcf243c8efad87f6bedf27c76de35102f715659faf1bb21b0d0f0d657371f6b5b60e38854d25fa1d6f85f78f27f2785f499a76c449f2a8bef63d688d08, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:32 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 832µs} 2025/04/30 11:59:32 server newly acked packets (1): [1] 2025/04/30 11:59:32 server updated RTT: 32.867177ms (σ: 16.433588ms) 2025/04/30 11:59:32 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:32 server <- Reading packet 0 (75 bytes) for connection 88c31b8b, Handshake 2025/04/30 11:59:32 server Long Header{Type: Handshake, DestConnectionID: 88c31b8b, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:32 server Dropping Initial keys. 2025/04/30 11:59:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 832µs} 2025/04/30 11:59:32 server newly acked packets (1): [0] 2025/04/30 11:59:32 server updated RTT: 32.867ms (σ: 12.324ms) 2025/04/30 11:59:32 server Canceling loss detection timer. 2025/04/30 11:59:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:32 Retiring connection ID 054012f97220eb89562d8afd8e40fe565e865164 in 5s. 2025/04/30 11:59:32 server Dropping Handshake keys. 2025/04/30 11:59:32 server <- Reading packet 0 (42 bytes) for connection 88c31b8b, 1-RTT 2025/04/30 11:59:32 server Short Header{DestConnectionID: 88c31b8b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:32 server -> Sending packet 1 (259 bytes) for connection 054012f97220eb89562d8afd8e40fe565e865164, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 370.694µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:32 Received request: GET /aajhafuuzx 2025/04/30 11:59:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:32 server -> &wire.NewTokenFrame{Token: 0xe3fea33d94a02f9eb22ae57d1897d032594483171d4dc9df0271e84f431e305ed2cabc6a8e98ac06d500b71da86f1735c87955c76265a98f81a7a2ad797dcd4e5a3744811573d1aebf74e01b93c2686ec095ec3cca25} 2025/04/30 11:59:32 server -> Sending packet 2 (1045 bytes) for connection 054012f97220eb89562d8afd8e40fe565e865164, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:32 Removing connection ID d3c16ebb5b815c79 after it has been retired. 2025/04/30 11:59:32 server <- Reading packet 1 (28 bytes) for connection 88c31b8b, 1-RTT 2025/04/30 11:59:32 server Short Header{DestConnectionID: 88c31b8b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.288ms} 2025/04/30 11:59:32 server newly acked packets (1): [0] 2025/04/30 11:59:32 server updated RTT: 35.265ms (σ: 14.04ms) 2025/04/30 11:59:32 Removing connection IDs [12704263 29a49df8 094e8e84 7d11cc74 27d0d069 37d9bfad] for a closed connection after it has been retired. 2025/04/30 11:59:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:32 server -> Sending packet 4 (251 bytes) for connection 054012f97220eb89562d8afd8e40fe565e865164, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:32 server -> &wire.NewTokenFrame{Token: 0xe3fea33d94a02f9eb22ae57d1897d032594483171d4dc9df0271e84f431e305ed2cabc6a8e98ac06d500b71da86f1735c87955c76265a98f81a7a2ad797dcd4e5a3744811573d1aebf74e01b93c2686ec095ec3cca25} 2025/04/30 11:59:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:32 server Skipping packet number 3 2025/04/30 11:59:32 server -> Sending packet 5 (1045 bytes) for connection 054012f97220eb89562d8afd8e40fe565e865164, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:32 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:32 server <- Reading packet 4 (43 bytes) for connection 88c31b8b, 1-RTT 2025/04/30 11:59:32 server Short Header{DestConnectionID: 88c31b8b, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:32 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 160µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:32 server newly acked packets (2): [4 5] 2025/04/30 11:59:32 server updated RTT: 34.913ms (σ: 11.232ms) 2025/04/30 11:59:32 server ECN capability confirmed. 2025/04/30 11:59:32 server Canceling loss detection timer. 2025/04/30 11:59:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:32 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:32 Replacing connection for connection IDs [2ea5ef2e b1ad8967 9d0236c7 88c31b8b 5ccdc3a7 8e0d590e] with a closed connection. 2025/04/30 11:59:32 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:32 server Connection 054012f97220eb89562d8afd8e40fe565e865164 closed. 2025/04/30 11:59:33 Removing connection ID ddd5dc8fb8214a02 after it has been retired. 2025/04/30 11:59:33 server <- Received Initial packet. 2025/04/30 11:59:33 Created qlog file: /logs/qlog/fa3931bc6d597a48.sqlog 2025/04/30 11:59:33 server Changing connection ID to adf6632a. 2025/04/30 11:59:33 Adding connection IDs fa3931bc6d597a48 and adf6632a for a new connection. 2025/04/30 11:59:33 server <- Reading packet 2 (1252 bytes) for connection fa3931bc6d597a48, Initial 2025/04/30 11:59:33 server Long Header{Type: Initial, DestConnectionID: fa3931bc6d597a48, SrcConnectionID: (empty), Token: 0xe3fea33d94a02f9eb22ae57d1897d032594483171d4dc9df0271e84f431e305ed2cabc6a8e98ac06d500b71da86f1735c87955c76265a98f81a7a2ad797dcd4e5a3744811573d1aebf74e01b93c2686ec095ec3cca25, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:33 server -> Sending packet 0 (40 bytes) for connection fa3931bc6d597a48, Initial 2025/04/30 11:59:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: adf6632a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:33 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:33 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:33 server <- Reading packet 3 (708 bytes) for connection fa3931bc6d597a48, Initial 2025/04/30 11:59:33 server Long Header{Type: Initial, DestConnectionID: fa3931bc6d597a48, SrcConnectionID: (empty), Token: 0xe3fea33d94a02f9eb22ae57d1897d032594483171d4dc9df0271e84f431e305ed2cabc6a8e98ac06d500b71da86f1735c87955c76265a98f81a7a2ad797dcd4e5a3744811573d1aebf74e01b93c2686ec095ec3cca25, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:33 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:33 Adding connection ID 3da8d889. 2025/04/30 11:59:33 Adding connection ID b93b36ce. 2025/04/30 11:59:33 Adding connection ID fb5620ca. 2025/04/30 11:59:33 Adding connection ID 412b6089. 2025/04/30 11:59:33 Adding connection ID 2879b4db. 2025/04/30 11:59:33 server coalesced packet has different destination connection ID: 00000000, expected fa3931bc6d597a48 2025/04/30 11:59:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fa3931bc6d597a48 2025/04/30 11:59:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: adf6632a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 937, Version: v1} 2025/04/30 11:59:33 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adf6632a, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:33 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3da8d889, StatelessResetToken: 0x149d4edd9d3b55226f4d90a0e10bd09f} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 412b6089, StatelessResetToken: 0xa76624b06bebe5647538799a5d91fe03} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fb5620ca, StatelessResetToken: 0x2017ec90608e90c092cbcc475e628473} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2879b4db, StatelessResetToken: 0x057e56f66e61d891760374a27c80fb83} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b93b36ce, StatelessResetToken: 0x80d7eb0f721389aa669c498ca95e6cc2} 2025/04/30 11:59:33 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:33 server -> Sending packet 2 (1280 bytes) for connection fa3931bc6d597a48, Initial 2025/04/30 11:59:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: adf6632a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:33 server -> Sending packet 3 (1280 bytes) for connection fa3931bc6d597a48, Initial 2025/04/30 11:59:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: adf6632a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:33 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:33 server -> Sending packet 1 (190 bytes) for connection fa3931bc6d597a48, Handshake 2025/04/30 11:59:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adf6632a, PacketNumber: 1, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:33 server -> Sending packet 2 (190 bytes) for connection fa3931bc6d597a48, Handshake 2025/04/30 11:59:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adf6632a, PacketNumber: 2, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:33 server Parsed a coalesced packet. Part 1: 123 bytes. Remaining: 1129 bytes. 2025/04/30 11:59:33 server <- Reading packet 4 (123 bytes) for connection adf6632a, Initial 2025/04/30 11:59:33 server Long Header{Type: Initial, DestConnectionID: adf6632a, SrcConnectionID: (empty), Token: 0xe3fea33d94a02f9eb22ae57d1897d032594483171d4dc9df0271e84f431e305ed2cabc6a8e98ac06d500b71da86f1735c87955c76265a98f81a7a2ad797dcd4e5a3744811573d1aebf74e01b93c2686ec095ec3cca25, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:59:33 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 440µs} 2025/04/30 11:59:33 server newly acked packets (1): [3] 2025/04/30 11:59:33 server updated RTT: 34.631679ms (σ: 17.315839ms) 2025/04/30 11:59:33 server coalesced packet has different destination connection ID: 00000000, expected adf6632a 2025/04/30 11:59:33 Tracking 68 connection IDs and 0 reset tokens. 2025/04/30 11:59:33 Removing connection IDs [dd71e113 6955f0fb a3b3c8d2 37ae5862 14a74e39 faf9267e] for a closed connection after it has been retired. 2025/04/30 11:59:33 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:59:33 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:59:33 server -> Sending packet 3 (190 bytes) for connection fa3931bc6d597a48, Handshake 2025/04/30 11:59:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adf6632a, PacketNumber: 3, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:33 server -> Sending packet 4 (190 bytes) for connection fa3931bc6d597a48, Handshake 2025/04/30 11:59:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: adf6632a, PacketNumber: 4, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:33 server <- Reading packet 1 (76 bytes) for connection adf6632a, Handshake 2025/04/30 11:59:33 server Long Header{Type: Handshake, DestConnectionID: adf6632a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 11:59:33 server Dropping Initial keys. 2025/04/30 11:59:33 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 112µs} 2025/04/30 11:59:33 server newly acked packets (1): [4] 2025/04/30 11:59:33 server updated RTT: 34.243ms (σ: 13.761ms) 2025/04/30 11:59:33 server Canceling loss detection timer. 2025/04/30 11:59:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:33 Retiring connection ID fa3931bc6d597a48 in 5s. 2025/04/30 11:59:33 server Dropping Handshake keys. 2025/04/30 11:59:33 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:33 server -> Sending packet 2 (371 bytes) for connection fa3931bc6d597a48, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:33 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b93b36ce, StatelessResetToken: 0x80d7eb0f721389aa669c498ca95e6cc2} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 412b6089, StatelessResetToken: 0xa76624b06bebe5647538799a5d91fe03} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fb5620ca, StatelessResetToken: 0x2017ec90608e90c092cbcc475e628473} 2025/04/30 11:59:33 server -> &wire.NewTokenFrame{Token: 0xa4b97ec46611847a15c7c1bfa21bb89a7a9885af597bd93cd33fb15de566112ea899e3cd009099348c2f4c1acc347eaab222f33d18eee7b557ee4e8fcb49b0bcc33dd589ca5459881db1a108e6835da75ec21e056a1b} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3da8d889, StatelessResetToken: 0x149d4edd9d3b55226f4d90a0e10bd09f} 2025/04/30 11:59:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2879b4db, StatelessResetToken: 0x057e56f66e61d891760374a27c80fb83} 2025/04/30 11:59:33 server -> Sending packet 3 (371 bytes) for connection fa3931bc6d597a48, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:33 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:33 server -> &wire.NewTokenFrame{Token: 0xa4b97ec46611847a15c7c1bfa21bb89a7a9885af597bd93cd33fb15de566112ea899e3cd009099348c2f4c1acc347eaab222f33d18eee7b557ee4e8fcb49b0bcc33dd589ca5459881db1a108e6835da75ec21e056a1b} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3da8d889, StatelessResetToken: 0x149d4edd9d3b55226f4d90a0e10bd09f} 2025/04/30 11:59:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 412b6089, StatelessResetToken: 0xa76624b06bebe5647538799a5d91fe03} 2025/04/30 11:59:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b93b36ce, StatelessResetToken: 0x80d7eb0f721389aa669c498ca95e6cc2} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2879b4db, StatelessResetToken: 0x057e56f66e61d891760374a27c80fb83} 2025/04/30 11:59:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fb5620ca, StatelessResetToken: 0x2017ec90608e90c092cbcc475e628473} 2025/04/30 11:59:33 server <- Reading packet 0 (42 bytes) for connection adf6632a, 1-RTT 2025/04/30 11:59:33 server Short Header{DestConnectionID: adf6632a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:33 server -> Sending packet 4 (28 bytes) for connection fa3931bc6d597a48, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:33 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104.302105ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:33 Received request: GET /hmiycemycl 2025/04/30 11:59:33 server -> Sending packet 5 (1045 bytes) for connection fa3931bc6d597a48, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:33 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:33 server <- Reading packet 3 (30 bytes) for connection adf6632a, 1-RTT 2025/04/30 11:59:33 server Short Header{DestConnectionID: adf6632a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:33 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 48µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:33 server newly acked packets (2): [3 5] 2025/04/30 11:59:33 server updated RTT: 34.129ms (σ: 10.548ms) 2025/04/30 11:59:33 server ECN capability confirmed. 2025/04/30 11:59:33 server Canceling loss detection timer. 2025/04/30 11:59:33 server -> Sending packet 6 (22 bytes) for connection fa3931bc6d597a48, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:33 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:33 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:33 server <- Reading packet 5 (42 bytes) for connection adf6632a, 1-RTT 2025/04/30 11:59:33 server Short Header{DestConnectionID: adf6632a, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:33 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 32.336ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:33 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:33 Replacing connection for connection IDs [adf6632a 3da8d889 b93b36ce fb5620ca 412b6089 2879b4db] with a closed connection. 2025/04/30 11:59:33 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:33 server Connection fa3931bc6d597a48 closed. 2025/04/30 11:59:33 Removing connection ID cb407c08347e5182 after it has been retired. 2025/04/30 11:59:33 Removing connection IDs [c48cc7d1 834e50eb c5c47fca 7de15f20 ef76d055 e50d7fc8] for a closed connection after it has been retired. 2025/04/30 11:59:34 Removing connection ID 7c08ec4b40d23ddb72 after it has been retired. 2025/04/30 11:59:34 Removing connection IDs [ac8bcc9d 64b11f37 a4293ce8 74917723 12306559 61c12827] for a closed connection after it has been retired. 2025/04/30 11:59:35 server <- Received Initial packet. 2025/04/30 11:59:35 Created qlog file: /logs/qlog/e726043ae9f79e3b.sqlog 2025/04/30 11:59:35 server Changing connection ID to 0531019e. 2025/04/30 11:59:35 Adding connection IDs e726043ae9f79e3b and 0531019e for a new connection. 2025/04/30 11:59:35 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:35 server <- Reading packet 1 (708 bytes) for connection e726043ae9f79e3b, Initial 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: e726043ae9f79e3b, SrcConnectionID: (empty), Token: 0xa4b97ec46611847a15c7c1bfa21bb89a7a9885af597bd93cd33fb15de566112ea899e3cd009099348c2f4c1acc347eaab222f33d18eee7b557ee4e8fcb49b0bcc33dd589ca5459881db1a108e6835da75ec21e056a1b, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:35 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:35 server coalesced packet has different destination connection ID: 00000000, expected e726043ae9f79e3b 2025/04/30 11:59:35 server -> Sending packet 0 (40 bytes) for connection e726043ae9f79e3b, Initial 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0531019e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:35 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:35 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:59:35 server <- Reading packet 2 (1248 bytes) for connection 0531019e, Initial 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: 0531019e, SrcConnectionID: (empty), Token: 0xa4b97ec46611847a15c7c1bfa21bb89a7a9885af597bd93cd33fb15de566112ea899e3cd009099348c2f4c1acc347eaab222f33d18eee7b557ee4e8fcb49b0bcc33dd589ca5459881db1a108e6835da75ec21e056a1b, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:35 Adding connection ID 9fb46758. 2025/04/30 11:59:35 Adding connection ID 545e14e7. 2025/04/30 11:59:35 Adding connection ID 3457675a. 2025/04/30 11:59:35 Adding connection ID ccbd7038. 2025/04/30 11:59:35 Adding connection ID b9292de7. 2025/04/30 11:59:35 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:59:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e726043ae9f79e3b 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0531019e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 936, Version: v1} 2025/04/30 11:59:35 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0531019e, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9fb46758, StatelessResetToken: 0xd0eb6d880513a70a67107c27913221d9} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 545e14e7, StatelessResetToken: 0x99c0956ae28a157e7e881977f93dd0ac} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9292de7, StatelessResetToken: 0x624ff77860678d3c2cbc8c37f3fcc4fe} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3457675a, StatelessResetToken: 0x5d66c4714052416da3733b8e2134c0e8} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ccbd7038, StatelessResetToken: 0x39f16c0709424ab2843a52a2abf392eb} 2025/04/30 11:59:35 Tracking 55 connection IDs and 0 reset tokens. 2025/04/30 11:59:35 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:35 server <- Reading packet 3 (124 bytes) for connection 0531019e, Initial 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: 0531019e, SrcConnectionID: (empty), Token: 0xa4b97ec46611847a15c7c1bfa21bb89a7a9885af597bd93cd33fb15de566112ea899e3cd009099348c2f4c1acc347eaab222f33d18eee7b557ee4e8fcb49b0bcc33dd589ca5459881db1a108e6835da75ec21e056a1b, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 944µs} 2025/04/30 11:59:35 server newly acked packets (1): [1] 2025/04/30 11:59:35 server updated RTT: 32.944164ms (σ: 16.472082ms) 2025/04/30 11:59:35 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:35 server <- Reading packet 0 (75 bytes) for connection 0531019e, Handshake 2025/04/30 11:59:35 server Long Header{Type: Handshake, DestConnectionID: 0531019e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:35 server Dropping Initial keys. 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 944µs} 2025/04/30 11:59:35 server newly acked packets (1): [0] 2025/04/30 11:59:35 server updated RTT: 32.944ms (σ: 12.354ms) 2025/04/30 11:59:35 server Canceling loss detection timer. 2025/04/30 11:59:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:35 Retiring connection ID e726043ae9f79e3b in 5s. 2025/04/30 11:59:35 server Dropping Handshake keys. 2025/04/30 11:59:35 server -> Sending packet 1 (251 bytes) for connection e726043ae9f79e3b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:35 server -> &wire.NewTokenFrame{Token: 0xeb65f54a3a13f0f1fa8013b07701c3f90fc4f33c4886bbfb6b9465e83688c57b12d8ba9f6c5f27d1064642c9b5f4d2c710c4c1a21b0a9e58501af03d223c45379fe01ba34b525d227185c47b0dbf203ab88e0245f073} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:35 server <- Reading packet 0 (42 bytes) for connection 0531019e, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: 0531019e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:35 server -> Sending packet 2 (27 bytes) for connection e726043ae9f79e3b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 209.029µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:35 Received request: GET /sohbcpbpou 2025/04/30 11:59:35 server -> Sending packet 3 (1045 bytes) for connection e726043ae9f79e3b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:35 Removing connection ID c52f7b4773d5899f after it has been retired. 2025/04/30 11:59:35 server <- Reading packet 1 (28 bytes) for connection 0531019e, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: 0531019e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.4ms} 2025/04/30 11:59:35 server newly acked packets (1): [0] 2025/04/30 11:59:35 server updated RTT: 32.974ms (σ: 9.326ms) 2025/04/30 11:59:35 server <- Reading packet 2 (1352 bytes) for connection 0531019e, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: 0531019e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.PingFrame{} 2025/04/30 11:59:35 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:35 server <- Reading packet 3 (30 bytes) for connection 0531019e, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: 0531019e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 32µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:35 server newly acked packets (2): [1 3] 2025/04/30 11:59:35 server updated RTT: 32.863ms (σ: 7.215ms) 2025/04/30 11:59:35 server ECN capability confirmed. 2025/04/30 11:59:35 server Canceling loss detection timer. 2025/04/30 11:59:35 server <- Reading packet 4 (41 bytes) for connection 0531019e, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: 0531019e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 208µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:35 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:35 Replacing connection for connection IDs [545e14e7 3457675a ccbd7038 b9292de7 0531019e 9fb46758] with a closed connection. 2025/04/30 11:59:35 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:35 server Connection e726043ae9f79e3b closed. 2025/04/30 11:59:35 Removing connection IDs [83d9c9cc ff76285c 310f4c9c b9c94b07 fed4376f 9312a2e3] for a closed connection after it has been retired. 2025/04/30 11:59:35 server <- Received Initial packet. 2025/04/30 11:59:35 Created qlog file: /logs/qlog/6b36c436a1ddcaa5.sqlog 2025/04/30 11:59:35 server Changing connection ID to faabbd3f. 2025/04/30 11:59:35 Adding connection IDs 6b36c436a1ddcaa5 and faabbd3f for a new connection. 2025/04/30 11:59:35 server <- Reading packet 0 (1252 bytes) for connection 6b36c436a1ddcaa5, Initial 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: 6b36c436a1ddcaa5, SrcConnectionID: (empty), Token: 0xeb65f54a3a13f0f1fa8013b07701c3f90fc4f33c4886bbfb6b9465e83688c57b12d8ba9f6c5f27d1064642c9b5f4d2c710c4c1a21b0a9e58501af03d223c45379fe01ba34b525d227185c47b0dbf203ab88e0245f073, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:35 server -> Sending packet 0 (40 bytes) for connection 6b36c436a1ddcaa5, Initial 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: faabbd3f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:35 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:35 server <- Reading packet 2 (704 bytes) for connection faabbd3f, Initial 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: faabbd3f, SrcConnectionID: (empty), Token: 0xeb65f54a3a13f0f1fa8013b07701c3f90fc4f33c4886bbfb6b9465e83688c57b12d8ba9f6c5f27d1064642c9b5f4d2c710c4c1a21b0a9e58501af03d223c45379fe01ba34b525d227185c47b0dbf203ab88e0245f073, PacketNumber: 2, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:35 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:35 Adding connection ID 936fb1b0. 2025/04/30 11:59:35 Adding connection ID 6a019523. 2025/04/30 11:59:35 Adding connection ID 276d44d7. 2025/04/30 11:59:35 Adding connection ID 47530712. 2025/04/30 11:59:35 Adding connection ID 24db8f9b. 2025/04/30 11:59:35 server coalesced packet has different destination connection ID: 00000000, expected faabbd3f 2025/04/30 11:59:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6b36c436a1ddcaa5 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: faabbd3f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 937, Version: v1} 2025/04/30 11:59:35 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: faabbd3f, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 936fb1b0, StatelessResetToken: 0x0f1c42c56c191d78a329ee44548e4764} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a019523, StatelessResetToken: 0x8ffe96f9d5d70477d49f8feb2db7f4f7} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 47530712, StatelessResetToken: 0x3be55a329472a960baf8809f362771fc} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 24db8f9b, StatelessResetToken: 0x5665a5d098e560468be85d24fd287295} 2025/04/30 11:59:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 276d44d7, StatelessResetToken: 0x7b5de92be7ea678c464b3f181b0fc3ad} 2025/04/30 11:59:35 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:35 server <- Reading packet 3 (124 bytes) for connection faabbd3f, Initial 2025/04/30 11:59:35 server Long Header{Type: Initial, DestConnectionID: faabbd3f, SrcConnectionID: (empty), Token: 0xeb65f54a3a13f0f1fa8013b07701c3f90fc4f33c4886bbfb6b9465e83688c57b12d8ba9f6c5f27d1064642c9b5f4d2c710c4c1a21b0a9e58501af03d223c45379fe01ba34b525d227185c47b0dbf203ab88e0245f073, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.032ms} 2025/04/30 11:59:35 server newly acked packets (1): [1] 2025/04/30 11:59:35 server updated RTT: 33.081117ms (σ: 16.540558ms) 2025/04/30 11:59:35 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:35 server <- Reading packet 0 (75 bytes) for connection faabbd3f, Handshake 2025/04/30 11:59:35 server Long Header{Type: Handshake, DestConnectionID: faabbd3f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:35 server Dropping Initial keys. 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.032ms} 2025/04/30 11:59:35 server newly acked packets (1): [0] 2025/04/30 11:59:35 server updated RTT: 33.081ms (σ: 12.405ms) 2025/04/30 11:59:35 server Canceling loss detection timer. 2025/04/30 11:59:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:35 Retiring connection ID 6b36c436a1ddcaa5 in 5s. 2025/04/30 11:59:35 server Dropping Handshake keys. 2025/04/30 11:59:35 server -> Sending packet 1 (251 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.NewTokenFrame{Token: 0x33c9c0c5f9d373e4b2acc56bf1c17ba8361766e004d95f8b55c71e4436e9e3d5ed80af51f7d26e361e6dc04d640e377e31d781b32367bd80f257262241ec7f412c4deb1595687c740dbc7a4e3dd1c163d646eabcca6d} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:35 server <- Reading packet 1 (28 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.512ms} 2025/04/30 11:59:35 server newly acked packets (1): [0] 2025/04/30 11:59:35 server updated RTT: 35.498ms (σ: 14.138ms) 2025/04/30 11:59:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:35 server -> Sending packet 3 (251 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:35 server -> &wire.NewTokenFrame{Token: 0x33c9c0c5f9d373e4b2acc56bf1c17ba8361766e004d95f8b55c71e4436e9e3d5ed80af51f7d26e361e6dc04d640e377e31d781b32367bd80f257262241ec7f412c4deb1595687c740dbc7a4e3dd1c163d646eabcca6d} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:35 server -> Sending packet 4 (251 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:35 server -> &wire.NewTokenFrame{Token: 0x33c9c0c5f9d373e4b2acc56bf1c17ba8361766e004d95f8b55c71e4436e9e3d5ed80af51f7d26e361e6dc04d640e377e31d781b32367bd80f257262241ec7f412c4deb1595687c740dbc7a4e3dd1c163d646eabcca6d} 2025/04/30 11:59:35 Removing connection ID c5190be8b8f9b7d9 after it has been retired. 2025/04/30 11:59:35 Removing connection IDs [d2e0e816 add62a00 5828afef c3928b44 e0d24d70 35c84bc7] for a closed connection after it has been retired. 2025/04/30 11:59:35 server <- Reading packet 4 (42 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:35 server <- Reading packet 5 (25 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.PingFrame{} 2025/04/30 11:59:35 Received request: GET /mzjlvgtvyl 2025/04/30 11:59:35 server -> Sending packet 5 (1366 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.PingFrame{} 2025/04/30 11:59:35 server -> Sending packet 6 (29 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 206.197µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:35 server -> Sending packet 7 (1045 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:35 server <- Reading packet 6 (34 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:35 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:35 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:35 server newly acked packets (1): [5] 2025/04/30 11:59:35 server updated RTT: 35.085ms (σ: 11.428ms) 2025/04/30 11:59:35 server ECN capability confirmed. 2025/04/30 11:59:35 server lost packet 4 (time threshold) 2025/04/30 11:59:35 server -> Sending packet 8 (251 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:35 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:35 server -> &wire.NewTokenFrame{Token: 0x33c9c0c5f9d373e4b2acc56bf1c17ba8361766e004d95f8b55c71e4436e9e3d5ed80af51f7d26e361e6dc04d640e377e31d781b32367bd80f257262241ec7f412c4deb1595687c740dbc7a4e3dd1c163d646eabcca6d} 2025/04/30 11:59:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:36 server <- Reading packet 8 (1392 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:36 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:36 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 104µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server newly acked packets (1): [8] 2025/04/30 11:59:36 server updated RTT: 34.737ms (σ: 9.266ms) 2025/04/30 11:59:36 server lost packet 7 (time threshold) 2025/04/30 11:59:36 server Canceling loss detection timer. 2025/04/30 11:59:36 server <- &wire.PingFrame{} 2025/04/30 11:59:36 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:36 server -> Sending packet 9 (1057 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 194.033µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:36 server -> Sending packet 11 (1045 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:36 server -> Sending packet 12 (1045 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:36 server <- Reading packet 9 (25 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:36 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:36 server <- &wire.PingFrame{} 2025/04/30 11:59:36 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:36 server <- Reading packet 10 (25 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:36 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:36 server <- &wire.PingFrame{} 2025/04/30 11:59:36 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:36 server -> Sending packet 13 (31 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 89.869µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server <- Reading packet 11 (36 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:36 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:36 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 3, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 72µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server newly acked packets (1): [12] 2025/04/30 11:59:36 server updated RTT: 34.48ms (σ: 7.462ms) 2025/04/30 11:59:36 server Canceling loss detection timer. 2025/04/30 11:59:36 server -> Sending packet 14 (1409 bytes) for connection 6b36c436a1ddcaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.PingFrame{} 2025/04/30 11:59:36 server <- Reading packet 12 (47 bytes) for connection faabbd3f, 1-RTT 2025/04/30 11:59:36 server Short Header{DestConnectionID: faabbd3f, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:36 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 3, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 360µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:36 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:36 Replacing connection for connection IDs [6a019523 276d44d7 47530712 24db8f9b faabbd3f 936fb1b0] with a closed connection. 2025/04/30 11:59:36 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:36 server Connection 6b36c436a1ddcaa5 closed. 2025/04/30 11:59:36 Removing connection ID 10bfc6f7bc92aa1b5a after it has been retired. 2025/04/30 11:59:36 server <- Received Initial packet. 2025/04/30 11:59:36 Created qlog file: /logs/qlog/13eba1b86235cb1f.sqlog 2025/04/30 11:59:36 server Changing connection ID to 63cf2765. 2025/04/30 11:59:36 Adding connection IDs 13eba1b86235cb1f and 63cf2765 for a new connection. 2025/04/30 11:59:36 server <- Reading packet 0 (1252 bytes) for connection 13eba1b86235cb1f, Initial 2025/04/30 11:59:36 server Long Header{Type: Initial, DestConnectionID: 13eba1b86235cb1f, SrcConnectionID: (empty), Token: 0x33c9c0c5f9d373e4b2acc56bf1c17ba8361766e004d95f8b55c71e4436e9e3d5ed80af51f7d26e361e6dc04d640e377e31d781b32367bd80f257262241ec7f412c4deb1595687c740dbc7a4e3dd1c163d646eabcca6d, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:36 server -> Sending packet 0 (40 bytes) for connection 13eba1b86235cb1f, Initial 2025/04/30 11:59:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63cf2765, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:36 server <- Reading packet 1 (708 bytes) for connection 13eba1b86235cb1f, Initial 2025/04/30 11:59:36 server Long Header{Type: Initial, DestConnectionID: 13eba1b86235cb1f, SrcConnectionID: (empty), Token: 0x33c9c0c5f9d373e4b2acc56bf1c17ba8361766e004d95f8b55c71e4436e9e3d5ed80af51f7d26e361e6dc04d640e377e31d781b32367bd80f257262241ec7f412c4deb1595687c740dbc7a4e3dd1c163d646eabcca6d, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:36 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:36 Adding connection ID 19d0c74c. 2025/04/30 11:59:36 Adding connection ID 45fd2ec8. 2025/04/30 11:59:36 Adding connection ID 609cd74c. 2025/04/30 11:59:36 Adding connection ID 4a06ae03. 2025/04/30 11:59:36 Adding connection ID 4df22547. 2025/04/30 11:59:36 server coalesced packet has different destination connection ID: 00000000, expected 13eba1b86235cb1f 2025/04/30 11:59:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 13eba1b86235cb1f 2025/04/30 11:59:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63cf2765, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 942, Version: v1} 2025/04/30 11:59:36 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 63cf2765, PacketNumber: 0, PacketNumberLen: 2, Length: 172, Version: v1} 2025/04/30 11:59:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 45fd2ec8, StatelessResetToken: 0x8a1bddf055c9e8ecab4166a6fcf8c8f5} 2025/04/30 11:59:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4a06ae03, StatelessResetToken: 0x3cb45887ee6788be988d1188702580fb} 2025/04/30 11:59:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 609cd74c, StatelessResetToken: 0xc61d8c3810e23cf307cd2db67275c3f1} 2025/04/30 11:59:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4df22547, StatelessResetToken: 0x47a68476f3fff8767ab717e804a9af4c} 2025/04/30 11:59:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 19d0c74c, StatelessResetToken: 0x1f5073065d7c54056fd299ea2b7dac4b} 2025/04/30 11:59:36 Removing connection IDs [a5828a50 bfb96227 eb516d79 770ff814 76dbab61 30866000] for a closed connection after it has been retired. 2025/04/30 11:59:36 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:59:36 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:36 server -> Sending packet 2 (1280 bytes) for connection 13eba1b86235cb1f, Initial 2025/04/30 11:59:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63cf2765, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:36 server -> Sending packet 3 (1280 bytes) for connection 13eba1b86235cb1f, Initial 2025/04/30 11:59:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 63cf2765, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:36 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:36 server -> Sending packet 1 (185 bytes) for connection 13eba1b86235cb1f, Handshake 2025/04/30 11:59:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 63cf2765, PacketNumber: 1, PacketNumberLen: 2, Length: 172, Version: v1} 2025/04/30 11:59:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/04/30 11:59:36 server -> Sending packet 2 (185 bytes) for connection 13eba1b86235cb1f, Handshake 2025/04/30 11:59:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 63cf2765, PacketNumber: 2, PacketNumberLen: 2, Length: 172, Version: v1} 2025/04/30 11:59:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/04/30 11:59:36 server <- Reading packet 2 (74 bytes) for connection 63cf2765, Handshake 2025/04/30 11:59:36 server Long Header{Type: Handshake, DestConnectionID: 63cf2765, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:36 server Dropping Initial keys. 2025/04/30 11:59:36 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 16µs} 2025/04/30 11:59:36 server newly acked packets (1): [2] 2025/04/30 11:59:36 server updated RTT: 31.081416ms (σ: 15.540708ms) 2025/04/30 11:59:36 server Canceling loss detection timer. 2025/04/30 11:59:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:36 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:36 Retiring connection ID 13eba1b86235cb1f in 5s. 2025/04/30 11:59:36 server Dropping Handshake keys. 2025/04/30 11:59:36 server -> Sending packet 1 (251 bytes) for connection 13eba1b86235cb1f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:36 server -> &wire.NewTokenFrame{Token: 0x9dd9aa560438b0109b5f265e071a9ca6f4ce33b6352db38511644411c4f7887d42cd89d07a13416815aafbf9a92754adb7ee30f3c1def9fce47dff863c6428c1a8c5bfd75900fbf4c20d816a604f916a80d8d5f71433} 2025/04/30 11:59:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:36 server <- Reading packet 0 (42 bytes) for connection 63cf2765, 1-RTT 2025/04/30 11:59:36 server Short Header{DestConnectionID: 63cf2765, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:36 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:36 server -> Sending packet 2 (28 bytes) for connection 13eba1b86235cb1f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 66.957455ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:36 Received request: GET /bdkdfrdjfw 2025/04/30 11:59:36 server -> Sending packet 3 (1045 bytes) for connection 13eba1b86235cb1f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:36 server <- Reading packet 2 (1352 bytes) for connection 63cf2765, 1-RTT 2025/04/30 11:59:36 server Short Header{DestConnectionID: 63cf2765, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:36 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 184µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server newly acked packets (2): [0 1] 2025/04/30 11:59:36 server updated RTT: 31.187ms (σ: 11.868ms) 2025/04/30 11:59:36 server ECN capability confirmed. 2025/04/30 11:59:36 server <- &wire.PingFrame{} 2025/04/30 11:59:36 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:36 server -> Sending packet 4 (29 bytes) for connection 13eba1b86235cb1f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 105.157µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:36 server -> Sending packet 6 (1045 bytes) for connection 13eba1b86235cb1f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:36 server -> Sending packet 7 (1045 bytes) for connection 13eba1b86235cb1f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:36 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:36 server <- Reading packet 4 (42 bytes) for connection 63cf2765, 1-RTT 2025/04/30 11:59:36 server Short Header{DestConnectionID: 63cf2765, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:36 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 99.208ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:36 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:36 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:36 Replacing connection for connection IDs [4df22547 63cf2765 19d0c74c 45fd2ec8 609cd74c 4a06ae03] with a closed connection. 2025/04/30 11:59:36 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:36 server Connection 13eba1b86235cb1f closed. 2025/04/30 11:59:37 server <- Received Initial packet. 2025/04/30 11:59:37 Created qlog file: /logs/qlog/3593f6f31020d23f.sqlog 2025/04/30 11:59:37 server Changing connection ID to 65169431. 2025/04/30 11:59:37 Adding connection IDs 3593f6f31020d23f and 65169431 for a new connection. 2025/04/30 11:59:37 server <- Reading packet 0 (1252 bytes) for connection 3593f6f31020d23f, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: 3593f6f31020d23f, SrcConnectionID: (empty), Token: 0x9dd9aa560438b0109b5f265e071a9ca6f4ce33b6352db38511644411c4f7887d42cd89d07a13416815aafbf9a92754adb7ee30f3c1def9fce47dff863c6428c1a8c5bfd75900fbf4c20d816a604f916a80d8d5f71433, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:37 server -> Sending packet 0 (40 bytes) for connection 3593f6f31020d23f, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 65169431, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:37 server <- Reading packet 1 (708 bytes) for connection 3593f6f31020d23f, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: 3593f6f31020d23f, SrcConnectionID: (empty), Token: 0x9dd9aa560438b0109b5f265e071a9ca6f4ce33b6352db38511644411c4f7887d42cd89d07a13416815aafbf9a92754adb7ee30f3c1def9fce47dff863c6428c1a8c5bfd75900fbf4c20d816a604f916a80d8d5f71433, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:37 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:37 Adding connection ID 7d809f97. 2025/04/30 11:59:37 Adding connection ID a82366b7. 2025/04/30 11:59:37 Adding connection ID 5ee295f2. 2025/04/30 11:59:37 Adding connection ID 1ef7dc35. 2025/04/30 11:59:37 Adding connection ID 43ee42d1. 2025/04/30 11:59:37 server coalesced packet has different destination connection ID: 00000000, expected 3593f6f31020d23f 2025/04/30 11:59:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3593f6f31020d23f 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 65169431, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 932, Version: v1} 2025/04/30 11:59:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 65169431, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a82366b7, StatelessResetToken: 0xcf6f86037fa3b28ed6aae2295ee6a569} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1ef7dc35, StatelessResetToken: 0xc7b343426ede670d38db5d4bd38e7049} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d809f97, StatelessResetToken: 0x477af13aacb0969ed49e64e6a3c045fe} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 43ee42d1, StatelessResetToken: 0x09ea6f47ea35d4ab6c5b72f7e1e2be29} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5ee295f2, StatelessResetToken: 0x5f6ec21081bab180678468f6794bd64f} 2025/04/30 11:59:37 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:37 server -> Sending packet 2 (1280 bytes) for connection 3593f6f31020d23f, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 65169431, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:37 server -> Sending packet 3 (1280 bytes) for connection 3593f6f31020d23f, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 65169431, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:37 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:59:37 Removing connection ID af46396a8e9edd79 after it has been retired. 2025/04/30 11:59:37 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:59:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:37 server -> Sending packet 1 (195 bytes) for connection 3593f6f31020d23f, Handshake 2025/04/30 11:59:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 65169431, PacketNumber: 1, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:37 server -> Sending packet 2 (195 bytes) for connection 3593f6f31020d23f, Handshake 2025/04/30 11:59:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 65169431, PacketNumber: 2, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:37 server <- Reading packet 2 (74 bytes) for connection 65169431, Handshake 2025/04/30 11:59:37 server Long Header{Type: Handshake, DestConnectionID: 65169431, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:37 server Dropping Initial keys. 2025/04/30 11:59:37 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 48µs} 2025/04/30 11:59:37 server newly acked packets (1): [2] 2025/04/30 11:59:37 server updated RTT: 31.345389ms (σ: 15.672694ms) 2025/04/30 11:59:37 server Canceling loss detection timer. 2025/04/30 11:59:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:37 Retiring connection ID 3593f6f31020d23f in 5s. 2025/04/30 11:59:37 server Dropping Handshake keys. 2025/04/30 11:59:37 server -> Sending packet 1 (251 bytes) for connection 3593f6f31020d23f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:37 server -> &wire.NewTokenFrame{Token: 0x4f0ad42611d6306762a3710b32c3c603bdc6482af3decd285477d5b253262d6249affa0740cabd3fcdfc9c03ee46b4cb3da1fbcaffa22c87213b3fc897b177263ed5c12329a311e87f532c8e72f7e0581cb69f870f44} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:37 server <- Reading packet 0 (42 bytes) for connection 65169431, 1-RTT 2025/04/30 11:59:37 server Short Header{DestConnectionID: 65169431, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:37 server <- Reading packet 1 (28 bytes) for connection 65169431, 1-RTT 2025/04/30 11:59:37 server Short Header{DestConnectionID: 65169431, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.216ms} 2025/04/30 11:59:37 server newly acked packets (1): [0] 2025/04/30 11:59:37 server updated RTT: 31.537ms (σ: 12.139ms) 2025/04/30 11:59:37 server -> Sending packet 2 (28 bytes) for connection 3593f6f31020d23f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 Received request: GET /tssgbveuri 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 44.022069ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server -> Sending packet 3 (1045 bytes) for connection 3593f6f31020d23f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:37 Tracking 54 connection IDs and 0 reset tokens. 2025/04/30 11:59:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:37 server -> Sending packet 5 (251 bytes) for connection 3593f6f31020d23f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:37 server -> &wire.NewTokenFrame{Token: 0x4f0ad42611d6306762a3710b32c3c603bdc6482af3decd285477d5b253262d6249affa0740cabd3fcdfc9c03ee46b4cb3da1fbcaffa22c87213b3fc897b177263ed5c12329a311e87f532c8e72f7e0581cb69f870f44} 2025/04/30 11:59:37 server Skipping packet number 4 2025/04/30 11:59:37 server -> Sending packet 6 (1045 bytes) for connection 3593f6f31020d23f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:37 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:59:37 server <- Reading packet 3 (43 bytes) for connection 65169431, 1-RTT 2025/04/30 11:59:37 server Short Header{DestConnectionID: 65169431, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:37 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 128µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server newly acked packets (2): [5 6] 2025/04/30 11:59:37 server updated RTT: 31.661ms (σ: 9.352ms) 2025/04/30 11:59:37 server ECN capability confirmed. 2025/04/30 11:59:37 server Canceling loss detection timer. 2025/04/30 11:59:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:37 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:37 Replacing connection for connection IDs [a82366b7 5ee295f2 1ef7dc35 43ee42d1 65169431 7d809f97] with a closed connection. 2025/04/30 11:59:37 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:37 server Connection 3593f6f31020d23f closed. 2025/04/30 11:59:37 Removing connection IDs [92ba601e 5f0d0d49 431b72f4 a53ab735 4f6012a7 899dbb56] for a closed connection after it has been retired. 2025/04/30 11:59:37 Removing connection ID 054012f97220eb89562d8afd8e40fe565e865164 after it has been retired. 2025/04/30 11:59:37 Removing connection IDs [2ea5ef2e b1ad8967 9d0236c7 88c31b8b 5ccdc3a7 8e0d590e] for a closed connection after it has been retired. 2025/04/30 11:59:37 server <- Received Initial packet. 2025/04/30 11:59:37 Created qlog file: /logs/qlog/34214787e62b350e.sqlog 2025/04/30 11:59:37 server Changing connection ID to fd6f9891. 2025/04/30 11:59:37 Adding connection IDs 34214787e62b350e and fd6f9891 for a new connection. 2025/04/30 11:59:37 server <- Reading packet 0 (1252 bytes) for connection 34214787e62b350e, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: 34214787e62b350e, SrcConnectionID: (empty), Token: 0x4f0ad42611d6306762a3710b32c3c603bdc6482af3decd285477d5b253262d6249affa0740cabd3fcdfc9c03ee46b4cb3da1fbcaffa22c87213b3fc897b177263ed5c12329a311e87f532c8e72f7e0581cb69f870f44, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:37 server -> Sending packet 0 (40 bytes) for connection 34214787e62b350e, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fd6f9891, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:37 server <- Reading packet 1 (708 bytes) for connection 34214787e62b350e, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: 34214787e62b350e, SrcConnectionID: (empty), Token: 0x4f0ad42611d6306762a3710b32c3c603bdc6482af3decd285477d5b253262d6249affa0740cabd3fcdfc9c03ee46b4cb3da1fbcaffa22c87213b3fc897b177263ed5c12329a311e87f532c8e72f7e0581cb69f870f44, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:37 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:37 Adding connection ID 40616f8b. 2025/04/30 11:59:37 Adding connection ID d2a2bad7. 2025/04/30 11:59:37 Adding connection ID f868f631. 2025/04/30 11:59:37 Adding connection ID a138561c. 2025/04/30 11:59:37 Adding connection ID d0a1f0f9. 2025/04/30 11:59:37 server coalesced packet has different destination connection ID: 00000000, expected 34214787e62b350e 2025/04/30 11:59:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 34214787e62b350e 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: fd6f9891, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:59:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: fd6f9891, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d0a1f0f9, StatelessResetToken: 0x5424609e66cff8e84ec12862818b7ebe} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f868f631, StatelessResetToken: 0xa24889c4e393cce6d045e0371d1bb809} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a138561c, StatelessResetToken: 0xaf16ff989f3e070dbe948467df12bf3a} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 40616f8b, StatelessResetToken: 0x8cc31b0a26957e71b64f5ce12c54d2e0} 2025/04/30 11:59:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d2a2bad7, StatelessResetToken: 0x02cdc49d8ce0153f3df7cf0c42223b92} 2025/04/30 11:59:37 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:37 server <- Reading packet 2 (124 bytes) for connection fd6f9891, Initial 2025/04/30 11:59:37 server Long Header{Type: Initial, DestConnectionID: fd6f9891, SrcConnectionID: (empty), Token: 0x4f0ad42611d6306762a3710b32c3c603bdc6482af3decd285477d5b253262d6249affa0740cabd3fcdfc9c03ee46b4cb3da1fbcaffa22c87213b3fc897b177263ed5c12329a311e87f532c8e72f7e0581cb69f870f44, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 912µs} 2025/04/30 11:59:37 server newly acked packets (1): [1] 2025/04/30 11:59:37 server updated RTT: 32.77142ms (σ: 16.38571ms) 2025/04/30 11:59:37 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:37 server <- Reading packet 0 (75 bytes) for connection fd6f9891, Handshake 2025/04/30 11:59:37 server Long Header{Type: Handshake, DestConnectionID: fd6f9891, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:37 server Dropping Initial keys. 2025/04/30 11:59:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 912µs} 2025/04/30 11:59:37 server newly acked packets (1): [0] 2025/04/30 11:59:37 server updated RTT: 32.771ms (σ: 12.288ms) 2025/04/30 11:59:37 server Canceling loss detection timer. 2025/04/30 11:59:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:37 Retiring connection ID 34214787e62b350e in 5s. 2025/04/30 11:59:37 server Dropping Handshake keys. 2025/04/30 11:59:37 server -> Sending packet 1 (251 bytes) for connection 34214787e62b350e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:37 server -> &wire.NewTokenFrame{Token: 0xc831e9766d225f68455c144b2bce841b0d7f06b54565b34f97a365781b94b58665b02dcb7174d6b327475dd10daee6bfa925641d8a54476cb187edaa1576ab8cd7d5f8e087e1b8bf2b9bf0e52c2c15d04656f1cc9846} 2025/04/30 11:59:37 server <- Reading packet 0 (42 bytes) for connection fd6f9891, 1-RTT 2025/04/30 11:59:37 server Short Header{DestConnectionID: fd6f9891, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:37 server -> Sending packet 2 (27 bytes) for connection 34214787e62b350e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280.576µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:37 Received request: GET /prdivatddf 2025/04/30 11:59:37 server -> Sending packet 3 (1045 bytes) for connection 34214787e62b350e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:37 server <- Reading packet 1 (28 bytes) for connection fd6f9891, 1-RTT 2025/04/30 11:59:37 server Short Header{DestConnectionID: fd6f9891, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.304ms} 2025/04/30 11:59:37 server newly acked packets (1): [0] 2025/04/30 11:59:37 server updated RTT: 32.793ms (σ: 9.26ms) 2025/04/30 11:59:37 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:37 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:59:37 server <- Reading packet 2 (42 bytes) for connection fd6f9891, 1-RTT 2025/04/30 11:59:37 server Short Header{DestConnectionID: fd6f9891, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:37 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:37 server -> Sending packet 5 (260 bytes) for connection 34214787e62b350e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 7.122549ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:37 server -> &wire.NewTokenFrame{Token: 0xc831e9766d225f68455c144b2bce841b0d7f06b54565b34f97a365781b94b58665b02dcb7174d6b327475dd10daee6bfa925641d8a54476cb187edaa1576ab8cd7d5f8e087e1b8bf2b9bf0e52c2c15d04656f1cc9846} 2025/04/30 11:59:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:37 server Skipping packet number 4 2025/04/30 11:59:37 server -> Sending packet 6 (1045 bytes) for connection 34214787e62b350e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:37 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:37 server <- Reading packet 3 (1352 bytes) for connection fd6f9891, 1-RTT 2025/04/30 11:59:37 server Short Header{DestConnectionID: fd6f9891, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:37 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 272µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server newly acked packets (1): [5] 2025/04/30 11:59:37 server updated RTT: 32.741ms (σ: 7.048ms) 2025/04/30 11:59:37 server ECN capability confirmed. 2025/04/30 11:59:37 server <- &wire.PingFrame{} 2025/04/30 11:59:37 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:37 server Ignoring all packets below 3. 2025/04/30 11:59:37 server <- Reading packet 4 (41 bytes) for connection fd6f9891, 1-RTT 2025/04/30 11:59:37 server Short Header{DestConnectionID: fd6f9891, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:37 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:37 server newly acked packets (1): [6] 2025/04/30 11:59:37 server updated RTT: 32.697ms (σ: 5.373ms) 2025/04/30 11:59:37 server Canceling loss detection timer. 2025/04/30 11:59:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:37 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:37 Replacing connection for connection IDs [a138561c d0a1f0f9 fd6f9891 40616f8b d2a2bad7 f868f631] with a closed connection. 2025/04/30 11:59:37 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:37 server Connection 34214787e62b350e closed. 2025/04/30 11:59:38 server <- Received Initial packet. 2025/04/30 11:59:38 Created qlog file: /logs/qlog/93e5a2c0727ac949b58c6ac21832.sqlog 2025/04/30 11:59:38 server Changing connection ID to 0f76acf1. 2025/04/30 11:59:38 Adding connection IDs 93e5a2c0727ac949b58c6ac21832 and 0f76acf1 for a new connection. 2025/04/30 11:59:38 server <- Reading packet 0 (1252 bytes) for connection 93e5a2c0727ac949b58c6ac21832, Initial 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: 93e5a2c0727ac949b58c6ac21832, SrcConnectionID: (empty), Token: 0xc831e9766d225f68455c144b2bce841b0d7f06b54565b34f97a365781b94b58665b02dcb7174d6b327475dd10daee6bfa925641d8a54476cb187edaa1576ab8cd7d5f8e087e1b8bf2b9bf0e52c2c15d04656f1cc9846, PacketNumber: 0, PacketNumberLen: 1, Length: 1141, Version: v1} 2025/04/30 11:59:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 1120, Offset + Data length: 1120} 2025/04/30 11:59:38 server -> Sending packet 0 (40 bytes) for connection 93e5a2c0727ac949b58c6ac21832, Initial 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0f76acf1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server Parsed a coalesced packet. Part 1: 720 bytes. Remaining: 532 bytes. 2025/04/30 11:59:38 server <- Reading packet 1 (720 bytes) for connection 93e5a2c0727ac949b58c6ac21832, Initial 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: 93e5a2c0727ac949b58c6ac21832, SrcConnectionID: (empty), Token: 0xc831e9766d225f68455c144b2bce841b0d7f06b54565b34f97a365781b94b58665b02dcb7174d6b327475dd10daee6bfa925641d8a54476cb187edaa1576ab8cd7d5f8e087e1b8bf2b9bf0e52c2c15d04656f1cc9846, PacketNumber: 1, PacketNumberLen: 1, Length: 609, Version: v1} 2025/04/30 11:59:38 server <- &wire.CryptoFrame{Offset: 1120, Data length: 587, Offset + Data length: 1707} 2025/04/30 11:59:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:38 Adding connection ID 4831ba0a. 2025/04/30 11:59:38 Adding connection ID 8f080c23. 2025/04/30 11:59:38 Adding connection ID 86534ed5. 2025/04/30 11:59:38 Adding connection ID d50efce2. 2025/04/30 11:59:38 Adding connection ID 4eed052c. 2025/04/30 11:59:38 server coalesced packet has different destination connection ID: 00000000, expected 93e5a2c0727ac949b58c6ac21832 2025/04/30 11:59:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 93e5a2c0727ac949b58c6ac21832 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0f76acf1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 929, Version: v1} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0f76acf1, PacketNumber: 0, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 11:59:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 86534ed5, StatelessResetToken: 0x50a7314c61b600757bd731bf53147045} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4831ba0a, StatelessResetToken: 0xd2b224077423c8b7a0c20e97d891809f} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8f080c23, StatelessResetToken: 0x9ce9a3a1e8fffed69c2f41794f155799} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4eed052c, StatelessResetToken: 0x4adcd1562c0040cc2ca23620a5f8ce19} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d50efce2, StatelessResetToken: 0x3289dfa4b9a398e56c4933ec9e4705b1} 2025/04/30 11:59:38 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:38 server <- Reading packet 2 (124 bytes) for connection 0f76acf1, Initial 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: 0f76acf1, SrcConnectionID: (empty), Token: 0xc831e9766d225f68455c144b2bce841b0d7f06b54565b34f97a365781b94b58665b02dcb7174d6b327475dd10daee6bfa925641d8a54476cb187edaa1576ab8cd7d5f8e087e1b8bf2b9bf0e52c2c15d04656f1cc9846, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 768µs} 2025/04/30 11:59:38 server newly acked packets (1): [1] 2025/04/30 11:59:38 server updated RTT: 32.617631ms (σ: 16.308815ms) 2025/04/30 11:59:38 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:38 server <- Reading packet 0 (75 bytes) for connection 0f76acf1, Handshake 2025/04/30 11:59:38 server Long Header{Type: Handshake, DestConnectionID: 0f76acf1, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:38 server Dropping Initial keys. 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 768µs} 2025/04/30 11:59:38 server newly acked packets (1): [0] 2025/04/30 11:59:38 server updated RTT: 32.617ms (σ: 12.231ms) 2025/04/30 11:59:38 server Canceling loss detection timer. 2025/04/30 11:59:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:38 Retiring connection ID 93e5a2c0727ac949b58c6ac21832 in 5s. 2025/04/30 11:59:38 server Dropping Handshake keys. 2025/04/30 11:59:38 server -> Sending packet 1 (251 bytes) for connection 93e5a2c0727ac949b58c6ac21832, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:38 server -> &wire.NewTokenFrame{Token: 0x38be9c62cdbdd09720a65da66eb3341fadef98b8c6ba8548ec9a7137bf6764d59c9c72bb840fc4ce0662f533441cc994d4194e1cce1a798c57c46ae17ce1606278d1539621fdd57c65d45039c12fc4e7e97aa57497b4} 2025/04/30 11:59:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:38 server <- Reading packet 1 (28 bytes) for connection 0f76acf1, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 0f76acf1, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.16ms} 2025/04/30 11:59:38 server newly acked packets (1): [0] 2025/04/30 11:59:38 server updated RTT: 32.644ms (σ: 9.228ms) 2025/04/30 11:59:38 server <- Reading packet 2 (1352 bytes) for connection 0f76acf1, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 0f76acf1, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.PingFrame{} 2025/04/30 11:59:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:38 server -> Sending packet 2 (27 bytes) for connection 93e5a2c0727ac949b58c6ac21832, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 81.622µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server <- Reading packet 3 (31 bytes) for connection 0f76acf1, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 0f76acf1, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 20.472ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server newly acked packets (1): [1] 2025/04/30 11:59:38 server updated RTT: 34.98ms (σ: 11.594ms) 2025/04/30 11:59:38 server ECN capability confirmed. 2025/04/30 11:59:38 server Canceling loss detection timer. 2025/04/30 11:59:38 server <- Reading packet 4 (1392 bytes) for connection 0f76acf1, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 0f76acf1, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.PingFrame{} 2025/04/30 11:59:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:38 Received request: GET /eqqswfywnv 2025/04/30 11:59:38 server -> Sending packet 3 (1053 bytes) for connection 93e5a2c0727ac949b58c6ac21832, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 300.812µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:38 Removing connection ID fa3931bc6d597a48 after it has been retired. 2025/04/30 11:59:38 server <- Reading packet 5 (1444 bytes) for connection 0f76acf1, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 0f76acf1, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 80µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server newly acked packets (1): [3] 2025/04/30 11:59:38 server updated RTT: 34.706ms (σ: 9.241ms) 2025/04/30 11:59:38 server Canceling loss detection timer. 2025/04/30 11:59:38 server <- &wire.PingFrame{} 2025/04/30 11:59:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:38 server Ignoring all packets below 5. 2025/04/30 11:59:38 server <- Reading packet 6 (41 bytes) for connection 0f76acf1, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 0f76acf1, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 472µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:38 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:38 Replacing connection for connection IDs [4eed052c 0f76acf1 4831ba0a 8f080c23 86534ed5 d50efce2] with a closed connection. 2025/04/30 11:59:38 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:38 server Connection 93e5a2c0727ac949b58c6ac21832 closed. 2025/04/30 11:59:38 Removing connection IDs [adf6632a 3da8d889 b93b36ce fb5620ca 412b6089 2879b4db] for a closed connection after it has been retired. 2025/04/30 11:59:38 server <- Received Initial packet. 2025/04/30 11:59:38 Created qlog file: /logs/qlog/19b3484f72ab2b70.sqlog 2025/04/30 11:59:38 server Changing connection ID to 4bef2660. 2025/04/30 11:59:38 Adding connection IDs 19b3484f72ab2b70 and 4bef2660 for a new connection. 2025/04/30 11:59:38 server <- Reading packet 0 (1252 bytes) for connection 19b3484f72ab2b70, Initial 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: 19b3484f72ab2b70, SrcConnectionID: (empty), Token: 0x38be9c62cdbdd09720a65da66eb3341fadef98b8c6ba8548ec9a7137bf6764d59c9c72bb840fc4ce0662f533441cc994d4194e1cce1a798c57c46ae17ce1606278d1539621fdd57c65d45039c12fc4e7e97aa57497b4, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:38 server -> Sending packet 0 (40 bytes) for connection 19b3484f72ab2b70, Initial 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4bef2660, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:38 server <- Reading packet 1 (708 bytes) for connection 19b3484f72ab2b70, Initial 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: 19b3484f72ab2b70, SrcConnectionID: (empty), Token: 0x38be9c62cdbdd09720a65da66eb3341fadef98b8c6ba8548ec9a7137bf6764d59c9c72bb840fc4ce0662f533441cc994d4194e1cce1a798c57c46ae17ce1606278d1539621fdd57c65d45039c12fc4e7e97aa57497b4, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:38 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:38 Adding connection ID dbc9eea9. 2025/04/30 11:59:38 Adding connection ID ca42994e. 2025/04/30 11:59:38 Adding connection ID 47ba1949. 2025/04/30 11:59:38 Adding connection ID 1a86a77d. 2025/04/30 11:59:38 Adding connection ID 06ed9faa. 2025/04/30 11:59:38 server coalesced packet has different destination connection ID: 00000000, expected 19b3484f72ab2b70 2025/04/30 11:59:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 19b3484f72ab2b70 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4bef2660, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 937, Version: v1} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4bef2660, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1a86a77d, StatelessResetToken: 0xf71ddeaecdb1b65bccea46baa9b06bba} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 06ed9faa, StatelessResetToken: 0xc50ff329c9859763ef34e5b88c14586d} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dbc9eea9, StatelessResetToken: 0x8ef6870e5e69758241cbc9d42af4225b} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ca42994e, StatelessResetToken: 0x85e4c0a48a30f83a0afbec50d53728cb} 2025/04/30 11:59:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 47ba1949, StatelessResetToken: 0x53396a24a8fe873a7b934aa54bfdab5c} 2025/04/30 11:59:38 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:38 server <- Reading packet 2 (124 bytes) for connection 4bef2660, Initial 2025/04/30 11:59:38 server Long Header{Type: Initial, DestConnectionID: 4bef2660, SrcConnectionID: (empty), Token: 0x38be9c62cdbdd09720a65da66eb3341fadef98b8c6ba8548ec9a7137bf6764d59c9c72bb840fc4ce0662f533441cc994d4194e1cce1a798c57c46ae17ce1606278d1539621fdd57c65d45039c12fc4e7e97aa57497b4, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 11:59:38 server newly acked packets (1): [1] 2025/04/30 11:59:38 server updated RTT: 32.764116ms (σ: 16.382058ms) 2025/04/30 11:59:38 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:38 server <- Reading packet 0 (75 bytes) for connection 4bef2660, Handshake 2025/04/30 11:59:38 server Long Header{Type: Handshake, DestConnectionID: 4bef2660, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:38 server Dropping Initial keys. 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 11:59:38 server newly acked packets (1): [0] 2025/04/30 11:59:38 server updated RTT: 32.764ms (σ: 12.286ms) 2025/04/30 11:59:38 server Canceling loss detection timer. 2025/04/30 11:59:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:38 Retiring connection ID 19b3484f72ab2b70 in 5s. 2025/04/30 11:59:38 server Dropping Handshake keys. 2025/04/30 11:59:38 server -> Sending packet 1 (251 bytes) for connection 19b3484f72ab2b70, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:38 server -> &wire.NewTokenFrame{Token: 0x15355d83feb2cd604c2e75cb0fcb1c42d0386066a7f41841056bc0407fc4c2cecb6c582f00fb3c5bf1964743aa686caaac61b4e41be7284c9b4837d9e226cd7212286d093a36f006b897331d947c741c5cbd5b7dfb38} 2025/04/30 11:59:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:38 server <- Reading packet 0 (42 bytes) for connection 4bef2660, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 4bef2660, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:38 server -> Sending packet 2 (27 bytes) for connection 19b3484f72ab2b70, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 426.438µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:38 Received request: GET /gfefkilmlw 2025/04/30 11:59:38 server -> Sending packet 3 (1045 bytes) for connection 19b3484f72ab2b70, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:38 server <- Reading packet 1 (28 bytes) for connection 4bef2660, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 4bef2660, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.224ms} 2025/04/30 11:59:38 server newly acked packets (1): [0] 2025/04/30 11:59:38 server updated RTT: 35.163ms (σ: 14.013ms) 2025/04/30 11:59:38 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:59:38 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:59:38 server <- Reading packet 2 (42 bytes) for connection 4bef2660, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 4bef2660, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:38 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:38 server -> Sending packet 4 (28 bytes) for connection 19b3484f72ab2b70, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.282343ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:38 server -> Sending packet 6 (251 bytes) for connection 19b3484f72ab2b70, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.NewTokenFrame{Token: 0x15355d83feb2cd604c2e75cb0fcb1c42d0386066a7f41841056bc0407fc4c2cecb6c582f00fb3c5bf1964743aa686caaac61b4e41be7284c9b4837d9e226cd7212286d093a36f006b897331d947c741c5cbd5b7dfb38} 2025/04/30 11:59:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:38 server Skipping packet number 5 2025/04/30 11:59:38 server -> Sending packet 7 (1045 bytes) for connection 19b3484f72ab2b70, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:38 server <- Reading packet 3 (1352 bytes) for connection 4bef2660, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 4bef2660, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 200µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server newly acked packets (1): [6] 2025/04/30 11:59:38 server updated RTT: 34.796ms (σ: 11.242ms) 2025/04/30 11:59:38 server ECN capability confirmed. 2025/04/30 11:59:38 server <- &wire.PingFrame{} 2025/04/30 11:59:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:38 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:38 server -> Sending packet 8 (28 bytes) for connection 19b3484f72ab2b70, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:38 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:38 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 25.384965ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server <- Reading packet 5 (44 bytes) for connection 4bef2660, 1-RTT 2025/04/30 11:59:38 server Short Header{DestConnectionID: 4bef2660, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:38 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 56.664ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:38 server newly acked packets (1): [7] 2025/04/30 11:59:38 server updated RTT: 39.008ms (σ: 16.857ms) 2025/04/30 11:59:38 server Canceling loss detection timer. 2025/04/30 11:59:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:38 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:38 Replacing connection for connection IDs [47ba1949 1a86a77d 06ed9faa 4bef2660 dbc9eea9 ca42994e] with a closed connection. 2025/04/30 11:59:38 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:38 server Connection 19b3484f72ab2b70 closed. 2025/04/30 11:59:39 server <- Received Initial packet. 2025/04/30 11:59:39 Created qlog file: /logs/qlog/d810ec50a793ddff.sqlog 2025/04/30 11:59:39 server Changing connection ID to 8d6d948d. 2025/04/30 11:59:39 Adding connection IDs d810ec50a793ddff and 8d6d948d for a new connection. 2025/04/30 11:59:39 server <- Reading packet 0 (1252 bytes) for connection d810ec50a793ddff, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: d810ec50a793ddff, SrcConnectionID: (empty), Token: 0x15355d83feb2cd604c2e75cb0fcb1c42d0386066a7f41841056bc0407fc4c2cecb6c582f00fb3c5bf1964743aa686caaac61b4e41be7284c9b4837d9e226cd7212286d093a36f006b897331d947c741c5cbd5b7dfb38, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:39 server -> Sending packet 0 (40 bytes) for connection d810ec50a793ddff, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d6d948d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:39 server <- Reading packet 1 (708 bytes) for connection d810ec50a793ddff, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: d810ec50a793ddff, SrcConnectionID: (empty), Token: 0x15355d83feb2cd604c2e75cb0fcb1c42d0386066a7f41841056bc0407fc4c2cecb6c582f00fb3c5bf1964743aa686caaac61b4e41be7284c9b4837d9e226cd7212286d093a36f006b897331d947c741c5cbd5b7dfb38, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:39 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:39 Adding connection ID af3f01b4. 2025/04/30 11:59:39 Adding connection ID ecb91770. 2025/04/30 11:59:39 Adding connection ID a817c516. 2025/04/30 11:59:39 Adding connection ID 0486c139. 2025/04/30 11:59:39 Adding connection ID 74c9190f. 2025/04/30 11:59:39 server coalesced packet has different destination connection ID: 00000000, expected d810ec50a793ddff 2025/04/30 11:59:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d810ec50a793ddff 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d6d948d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 931, Version: v1} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d6d948d, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0486c139, StatelessResetToken: 0x3090502cec65a6a5cf4741f62b2de0af} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a817c516, StatelessResetToken: 0xba20e0c02e44ee557d837a3e167796c5} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 74c9190f, StatelessResetToken: 0x815ff7240a9ef86181a2a1fb77ef555a} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecb91770, StatelessResetToken: 0x2694f95142a2ffcadadfbbbae16f75a3} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af3f01b4, StatelessResetToken: 0x99eda4efc99c7d5e5c2151599f17d636} 2025/04/30 11:59:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:39 server -> Sending packet 2 (1280 bytes) for connection d810ec50a793ddff, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d6d948d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:39 server -> Sending packet 3 (1280 bytes) for connection d810ec50a793ddff, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8d6d948d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:39 Tracking 62 connection IDs and 0 reset tokens. 2025/04/30 11:59:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:39 server -> Sending packet 1 (196 bytes) for connection d810ec50a793ddff, Handshake 2025/04/30 11:59:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d6d948d, PacketNumber: 1, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:59:39 server -> Sending packet 2 (196 bytes) for connection d810ec50a793ddff, Handshake 2025/04/30 11:59:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8d6d948d, PacketNumber: 2, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:59:39 server <- Reading packet 1 (76 bytes) for connection 8d6d948d, Handshake 2025/04/30 11:59:39 server Long Header{Type: Handshake, DestConnectionID: 8d6d948d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 11:59:39 server Dropping Initial keys. 2025/04/30 11:59:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs} 2025/04/30 11:59:39 server newly acked packets (1): [2] 2025/04/30 11:59:39 server updated RTT: 31.466956ms (σ: 15.733478ms) 2025/04/30 11:59:39 server Canceling loss detection timer. 2025/04/30 11:59:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:39 Retiring connection ID d810ec50a793ddff in 5s. 2025/04/30 11:59:39 server Dropping Handshake keys. 2025/04/30 11:59:39 server -> Sending packet 1 (251 bytes) for connection d810ec50a793ddff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.NewTokenFrame{Token: 0xf62bcbbac9afab7e9c4b43d7f3e591f1a9f9ba84cc4914026ef8f849ea62f1b1f54769c94d1d5bdef73559d0a08316f9528ea7a5fbfaf19b2b10a7f600a42a1a13709b11fbc4ab4eccbd4882d957bbe70eae84fe2d7b} 2025/04/30 11:59:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:39 server -> Sending packet 3 (139 bytes) for connection d810ec50a793ddff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a817c516, StatelessResetToken: 0xba20e0c02e44ee557d837a3e167796c5} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 74c9190f, StatelessResetToken: 0x815ff7240a9ef86181a2a1fb77ef555a} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0486c139, StatelessResetToken: 0x3090502cec65a6a5cf4741f62b2de0af} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af3f01b4, StatelessResetToken: 0x99eda4efc99c7d5e5c2151599f17d636} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecb91770, StatelessResetToken: 0x2694f95142a2ffcadadfbbbae16f75a3} 2025/04/30 11:59:39 server Skipping packet number 2 2025/04/30 11:59:39 server -> Sending packet 4 (251 bytes) for connection d810ec50a793ddff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:39 server -> &wire.NewTokenFrame{Token: 0xf62bcbbac9afab7e9c4b43d7f3e591f1a9f9ba84cc4914026ef8f849ea62f1b1f54769c94d1d5bdef73559d0a08316f9528ea7a5fbfaf19b2b10a7f600a42a1a13709b11fbc4ab4eccbd4882d957bbe70eae84fe2d7b} 2025/04/30 11:59:39 server <- Reading packet 4 (25 bytes) for connection 8d6d948d, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 8d6d948d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.PingFrame{} 2025/04/30 11:59:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:39 server -> Sending packet 5 (27 bytes) for connection d810ec50a793ddff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 134.401µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server <- Reading packet 5 (1392 bytes) for connection 8d6d948d, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 8d6d948d, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 88µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server newly acked packets (1): [4] 2025/04/30 11:59:39 server updated RTT: 31.59ms (σ: 12.048ms) 2025/04/30 11:59:39 server ECN capability confirmed. 2025/04/30 11:59:39 server setting loss timer for packet 3 (1-RTT) to 36.520702ms (in 2025-04-30 11:59:39.424852077 +0000 UTC m=+30.192716222) 2025/04/30 11:59:39 server <- &wire.PingFrame{} 2025/04/30 11:59:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:39 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:59:39.424852077 +0000 UTC m=+30.192716222 2025/04/30 11:59:39 server lost packet 3 (time threshold) 2025/04/30 11:59:39 server Canceling loss detection timer. 2025/04/30 11:59:39 server -> Sending packet 6 (148 bytes) for connection d810ec50a793ddff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 4.292675ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 74c9190f, StatelessResetToken: 0x815ff7240a9ef86181a2a1fb77ef555a} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0486c139, StatelessResetToken: 0x3090502cec65a6a5cf4741f62b2de0af} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af3f01b4, StatelessResetToken: 0x99eda4efc99c7d5e5c2151599f17d636} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a817c516, StatelessResetToken: 0xba20e0c02e44ee557d837a3e167796c5} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecb91770, StatelessResetToken: 0x2694f95142a2ffcadadfbbbae16f75a3} 2025/04/30 11:59:39 server <- Reading packet 6 (42 bytes) for connection 8d6d948d, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 8d6d948d, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:39 server -> Sending packet 7 (1366 bytes) for connection d810ec50a793ddff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.PingFrame{} 2025/04/30 11:59:39 Received request: GET /atqqbuzkzw 2025/04/30 11:59:39 server -> Sending packet 8 (1053 bytes) for connection d810ec50a793ddff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 306.303µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:39 server <- Reading packet 7 (42 bytes) for connection 8d6d948d, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 8d6d948d, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:39 server <- Reading packet 8 (1444 bytes) for connection 8d6d948d, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 8d6d948d, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 96µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server newly acked packets (1): [6] 2025/04/30 11:59:39 server updated RTT: 31.638ms (σ: 9.133ms) 2025/04/30 11:59:39 server <- &wire.PingFrame{} 2025/04/30 11:59:39 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:59:39 server Ignoring all packets below 6. 2025/04/30 11:59:39 server -> Sending packet 9 (27 bytes) for connection d810ec50a793ddff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 109.965µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server <- Reading packet 11 (42 bytes) for connection 8d6d948d, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 8d6d948d, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, DelayTime: 10.536ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server newly acked packets (2): [7 8] 2025/04/30 11:59:39 server updated RTT: 31.746ms (σ: 7.066ms) 2025/04/30 11:59:39 server Canceling loss detection timer. 2025/04/30 11:59:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:39 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:39 Replacing connection for connection IDs [a817c516 0486c139 74c9190f 8d6d948d af3f01b4 ecb91770] with a closed connection. 2025/04/30 11:59:39 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:39 server Connection d810ec50a793ddff closed. 2025/04/30 11:59:39 server <- Received Initial packet. 2025/04/30 11:59:39 Created qlog file: /logs/qlog/1e097868a7eb88d3ab.sqlog 2025/04/30 11:59:39 server Changing connection ID to 1e4457f5. 2025/04/30 11:59:39 Adding connection IDs 1e097868a7eb88d3ab and 1e4457f5 for a new connection. 2025/04/30 11:59:39 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:59:39 server <- Reading packet 1 (710 bytes) for connection 1e097868a7eb88d3ab, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: 1e097868a7eb88d3ab, SrcConnectionID: (empty), Token: 0xf62bcbbac9afab7e9c4b43d7f3e591f1a9f9ba84cc4914026ef8f849ea62f1b1f54769c94d1d5bdef73559d0a08316f9528ea7a5fbfaf19b2b10a7f600a42a1a13709b11fbc4ab4eccbd4882d957bbe70eae84fe2d7b, PacketNumber: 1, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:39 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:39 server coalesced packet has different destination connection ID: 00000000, expected 1e097868a7eb88d3ab 2025/04/30 11:59:39 server -> Sending packet 0 (40 bytes) for connection 1e097868a7eb88d3ab, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e4457f5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server <- Reading packet 2 (1252 bytes) for connection 1e097868a7eb88d3ab, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: 1e097868a7eb88d3ab, SrcConnectionID: (empty), Token: 0xf62bcbbac9afab7e9c4b43d7f3e591f1a9f9ba84cc4914026ef8f849ea62f1b1f54769c94d1d5bdef73559d0a08316f9528ea7a5fbfaf19b2b10a7f600a42a1a13709b11fbc4ab4eccbd4882d957bbe70eae84fe2d7b, PacketNumber: 2, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:59:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:59:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:39 Adding connection ID c45267e4. 2025/04/30 11:59:39 Adding connection ID db5a9042. 2025/04/30 11:59:39 Adding connection ID ed002f03. 2025/04/30 11:59:39 Adding connection ID 5aa83a30. 2025/04/30 11:59:39 Adding connection ID 91965231. 2025/04/30 11:59:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1e097868a7eb88d3ab 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e4457f5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 941, Version: v1} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1e4457f5, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c45267e4, StatelessResetToken: 0xcf24a1fd90a0ce2321e5fd7f7dceac7d} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: db5a9042, StatelessResetToken: 0xad132a3289babf0e46e51a15d3bfe07e} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5aa83a30, StatelessResetToken: 0x6ce684595b2756f27574b2337e4666a3} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 91965231, StatelessResetToken: 0x0582f6e7413852c465c408e44fd283b3} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ed002f03, StatelessResetToken: 0x2d8a0833f9040bfc641ecea3a54e78c3} 2025/04/30 11:59:39 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:59:39 server <- Reading packet 3 (710 bytes) for connection 1e097868a7eb88d3ab, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: 1e097868a7eb88d3ab, SrcConnectionID: (empty), Token: 0xf62bcbbac9afab7e9c4b43d7f3e591f1a9f9ba84cc4914026ef8f849ea62f1b1f54769c94d1d5bdef73559d0a08316f9528ea7a5fbfaf19b2b10a7f600a42a1a13709b11fbc4ab4eccbd4882d957bbe70eae84fe2d7b, PacketNumber: 3, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:39 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:39 server coalesced packet has different destination connection ID: 00000000, expected 1e097868a7eb88d3ab 2025/04/30 11:59:39 server -> Sending packet 2 (40 bytes) for connection 1e097868a7eb88d3ab, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e4457f5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:39 server -> Sending packet 3 (1280 bytes) for connection 1e097868a7eb88d3ab, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e4457f5, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:39 server -> Sending packet 4 (1280 bytes) for connection 1e097868a7eb88d3ab, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1e4457f5, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:39 server -> Sending packet 1 (186 bytes) for connection 1e097868a7eb88d3ab, Handshake 2025/04/30 11:59:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1e4457f5, PacketNumber: 1, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:39 server -> Sending packet 2 (186 bytes) for connection 1e097868a7eb88d3ab, Handshake 2025/04/30 11:59:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1e4457f5, PacketNumber: 2, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:39 server Parsed a coalesced packet. Part 1: 123 bytes. Remaining: 1129 bytes. 2025/04/30 11:59:39 server <- Reading packet 4 (123 bytes) for connection 1e4457f5, Initial 2025/04/30 11:59:39 server Long Header{Type: Initial, DestConnectionID: 1e4457f5, SrcConnectionID: (empty), Token: 0xf62bcbbac9afab7e9c4b43d7f3e591f1a9f9ba84cc4914026ef8f849ea62f1b1f54769c94d1d5bdef73559d0a08316f9528ea7a5fbfaf19b2b10a7f600a42a1a13709b11fbc4ab4eccbd4882d957bbe70eae84fe2d7b, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:59:39 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 504µs} 2025/04/30 11:59:39 server coalesced packet has different destination connection ID: 00000000, expected 1e4457f5 2025/04/30 11:59:39 server <- Reading packet 0 (75 bytes) for connection 1e4457f5, Handshake 2025/04/30 11:59:39 server Long Header{Type: Handshake, DestConnectionID: 1e4457f5, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:39 server Dropping Initial keys. 2025/04/30 11:59:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 552µs} 2025/04/30 11:59:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:39 Retiring connection ID 1e097868a7eb88d3ab in 5s. 2025/04/30 11:59:39 server Dropping Handshake keys. 2025/04/30 11:59:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:39 server -> Sending packet 2 (371 bytes) for connection 1e097868a7eb88d3ab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.NewTokenFrame{Token: 0x91f6c61a98b9a36aac39af87a3359c95770991ddaea3babfc9c2fd83119265a57af545d9e3da5d18fc7a4a6cbc825ff68e083f3f9b2daee9a8cb478d29a136ae8f08e57ffda2bead7d025798df9cb91d554148c10149} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ed002f03, StatelessResetToken: 0x2d8a0833f9040bfc641ecea3a54e78c3} 2025/04/30 11:59:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 91965231, StatelessResetToken: 0x0582f6e7413852c465c408e44fd283b3} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5aa83a30, StatelessResetToken: 0x6ce684595b2756f27574b2337e4666a3} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: db5a9042, StatelessResetToken: 0xad132a3289babf0e46e51a15d3bfe07e} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c45267e4, StatelessResetToken: 0xcf24a1fd90a0ce2321e5fd7f7dceac7d} 2025/04/30 11:59:39 server -> Sending packet 3 (371 bytes) for connection 1e097868a7eb88d3ab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: db5a9042, StatelessResetToken: 0xad132a3289babf0e46e51a15d3bfe07e} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c45267e4, StatelessResetToken: 0xcf24a1fd90a0ce2321e5fd7f7dceac7d} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ed002f03, StatelessResetToken: 0x2d8a0833f9040bfc641ecea3a54e78c3} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 91965231, StatelessResetToken: 0x0582f6e7413852c465c408e44fd283b3} 2025/04/30 11:59:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5aa83a30, StatelessResetToken: 0x6ce684595b2756f27574b2337e4666a3} 2025/04/30 11:59:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:39 server -> &wire.NewTokenFrame{Token: 0x91f6c61a98b9a36aac39af87a3359c95770991ddaea3babfc9c2fd83119265a57af545d9e3da5d18fc7a4a6cbc825ff68e083f3f9b2daee9a8cb478d29a136ae8f08e57ffda2bead7d025798df9cb91d554148c10149} 2025/04/30 11:59:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:39 server <- Reading packet 0 (42 bytes) for connection 1e4457f5, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 1e4457f5, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:39 server -> Sending packet 4 (27 bytes) for connection 1e097868a7eb88d3ab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 269.05µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:39 Received request: GET /vrjbqnykww 2025/04/30 11:59:39 server -> Sending packet 5 (1045 bytes) for connection 1e097868a7eb88d3ab, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:39 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:39 server <- Reading packet 1 (1352 bytes) for connection 1e4457f5, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 1e4457f5, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 280µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server <- &wire.PingFrame{} 2025/04/30 11:59:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:39 server <- Reading packet 2 (43 bytes) for connection 1e4457f5, 1-RTT 2025/04/30 11:59:39 server Short Header{DestConnectionID: 1e4457f5, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 136µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:39 server newly acked packets (1): [5] 2025/04/30 11:59:39 server updated RTT: 32.137365ms (σ: 16.068682ms) 2025/04/30 11:59:39 server ECN capability confirmed. 2025/04/30 11:59:39 server setting loss timer for packet 3 (1-RTT) to 36.154535ms (in 2025-04-30 11:59:39.954067986 +0000 UTC m=+30.721932121) 2025/04/30 11:59:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:39 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:39 Replacing connection for connection IDs [ed002f03 5aa83a30 91965231 1e4457f5 c45267e4 db5a9042] with a closed connection. 2025/04/30 11:59:39 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:39 server Connection 1e097868a7eb88d3ab closed. 2025/04/30 11:59:40 Removing connection ID e726043ae9f79e3b after it has been retired. 2025/04/30 11:59:40 Removing connection IDs [545e14e7 3457675a ccbd7038 b9292de7 0531019e 9fb46758] for a closed connection after it has been retired. 2025/04/30 11:59:40 Removing connection ID 6b36c436a1ddcaa5 after it has been retired. 2025/04/30 11:59:41 Removing connection IDs [6a019523 276d44d7 47530712 24db8f9b faabbd3f 936fb1b0] for a closed connection after it has been retired. 2025/04/30 11:59:41 Tracking 55 connection IDs and 0 reset tokens. 2025/04/30 11:59:41 Removing connection ID 13eba1b86235cb1f after it has been retired. 2025/04/30 11:59:41 Removing connection IDs [4df22547 63cf2765 19d0c74c 45fd2ec8 609cd74c 4a06ae03] for a closed connection after it has been retired. 2025/04/30 11:59:41 server <- Received Initial packet. 2025/04/30 11:59:41 Created qlog file: /logs/qlog/388293917e816edb.sqlog 2025/04/30 11:59:41 server Changing connection ID to a7bdc2bb. 2025/04/30 11:59:41 Adding connection IDs 388293917e816edb and a7bdc2bb for a new connection. 2025/04/30 11:59:41 server <- Reading packet 0 (1252 bytes) for connection 388293917e816edb, Initial 2025/04/30 11:59:41 server Long Header{Type: Initial, DestConnectionID: 388293917e816edb, SrcConnectionID: (empty), Token: 0x91f6c61a98b9a36aac39af87a3359c95770991ddaea3babfc9c2fd83119265a57af545d9e3da5d18fc7a4a6cbc825ff68e083f3f9b2daee9a8cb478d29a136ae8f08e57ffda2bead7d025798df9cb91d554148c10149, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:41 server -> Sending packet 0 (40 bytes) for connection 388293917e816edb, Initial 2025/04/30 11:59:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:41 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:41 server <- Reading packet 1 (708 bytes) for connection 388293917e816edb, Initial 2025/04/30 11:59:41 server Long Header{Type: Initial, DestConnectionID: 388293917e816edb, SrcConnectionID: (empty), Token: 0x91f6c61a98b9a36aac39af87a3359c95770991ddaea3babfc9c2fd83119265a57af545d9e3da5d18fc7a4a6cbc825ff68e083f3f9b2daee9a8cb478d29a136ae8f08e57ffda2bead7d025798df9cb91d554148c10149, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:41 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:41 Adding connection ID 6f2e066f. 2025/04/30 11:59:41 Adding connection ID e0c79d1b. 2025/04/30 11:59:41 Adding connection ID c9a58dcb. 2025/04/30 11:59:41 Adding connection ID b3fcbe5e. 2025/04/30 11:59:41 Adding connection ID 66c732e0. 2025/04/30 11:59:41 server coalesced packet has different destination connection ID: 00000000, expected 388293917e816edb 2025/04/30 11:59:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 388293917e816edb 2025/04/30 11:59:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 935, Version: v1} 2025/04/30 11:59:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:41 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:41 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b3fcbe5e, StatelessResetToken: 0x96bae2428ab899b069fdd1a1060db9ef} 2025/04/30 11:59:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f2e066f, StatelessResetToken: 0x0a9f9218af2e9478a9722c071927a5ae} 2025/04/30 11:59:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 66c732e0, StatelessResetToken: 0x21b7ae62f230ac848a30a6488ca51065} 2025/04/30 11:59:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c9a58dcb, StatelessResetToken: 0x42d72e5b6ee9c8112f987129bbb2df7a} 2025/04/30 11:59:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e0c79d1b, StatelessResetToken: 0x50e634a7d7a239888f1f0f31143dcc85} 2025/04/30 11:59:41 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:41 server -> Sending packet 2 (1280 bytes) for connection 388293917e816edb, Initial 2025/04/30 11:59:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:41 server -> Sending packet 3 (1280 bytes) for connection 388293917e816edb, Initial 2025/04/30 11:59:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:41 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:41 server -> Sending packet 1 (192 bytes) for connection 388293917e816edb, Handshake 2025/04/30 11:59:41 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, PacketNumber: 1, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:41 server -> Sending packet 2 (192 bytes) for connection 388293917e816edb, Handshake 2025/04/30 11:59:41 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, PacketNumber: 2, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:41 server <- Reading packet 3 (1252 bytes) for connection a7bdc2bb, Initial 2025/04/30 11:59:41 server Long Header{Type: Initial, DestConnectionID: a7bdc2bb, SrcConnectionID: (empty), Token: 0x91f6c61a98b9a36aac39af87a3359c95770991ddaea3babfc9c2fd83119265a57af545d9e3da5d18fc7a4a6cbc825ff68e083f3f9b2daee9a8cb478d29a136ae8f08e57ffda2bead7d025798df9cb91d554148c10149, PacketNumber: 3, PacketNumberLen: 1, Length: 1151, Version: v1} 2025/04/30 11:59:41 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 40µs} 2025/04/30 11:59:41 server newly acked packets (1): [3] 2025/04/30 11:59:41 server updated RTT: 34.205102ms (σ: 17.102551ms) 2025/04/30 11:59:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:59:41 server -> Sending packet 4 (42 bytes) for connection 388293917e816edb, Initial 2025/04/30 11:59:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:41 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:42 server Parsed a coalesced packet. Part 1: 705 bytes. Remaining: 547 bytes. 2025/04/30 11:59:42 server <- Reading packet 4 (705 bytes) for connection a7bdc2bb, Initial 2025/04/30 11:59:42 server Long Header{Type: Initial, DestConnectionID: a7bdc2bb, SrcConnectionID: (empty), Token: 0x91f6c61a98b9a36aac39af87a3359c95770991ddaea3babfc9c2fd83119265a57af545d9e3da5d18fc7a4a6cbc825ff68e083f3f9b2daee9a8cb478d29a136ae8f08e57ffda2bead7d025798df9cb91d554148c10149, PacketNumber: 4, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:42 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:42 server coalesced packet has different destination connection ID: 00000000, expected a7bdc2bb 2025/04/30 11:59:42 server -> Sending packet 5 (42 bytes) for connection 388293917e816edb, Initial 2025/04/30 11:59:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a7bdc2bb, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:59:42 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:42 server <- Reading packet 0 (74 bytes) for connection a7bdc2bb, Handshake 2025/04/30 11:59:42 server Long Header{Type: Handshake, DestConnectionID: a7bdc2bb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:42 server Dropping Initial keys. 2025/04/30 11:59:42 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 424µs} 2025/04/30 11:59:42 server newly acked packets (1): [2] 2025/04/30 11:59:42 server updated RTT: 33.866ms (σ: 13.502ms) 2025/04/30 11:59:42 server Canceling loss detection timer. 2025/04/30 11:59:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:42 Retiring connection ID 388293917e816edb in 5s. 2025/04/30 11:59:42 server Dropping Handshake keys. 2025/04/30 11:59:42 server -> Sending packet 1 (251 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.NewTokenFrame{Token: 0xd30a4f833df61898e321bae135e815555110d09b0772de186df8a925f107e87c169a9f6bbe3e97e4e80bfad0cb642e098053e9c1e0dbe1bdf847d3a40f1156dbdb7a688f9a72e567ca2c447ce95fb9a97b2dffe69dac} 2025/04/30 11:59:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:42 server <- Reading packet 0 (42 bytes) for connection a7bdc2bb, 1-RTT 2025/04/30 11:59:42 server Short Header{DestConnectionID: a7bdc2bb, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:42 server -> Sending packet 2 (27 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 159.426µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:42 Received request: GET /kogzogtzls 2025/04/30 11:59:42 server -> Sending packet 3 (1045 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:42 server <- Reading packet 1 (1352 bytes) for connection a7bdc2bb, 1-RTT 2025/04/30 11:59:42 server Short Header{DestConnectionID: a7bdc2bb, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:42 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 200µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:42 server newly acked packets (1): [1] 2025/04/30 11:59:42 server updated RTT: 33.631ms (σ: 10.594ms) 2025/04/30 11:59:42 server ECN capability confirmed. 2025/04/30 11:59:42 server lost packet 0 (time threshold) 2025/04/30 11:59:42 server <- &wire.PingFrame{} 2025/04/30 11:59:42 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:42 server -> Sending packet 4 (147 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 123.201µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e0c79d1b, StatelessResetToken: 0x50e634a7d7a239888f1f0f31143dcc85} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f2e066f, StatelessResetToken: 0x0a9f9218af2e9478a9722c071927a5ae} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c9a58dcb, StatelessResetToken: 0x42d72e5b6ee9c8112f987129bbb2df7a} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b3fcbe5e, StatelessResetToken: 0x96bae2428ab899b069fdd1a1060db9ef} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 66c732e0, StatelessResetToken: 0x21b7ae62f230ac848a30a6488ca51065} 2025/04/30 11:59:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:42 server -> Sending packet 6 (1045 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:42 server Skipping packet number 5 2025/04/30 11:59:42 server -> Sending packet 7 (139 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f2e066f, StatelessResetToken: 0x0a9f9218af2e9478a9722c071927a5ae} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e0c79d1b, StatelessResetToken: 0x50e634a7d7a239888f1f0f31143dcc85} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 66c732e0, StatelessResetToken: 0x21b7ae62f230ac848a30a6488ca51065} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c9a58dcb, StatelessResetToken: 0x42d72e5b6ee9c8112f987129bbb2df7a} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b3fcbe5e, StatelessResetToken: 0x96bae2428ab899b069fdd1a1060db9ef} 2025/04/30 11:59:42 Removing connection ID 3593f6f31020d23f after it has been retired. 2025/04/30 11:59:42 Removing connection IDs [a82366b7 5ee295f2 1ef7dc35 43ee42d1 65169431 7d809f97] for a closed connection after it has been retired. 2025/04/30 11:59:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:59:42 server -> Sending packet 9 (1045 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:42 server Skipping packet number 8 2025/04/30 11:59:42 server -> Sending packet 10 (139 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e0c79d1b, StatelessResetToken: 0x50e634a7d7a239888f1f0f31143dcc85} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b3fcbe5e, StatelessResetToken: 0x96bae2428ab899b069fdd1a1060db9ef} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c9a58dcb, StatelessResetToken: 0x42d72e5b6ee9c8112f987129bbb2df7a} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 66c732e0, StatelessResetToken: 0x21b7ae62f230ac848a30a6488ca51065} 2025/04/30 11:59:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f2e066f, StatelessResetToken: 0x0a9f9218af2e9478a9722c071927a5ae} 2025/04/30 11:59:42 server -> Sending packet 11 (1366 bytes) for connection 388293917e816edb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.PingFrame{} 2025/04/30 11:59:42 server <- Reading packet 3 (44 bytes) for connection a7bdc2bb, 1-RTT 2025/04/30 11:59:42 server Short Header{DestConnectionID: a7bdc2bb, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:42 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 321.92ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:42 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:42 Replacing connection for connection IDs [a7bdc2bb 6f2e066f e0c79d1b c9a58dcb b3fcbe5e 66c732e0] with a closed connection. 2025/04/30 11:59:42 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:42 server Connection 388293917e816edb closed. 2025/04/30 11:59:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:59:42 server -> Sending packet 28 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:42 server -> Sending packet 29 (140 bytes) for connection f56f040a6ffbfcce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:42 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:59:42 Removing connection ID 34214787e62b350e after it has been retired. 2025/04/30 11:59:42 Removing connection IDs [a138561c d0a1f0f9 fd6f9891 40616f8b d2a2bad7 f868f631] for a closed connection after it has been retired. 2025/04/30 11:59:43 server <- Received Initial packet. 2025/04/30 11:59:43 Created qlog file: /logs/qlog/f25cfcc467c0986c.sqlog 2025/04/30 11:59:43 server Changing connection ID to 4370bf89. 2025/04/30 11:59:43 Adding connection IDs f25cfcc467c0986c and 4370bf89 for a new connection. 2025/04/30 11:59:43 server <- Reading packet 0 (1252 bytes) for connection f25cfcc467c0986c, Initial 2025/04/30 11:59:43 server Long Header{Type: Initial, DestConnectionID: f25cfcc467c0986c, SrcConnectionID: (empty), Token: 0xd30a4f833df61898e321bae135e815555110d09b0772de186df8a925f107e87c169a9f6bbe3e97e4e80bfad0cb642e098053e9c1e0dbe1bdf847d3a40f1156dbdb7a688f9a72e567ca2c447ce95fb9a97b2dffe69dac, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:43 server -> Sending packet 0 (40 bytes) for connection f25cfcc467c0986c, Initial 2025/04/30 11:59:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4370bf89, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:43 Tracking 43 connection IDs and 0 reset tokens. 2025/04/30 11:59:43 Removing connection ID 93e5a2c0727ac949b58c6ac21832 after it has been retired. 2025/04/30 11:59:43 Removing connection IDs [4eed052c 0f76acf1 4831ba0a 8f080c23 86534ed5 d50efce2] for a closed connection after it has been retired. 2025/04/30 11:59:43 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:43 server <- Reading packet 3 (704 bytes) for connection 4370bf89, Initial 2025/04/30 11:59:43 server Long Header{Type: Initial, DestConnectionID: 4370bf89, SrcConnectionID: (empty), Token: 0xd30a4f833df61898e321bae135e815555110d09b0772de186df8a925f107e87c169a9f6bbe3e97e4e80bfad0cb642e098053e9c1e0dbe1bdf847d3a40f1156dbdb7a688f9a72e567ca2c447ce95fb9a97b2dffe69dac, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:43 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:43 Adding connection ID 02089d43. 2025/04/30 11:59:43 Adding connection ID 4d110dc8. 2025/04/30 11:59:43 Adding connection ID 225c0610. 2025/04/30 11:59:43 Adding connection ID 4e9e3a3d. 2025/04/30 11:59:43 Adding connection ID dee6322f. 2025/04/30 11:59:43 server coalesced packet has different destination connection ID: 00000000, expected 4370bf89 2025/04/30 11:59:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f25cfcc467c0986c 2025/04/30 11:59:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4370bf89, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 942, Version: v1} 2025/04/30 11:59:43 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4370bf89, PacketNumber: 0, PacketNumberLen: 2, Length: 172, Version: v1} 2025/04/30 11:59:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/04/30 11:59:43 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d110dc8, StatelessResetToken: 0x1eaba9383f5fd1bec75b843109c3cd78} 2025/04/30 11:59:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4e9e3a3d, StatelessResetToken: 0x50d89f0bf287ee9e356e1374c134ec4f} 2025/04/30 11:59:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 225c0610, StatelessResetToken: 0xdcd9d964e40c2b77c089d8cd73c01341} 2025/04/30 11:59:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: dee6322f, StatelessResetToken: 0xf24b5e2e7db9d8c28e280a5d1e473a40} 2025/04/30 11:59:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 02089d43, StatelessResetToken: 0x7f74b0232299de700974bab886a21429} 2025/04/30 11:59:43 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:43 server <- Reading packet 4 (124 bytes) for connection 4370bf89, Initial 2025/04/30 11:59:43 server Long Header{Type: Initial, DestConnectionID: 4370bf89, SrcConnectionID: (empty), Token: 0xd30a4f833df61898e321bae135e815555110d09b0772de186df8a925f107e87c169a9f6bbe3e97e4e80bfad0cb642e098053e9c1e0dbe1bdf847d3a40f1156dbdb7a688f9a72e567ca2c447ce95fb9a97b2dffe69dac, PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 920µs} 2025/04/30 11:59:43 server newly acked packets (1): [1] 2025/04/30 11:59:43 server updated RTT: 33.124244ms (σ: 16.562122ms) 2025/04/30 11:59:43 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:43 server <- Reading packet 0 (75 bytes) for connection 4370bf89, Handshake 2025/04/30 11:59:43 server Long Header{Type: Handshake, DestConnectionID: 4370bf89, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:43 server Dropping Initial keys. 2025/04/30 11:59:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 920µs} 2025/04/30 11:59:43 server newly acked packets (1): [0] 2025/04/30 11:59:43 server updated RTT: 33.124ms (σ: 12.421ms) 2025/04/30 11:59:43 server Canceling loss detection timer. 2025/04/30 11:59:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:43 Retiring connection ID f25cfcc467c0986c in 5s. 2025/04/30 11:59:43 server Dropping Handshake keys. 2025/04/30 11:59:43 server -> Sending packet 1 (251 bytes) for connection f25cfcc467c0986c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:43 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:43 server -> &wire.NewTokenFrame{Token: 0xd89d593ce97e14862e2fb87f4d91867c42add5c1cea71f1dc824b968cbc751a5c0fd0cf975e0352c81d17c292c01b81f21b6121d4490a6080420d635915d56e99631d39634725184d0155349869bc6269b8abe9109a8} 2025/04/30 11:59:43 server <- Reading packet 1 (28 bytes) for connection 4370bf89, 1-RTT 2025/04/30 11:59:43 server Short Header{DestConnectionID: 4370bf89, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.392ms} 2025/04/30 11:59:43 server newly acked packets (1): [0] 2025/04/30 11:59:43 server updated RTT: 33.134ms (σ: 9.336ms) 2025/04/30 11:59:43 server <- Reading packet 2 (1352 bytes) for connection 4370bf89, 1-RTT 2025/04/30 11:59:43 server Short Header{DestConnectionID: 4370bf89, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:43 server <- &wire.PingFrame{} 2025/04/30 11:59:43 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:43 server -> Sending packet 2 (27 bytes) for connection f25cfcc467c0986c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:43 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:43 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 89.508µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:43 server <- Reading packet 3 (31 bytes) for connection 4370bf89, 1-RTT 2025/04/30 11:59:43 server Short Header{DestConnectionID: 4370bf89, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 21.408ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:43 server newly acked packets (1): [1] 2025/04/30 11:59:43 server updated RTT: 35.525ms (σ: 11.785ms) 2025/04/30 11:59:43 server ECN capability confirmed. 2025/04/30 11:59:43 server Canceling loss detection timer. 2025/04/30 11:59:43 Removing connection ID 19b3484f72ab2b70 after it has been retired. 2025/04/30 11:59:43 server <- Reading packet 7 (42 bytes) for connection 4370bf89, 1-RTT 2025/04/30 11:59:43 server Short Header{DestConnectionID: 4370bf89, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:43 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:43 server <- Reading packet 8 (25 bytes) for connection 4370bf89, 1-RTT 2025/04/30 11:59:43 server Short Header{DestConnectionID: 4370bf89, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:43 server <- &wire.PingFrame{} 2025/04/30 11:59:43 server -> Sending packet 3 (1366 bytes) for connection f25cfcc467c0986c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:43 Received request: GET /cshhtxhled 2025/04/30 11:59:43 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:43 server -> &wire.PingFrame{} 2025/04/30 11:59:43 server -> Sending packet 4 (29 bytes) for connection f25cfcc467c0986c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:43 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:43 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 1}}, DelayTime: 252.432µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:43 server -> Sending packet 5 (1045 bytes) for connection f25cfcc467c0986c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:43 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:43 server <- Reading packet 9 (30 bytes) for connection 4370bf89, 1-RTT 2025/04/30 11:59:43 server Short Header{DestConnectionID: 4370bf89, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:43 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 80µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:43 server newly acked packets (1): [3] 2025/04/30 11:59:43 server updated RTT: 35.101ms (σ: 9.685ms) 2025/04/30 11:59:43 server <- Reading packet 10 (1392 bytes) for connection 4370bf89, 1-RTT 2025/04/30 11:59:43 server Short Header{DestConnectionID: 4370bf89, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:43 server <- &wire.PingFrame{} 2025/04/30 11:59:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:43 server <- Reading packet 11 (41 bytes) for connection 4370bf89, 1-RTT 2025/04/30 11:59:43 server Short Header{DestConnectionID: 4370bf89, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:43 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 176µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:43 server newly acked packets (1): [5] 2025/04/30 11:59:43 server updated RTT: 34.861ms (σ: 7.743ms) 2025/04/30 11:59:43 server Canceling loss detection timer. 2025/04/30 11:59:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:43 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:43 Replacing connection for connection IDs [4370bf89 02089d43 4d110dc8 225c0610 4e9e3a3d dee6322f] with a closed connection. 2025/04/30 11:59:43 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:43 server Connection f25cfcc467c0986c closed. 2025/04/30 11:59:43 Removing connection IDs [47ba1949 1a86a77d 06ed9faa 4bef2660 dbc9eea9 ca42994e] for a closed connection after it has been retired. 2025/04/30 11:59:44 server <- Received Initial packet. 2025/04/30 11:59:44 Created qlog file: /logs/qlog/758a4dc04aba79b3.sqlog 2025/04/30 11:59:44 server Changing connection ID to d6aeed83. 2025/04/30 11:59:44 Adding connection IDs 758a4dc04aba79b3 and d6aeed83 for a new connection. 2025/04/30 11:59:44 server <- Reading packet 0 (1252 bytes) for connection 758a4dc04aba79b3, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: 758a4dc04aba79b3, SrcConnectionID: (empty), Token: 0xd89d593ce97e14862e2fb87f4d91867c42add5c1cea71f1dc824b968cbc751a5c0fd0cf975e0352c81d17c292c01b81f21b6121d4490a6080420d635915d56e99631d39634725184d0155349869bc6269b8abe9109a8, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:44 server -> Sending packet 0 (40 bytes) for connection 758a4dc04aba79b3, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6aeed83, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:44 server <- Reading packet 1 (708 bytes) for connection 758a4dc04aba79b3, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: 758a4dc04aba79b3, SrcConnectionID: (empty), Token: 0xd89d593ce97e14862e2fb87f4d91867c42add5c1cea71f1dc824b968cbc751a5c0fd0cf975e0352c81d17c292c01b81f21b6121d4490a6080420d635915d56e99631d39634725184d0155349869bc6269b8abe9109a8, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:44 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:44 Adding connection ID a6319255. 2025/04/30 11:59:44 Adding connection ID d0959165. 2025/04/30 11:59:44 Adding connection ID f8de227e. 2025/04/30 11:59:44 Adding connection ID d6213e00. 2025/04/30 11:59:44 Adding connection ID 95ec2918. 2025/04/30 11:59:44 server coalesced packet has different destination connection ID: 00000000, expected 758a4dc04aba79b3 2025/04/30 11:59:44 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 758a4dc04aba79b3 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6aeed83, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 937, Version: v1} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d6aeed83, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f8de227e, StatelessResetToken: 0x159d39d3dd88284398f055423ac2d1a6} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d6213e00, StatelessResetToken: 0x6724fb973024b78bb9609fd9a387fee5} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0959165, StatelessResetToken: 0x5abe00c0daac599b408a7fd5bf8e1af2} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 95ec2918, StatelessResetToken: 0xd94d2c578d5cf2e7fd4df5801d338a37} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6319255, StatelessResetToken: 0xaaa352c90db5ce16c40ca11865e2821b} 2025/04/30 11:59:44 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:59:44 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:44 server -> Sending packet 2 (1280 bytes) for connection 758a4dc04aba79b3, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6aeed83, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:44 server -> Sending packet 3 (1280 bytes) for connection 758a4dc04aba79b3, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6aeed83, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:44 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:59:44 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:44 server -> Sending packet 1 (190 bytes) for connection 758a4dc04aba79b3, Handshake 2025/04/30 11:59:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d6aeed83, PacketNumber: 1, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:44 server -> Sending packet 2 (190 bytes) for connection 758a4dc04aba79b3, Handshake 2025/04/30 11:59:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d6aeed83, PacketNumber: 2, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 11:59:44 server <- Reading packet 1 (74 bytes) for connection d6aeed83, Handshake 2025/04/30 11:59:44 server Long Header{Type: Handshake, DestConnectionID: d6aeed83, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:59:44 server Dropping Initial keys. 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs} 2025/04/30 11:59:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:44 Retiring connection ID 758a4dc04aba79b3 in 5s. 2025/04/30 11:59:44 server Dropping Handshake keys. 2025/04/30 11:59:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:44 server -> Sending packet 2 (371 bytes) for connection 758a4dc04aba79b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 95ec2918, StatelessResetToken: 0xd94d2c578d5cf2e7fd4df5801d338a37} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6319255, StatelessResetToken: 0xaaa352c90db5ce16c40ca11865e2821b} 2025/04/30 11:59:44 server -> &wire.NewTokenFrame{Token: 0xc3980ba1a8d8575cc6e3f72582bc6108b5a706e5e72061047530a79cc2abd6d299a6684591263f193434aa6356fcc63cf557aa49aa5551d2162b568ce42ff07666a0422a7486c1091138a8c222756c3d5f17ffbe782b} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f8de227e, StatelessResetToken: 0x159d39d3dd88284398f055423ac2d1a6} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0959165, StatelessResetToken: 0x5abe00c0daac599b408a7fd5bf8e1af2} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d6213e00, StatelessResetToken: 0x6724fb973024b78bb9609fd9a387fee5} 2025/04/30 11:59:44 server -> Sending packet 3 (371 bytes) for connection 758a4dc04aba79b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d6213e00, StatelessResetToken: 0x6724fb973024b78bb9609fd9a387fee5} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:44 server -> &wire.NewTokenFrame{Token: 0xc3980ba1a8d8575cc6e3f72582bc6108b5a706e5e72061047530a79cc2abd6d299a6684591263f193434aa6356fcc63cf557aa49aa5551d2162b568ce42ff07666a0422a7486c1091138a8c222756c3d5f17ffbe782b} 2025/04/30 11:59:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a6319255, StatelessResetToken: 0xaaa352c90db5ce16c40ca11865e2821b} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f8de227e, StatelessResetToken: 0x159d39d3dd88284398f055423ac2d1a6} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0959165, StatelessResetToken: 0x5abe00c0daac599b408a7fd5bf8e1af2} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 95ec2918, StatelessResetToken: 0xd94d2c578d5cf2e7fd4df5801d338a37} 2025/04/30 11:59:44 server <- Reading packet 0 (42 bytes) for connection d6aeed83, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: d6aeed83, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:44 server <- Reading packet 1 (28 bytes) for connection d6aeed83, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: d6aeed83, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.104ms} 2025/04/30 11:59:44 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:59:44 server -> Sending packet 4 (28 bytes) for connection 758a4dc04aba79b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 47.733796ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:44 Received request: GET /imofyehlkk 2025/04/30 11:59:44 server -> Sending packet 5 (1045 bytes) for connection 758a4dc04aba79b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:44 server <- Reading packet 2 (1352 bytes) for connection d6aeed83, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: d6aeed83, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 256µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server <- &wire.PingFrame{} 2025/04/30 11:59:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:44 server <- Reading packet 4 (33 bytes) for connection d6aeed83, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: d6aeed83, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 21.304ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server newly acked packets (1): [3] 2025/04/30 11:59:44 server updated RTT: 52.76639ms (σ: 26.383195ms) 2025/04/30 11:59:44 server ECN capability confirmed. 2025/04/30 11:59:44 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:44 server -> Sending packet 6 (30 bytes) for connection 758a4dc04aba79b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 5.158517ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:44 Removing connection ID d810ec50a793ddff after it has been retired. 2025/04/30 11:59:44 server <- Reading packet 6 (25 bytes) for connection d6aeed83, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: d6aeed83, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.PingFrame{} 2025/04/30 11:59:44 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:44 server -> Sending packet 7 (31 bytes) for connection 758a4dc04aba79b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 114.635µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server <- Reading packet 7 (1392 bytes) for connection d6aeed83, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: d6aeed83, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.PingFrame{} 2025/04/30 11:59:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:44 server -> Sending packet 9 (1058 bytes) for connection 758a4dc04aba79b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 5.148684ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:44 server -> Sending packet 10 (1045 bytes) for connection 758a4dc04aba79b3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:44 server <- Reading packet 8 (1444 bytes) for connection d6aeed83, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: d6aeed83, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 64µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server <- &wire.PingFrame{} 2025/04/30 11:59:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:44 server <- Reading packet 9 (43 bytes) for connection d6aeed83, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: d6aeed83, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 304µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:44 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:44 Replacing connection for connection IDs [f8de227e d6213e00 95ec2918 d6aeed83 a6319255 d0959165] with a closed connection. 2025/04/30 11:59:44 server Connection 758a4dc04aba79b3 closed. 2025/04/30 11:59:44 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:44 Removing connection IDs [a817c516 0486c139 74c9190f 8d6d948d af3f01b4 ecb91770] for a closed connection after it has been retired. 2025/04/30 11:59:44 server <- Received Initial packet. 2025/04/30 11:59:44 Created qlog file: /logs/qlog/b1709d68bf76909f.sqlog 2025/04/30 11:59:44 server Changing connection ID to 8565c24d. 2025/04/30 11:59:44 Adding connection IDs b1709d68bf76909f and 8565c24d for a new connection. 2025/04/30 11:59:44 server <- Reading packet 0 (1252 bytes) for connection b1709d68bf76909f, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: b1709d68bf76909f, SrcConnectionID: (empty), Token: 0xc3980ba1a8d8575cc6e3f72582bc6108b5a706e5e72061047530a79cc2abd6d299a6684591263f193434aa6356fcc63cf557aa49aa5551d2162b568ce42ff07666a0422a7486c1091138a8c222756c3d5f17ffbe782b, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:44 server -> Sending packet 0 (40 bytes) for connection b1709d68bf76909f, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8565c24d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:44 server <- Reading packet 1 (708 bytes) for connection b1709d68bf76909f, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: b1709d68bf76909f, SrcConnectionID: (empty), Token: 0xc3980ba1a8d8575cc6e3f72582bc6108b5a706e5e72061047530a79cc2abd6d299a6684591263f193434aa6356fcc63cf557aa49aa5551d2162b568ce42ff07666a0422a7486c1091138a8c222756c3d5f17ffbe782b, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:44 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:44 Adding connection ID fec9258d. 2025/04/30 11:59:44 Adding connection ID 5e3165cb. 2025/04/30 11:59:44 Adding connection ID 029cb8d0. 2025/04/30 11:59:44 Adding connection ID eea66dda. 2025/04/30 11:59:44 Adding connection ID f63e702d. 2025/04/30 11:59:44 server coalesced packet has different destination connection ID: 00000000, expected b1709d68bf76909f 2025/04/30 11:59:44 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b1709d68bf76909f 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8565c24d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 941, Version: v1} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8565c24d, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 029cb8d0, StatelessResetToken: 0x3607c4193260d88bed663328ebf8fbfb} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fec9258d, StatelessResetToken: 0x79f6f99beb65d29addbb3f1cab33c6f6} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5e3165cb, StatelessResetToken: 0xe1cc6bed54bab903c74a6c7b7d0989f9} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: eea66dda, StatelessResetToken: 0x7d25b71f3abbbc2731c12ebae1909b2b} 2025/04/30 11:59:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f63e702d, StatelessResetToken: 0x9af3a6047da7cd1be8aa658cb02ecc84} 2025/04/30 11:59:44 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:44 server <- Reading packet 2 (124 bytes) for connection 8565c24d, Initial 2025/04/30 11:59:44 server Long Header{Type: Initial, DestConnectionID: 8565c24d, SrcConnectionID: (empty), Token: 0xc3980ba1a8d8575cc6e3f72582bc6108b5a706e5e72061047530a79cc2abd6d299a6684591263f193434aa6356fcc63cf557aa49aa5551d2162b568ce42ff07666a0422a7486c1091138a8c222756c3d5f17ffbe782b, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 848µs} 2025/04/30 11:59:44 server newly acked packets (1): [1] 2025/04/30 11:59:44 server updated RTT: 32.920616ms (σ: 16.460308ms) 2025/04/30 11:59:44 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:44 server <- Reading packet 0 (75 bytes) for connection 8565c24d, Handshake 2025/04/30 11:59:44 server Long Header{Type: Handshake, DestConnectionID: 8565c24d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:44 server Dropping Initial keys. 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 848µs} 2025/04/30 11:59:44 server newly acked packets (1): [0] 2025/04/30 11:59:44 server updated RTT: 32.92ms (σ: 12.345ms) 2025/04/30 11:59:44 server Canceling loss detection timer. 2025/04/30 11:59:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:44 Retiring connection ID b1709d68bf76909f in 5s. 2025/04/30 11:59:44 server Dropping Handshake keys. 2025/04/30 11:59:44 server <- Reading packet 0 (42 bytes) for connection 8565c24d, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: 8565c24d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:44 server -> Sending packet 1 (259 bytes) for connection b1709d68bf76909f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 258.844µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:44 server -> &wire.NewTokenFrame{Token: 0x2eedcc15c85f0e1ae25464e0859aec6b62c3df48652a43cd1b16f817a376c6a779443241e69def678538d6536f2e53ff935dbf7b63201af40de7ca57e0eed150d3f8e043b60f56b7dd6252a060e65025157339ae9f70} 2025/04/30 11:59:44 Received request: GET /tdddybuwhp 2025/04/30 11:59:44 server -> Sending packet 2 (1045 bytes) for connection b1709d68bf76909f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:44 server <- Reading packet 1 (28 bytes) for connection 8565c24d, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: 8565c24d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.288ms} 2025/04/30 11:59:44 server newly acked packets (1): [0] 2025/04/30 11:59:44 server updated RTT: 32.931ms (σ: 9.282ms) 2025/04/30 11:59:44 server <- Reading packet 2 (1352 bytes) for connection 8565c24d, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: 8565c24d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.PingFrame{} 2025/04/30 11:59:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:44 server <- Reading packet 3 (31 bytes) for connection 8565c24d, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: 8565c24d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 21.392ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server newly acked packets (1): [1] 2025/04/30 11:59:44 server updated RTT: 35.339ms (σ: 11.779ms) 2025/04/30 11:59:44 server ECN capability confirmed. 2025/04/30 11:59:44 server Ignoring all packets below 1. 2025/04/30 11:59:44 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:44 server -> Sending packet 3 (28 bytes) for connection b1709d68bf76909f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 5.170695ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server <- Reading packet 4 (1392 bytes) for connection 8565c24d, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: 8565c24d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.PingFrame{} 2025/04/30 11:59:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:44 server -> Sending packet 5 (1054 bytes) for connection b1709d68bf76909f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 14.25552ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:44 server -> Sending packet 6 (1045 bytes) for connection b1709d68bf76909f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:44 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:44 server <- Reading packet 5 (1444 bytes) for connection 8565c24d, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: 8565c24d, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server <- &wire.PingFrame{} 2025/04/30 11:59:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:44 server <- Reading packet 6 (43 bytes) for connection 8565c24d, 1-RTT 2025/04/30 11:59:44 server Short Header{DestConnectionID: 8565c24d, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:44 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 304µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:44 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:44 Replacing connection for connection IDs [5e3165cb 029cb8d0 eea66dda f63e702d 8565c24d fec9258d] with a closed connection. 2025/04/30 11:59:44 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:44 server Connection b1709d68bf76909f closed. 2025/04/30 11:59:44 Removing connection ID 1e097868a7eb88d3ab after it has been retired. 2025/04/30 11:59:44 Removing connection IDs [ed002f03 5aa83a30 91965231 1e4457f5 c45267e4 db5a9042] for a closed connection after it has been retired. 2025/04/30 11:59:45 server <- Received Initial packet. 2025/04/30 11:59:45 Created qlog file: /logs/qlog/35e9f799fb50906e.sqlog 2025/04/30 11:59:45 server Changing connection ID to d580e668. 2025/04/30 11:59:45 Adding connection IDs 35e9f799fb50906e and d580e668 for a new connection. 2025/04/30 11:59:45 server <- Reading packet 0 (1252 bytes) for connection 35e9f799fb50906e, Initial 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: 35e9f799fb50906e, SrcConnectionID: (empty), Token: 0x2eedcc15c85f0e1ae25464e0859aec6b62c3df48652a43cd1b16f817a376c6a779443241e69def678538d6536f2e53ff935dbf7b63201af40de7ca57e0eed150d3f8e043b60f56b7dd6252a060e65025157339ae9f70, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:45 server -> Sending packet 0 (40 bytes) for connection 35e9f799fb50906e, Initial 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d580e668, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:59:45 server <- Reading packet 1 (708 bytes) for connection 35e9f799fb50906e, Initial 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: 35e9f799fb50906e, SrcConnectionID: (empty), Token: 0x2eedcc15c85f0e1ae25464e0859aec6b62c3df48652a43cd1b16f817a376c6a779443241e69def678538d6536f2e53ff935dbf7b63201af40de7ca57e0eed150d3f8e043b60f56b7dd6252a060e65025157339ae9f70, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:45 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:45 Adding connection ID 632b7d8a. 2025/04/30 11:59:45 Adding connection ID 99c40495. 2025/04/30 11:59:45 Adding connection ID 572b59e0. 2025/04/30 11:59:45 Adding connection ID 3e7ac4da. 2025/04/30 11:59:45 Adding connection ID 404bf929. 2025/04/30 11:59:45 server coalesced packet has different destination connection ID: 00000000, expected 35e9f799fb50906e 2025/04/30 11:59:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 35e9f799fb50906e 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d580e668, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 941, Version: v1} 2025/04/30 11:59:45 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d580e668, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:59:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 632b7d8a, StatelessResetToken: 0x6ebffa29aee1c158d7b5cedd653bc5b4} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3e7ac4da, StatelessResetToken: 0x5129bdf35706e1b6ffcc3c8d1a5a48ae} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 572b59e0, StatelessResetToken: 0x729a333dfc0d9da11fe71d16eef82de5} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 404bf929, StatelessResetToken: 0x0bb5ec629920440b347de8d3c000ecf0} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99c40495, StatelessResetToken: 0xa0bc2ccc5b493b94bcd4f51e06ade5e2} 2025/04/30 11:59:45 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:45 server <- Reading packet 2 (124 bytes) for connection d580e668, Initial 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: d580e668, SrcConnectionID: (empty), Token: 0x2eedcc15c85f0e1ae25464e0859aec6b62c3df48652a43cd1b16f817a376c6a779443241e69def678538d6536f2e53ff935dbf7b63201af40de7ca57e0eed150d3f8e043b60f56b7dd6252a060e65025157339ae9f70, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 736µs} 2025/04/30 11:59:45 server newly acked packets (1): [1] 2025/04/30 11:59:45 server updated RTT: 32.53711ms (σ: 16.268555ms) 2025/04/30 11:59:45 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:45 server <- Reading packet 0 (75 bytes) for connection d580e668, Handshake 2025/04/30 11:59:45 server Long Header{Type: Handshake, DestConnectionID: d580e668, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:45 server Dropping Initial keys. 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 736µs} 2025/04/30 11:59:45 server newly acked packets (1): [0] 2025/04/30 11:59:45 server updated RTT: 32.537ms (σ: 12.201ms) 2025/04/30 11:59:45 server Canceling loss detection timer. 2025/04/30 11:59:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:45 Retiring connection ID 35e9f799fb50906e in 5s. 2025/04/30 11:59:45 server Dropping Handshake keys. 2025/04/30 11:59:45 server -> Sending packet 1 (251 bytes) for connection 35e9f799fb50906e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.NewTokenFrame{Token: 0x56f5859695990df5aad2db02d4cfd77ccc6aa14f15692fa3ac03fe90a15b94b68f0935842191b79cd823b5d943d6c533be394dc8887466c132ff42a8732fd71929233a7637fea5419797687a473d8a50395eee79deb7} 2025/04/30 11:59:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:45 server <- Reading packet 0 (42 bytes) for connection d580e668, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: d580e668, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:45 server -> Sending packet 2 (27 bytes) for connection 35e9f799fb50906e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 236.179µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:45 Received request: GET /nxzbhqboha 2025/04/30 11:59:45 server -> Sending packet 3 (1045 bytes) for connection 35e9f799fb50906e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:45 server <- Reading packet 2 (1352 bytes) for connection d580e668, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: d580e668, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.PingFrame{} 2025/04/30 11:59:45 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:45 server -> Sending packet 4 (29 bytes) for connection 35e9f799fb50906e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 86.633µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server <- Reading packet 3 (30 bytes) for connection d580e668, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: d580e668, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server newly acked packets (3): [0 1 3] 2025/04/30 11:59:45 server updated RTT: 32.464ms (σ: 9.295ms) 2025/04/30 11:59:45 server ECN capability confirmed. 2025/04/30 11:59:45 server Canceling loss detection timer. 2025/04/30 11:59:45 server <- Reading packet 4 (41 bytes) for connection d580e668, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: d580e668, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 176µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:45 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:45 Replacing connection for connection IDs [99c40495 572b59e0 3e7ac4da 404bf929 d580e668 632b7d8a] with a closed connection. 2025/04/30 11:59:45 server Connection 35e9f799fb50906e closed. 2025/04/30 11:59:45 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:45 Tracking 41 connection IDs and 0 reset tokens. 2025/04/30 11:59:45 server <- Received Initial packet. 2025/04/30 11:59:45 Created qlog file: /logs/qlog/8b4e8d465e2330f1.sqlog 2025/04/30 11:59:45 server Changing connection ID to bc527392. 2025/04/30 11:59:45 Adding connection IDs 8b4e8d465e2330f1 and bc527392 for a new connection. 2025/04/30 11:59:45 server <- Reading packet 0 (1252 bytes) for connection 8b4e8d465e2330f1, Initial 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: 8b4e8d465e2330f1, SrcConnectionID: (empty), Token: 0x56f5859695990df5aad2db02d4cfd77ccc6aa14f15692fa3ac03fe90a15b94b68f0935842191b79cd823b5d943d6c533be394dc8887466c132ff42a8732fd71929233a7637fea5419797687a473d8a50395eee79deb7, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:59:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:59:45 server -> Sending packet 0 (40 bytes) for connection 8b4e8d465e2330f1, Initial 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bc527392, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:59:45 server <- Reading packet 3 (704 bytes) for connection bc527392, Initial 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: bc527392, SrcConnectionID: (empty), Token: 0x56f5859695990df5aad2db02d4cfd77ccc6aa14f15692fa3ac03fe90a15b94b68f0935842191b79cd823b5d943d6c533be394dc8887466c132ff42a8732fd71929233a7637fea5419797687a473d8a50395eee79deb7, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:59:45 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:59:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:45 Adding connection ID 45802bf0. 2025/04/30 11:59:45 Adding connection ID 4e7e07a5. 2025/04/30 11:59:45 Adding connection ID e13fe7a7. 2025/04/30 11:59:45 Adding connection ID 40ba97a8. 2025/04/30 11:59:45 Adding connection ID e89e1d0b. 2025/04/30 11:59:45 server coalesced packet has different destination connection ID: 00000000, expected bc527392 2025/04/30 11:59:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8b4e8d465e2330f1 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bc527392, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 935, Version: v1} 2025/04/30 11:59:45 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bc527392, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:59:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40ba97a8, StatelessResetToken: 0xfe207c6cffa1429cd14a548e68d3fb3f} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4e7e07a5, StatelessResetToken: 0x06cb7caa53c12b8e0dd4dfde6eebc076} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e13fe7a7, StatelessResetToken: 0x82a1c4593c618a8a919d76ec91679954} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e89e1d0b, StatelessResetToken: 0x1136f4da0002a44e5bcb97ca173a643e} 2025/04/30 11:59:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 45802bf0, StatelessResetToken: 0x8a9eecb9ea91751795f1cd2e2f6c72c9} 2025/04/30 11:59:45 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:59:45 server <- Reading packet 4 (124 bytes) for connection bc527392, Initial 2025/04/30 11:59:45 server Long Header{Type: Initial, DestConnectionID: bc527392, SrcConnectionID: (empty), Token: 0x56f5859695990df5aad2db02d4cfd77ccc6aa14f15692fa3ac03fe90a15b94b68f0935842191b79cd823b5d943d6c533be394dc8887466c132ff42a8732fd71929233a7637fea5419797687a473d8a50395eee79deb7, PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 912µs} 2025/04/30 11:59:45 server newly acked packets (1): [1] 2025/04/30 11:59:45 server updated RTT: 32.990248ms (σ: 16.495124ms) 2025/04/30 11:59:45 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:59:45 server <- Reading packet 0 (75 bytes) for connection bc527392, Handshake 2025/04/30 11:59:45 server Long Header{Type: Handshake, DestConnectionID: bc527392, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:59:45 server Dropping Initial keys. 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 912µs} 2025/04/30 11:59:45 server newly acked packets (1): [0] 2025/04/30 11:59:45 server updated RTT: 32.99ms (σ: 12.371ms) 2025/04/30 11:59:45 server Canceling loss detection timer. 2025/04/30 11:59:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:45 Retiring connection ID 8b4e8d465e2330f1 in 5s. 2025/04/30 11:59:45 server Dropping Handshake keys. 2025/04/30 11:59:45 server <- Reading packet 0 (42 bytes) for connection bc527392, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: bc527392, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:45 server -> Sending packet 1 (259 bytes) for connection 8b4e8d465e2330f1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 358.772µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server -> &wire.NewTokenFrame{Token: 0x68fcf6efe5f0eed799cc0ca977f33b9d478b1a8e88989dc0bad0351b524ea17f3eba8e86d235484d240e06320974f867d31e46a45d362ffda49206543e21650e4ff84fd9681f0a851345d2c37b27ec53fcff949d57b4} 2025/04/30 11:59:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:45 Received request: GET /ptnekwnpjc 2025/04/30 11:59:45 server -> Sending packet 2 (1045 bytes) for connection 8b4e8d465e2330f1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:45 server <- Reading packet 1 (28 bytes) for connection bc527392, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: bc527392, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.392ms} 2025/04/30 11:59:45 server newly acked packets (1): [0] 2025/04/30 11:59:45 server updated RTT: 35.395ms (σ: 14.089ms) 2025/04/30 11:59:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:45 server -> Sending packet 4 (251 bytes) for connection 8b4e8d465e2330f1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.NewTokenFrame{Token: 0x68fcf6efe5f0eed799cc0ca977f33b9d478b1a8e88989dc0bad0351b524ea17f3eba8e86d235484d240e06320974f867d31e46a45d362ffda49206543e21650e4ff84fd9681f0a851345d2c37b27ec53fcff949d57b4} 2025/04/30 11:59:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:45 server Skipping packet number 3 2025/04/30 11:59:45 server -> Sending packet 5 (1045 bytes) for connection 8b4e8d465e2330f1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:45 server <- Reading packet 5 (25 bytes) for connection bc527392, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: bc527392, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.PingFrame{} 2025/04/30 11:59:45 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:59:45 server -> Sending packet 6 (29 bytes) for connection 8b4e8d465e2330f1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 115.005µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server <- Reading packet 6 (32 bytes) for connection bc527392, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: bc527392, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server newly acked packets (1): [5] 2025/04/30 11:59:45 server updated RTT: 34.982ms (σ: 11.391ms) 2025/04/30 11:59:45 server ECN capability confirmed. 2025/04/30 11:59:45 server setting loss timer for packet 4 (1-RTT) to 39.35475ms (in 2025-04-30 11:59:45.886323363 +0000 UTC m=+36.654187498) 2025/04/30 11:59:45 server -> Sending packet 7 (22 bytes) for connection 8b4e8d465e2330f1, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:45 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:59:45 server <- Reading packet 7 (43 bytes) for connection bc527392, 1-RTT 2025/04/30 11:59:45 server Short Header{DestConnectionID: bc527392, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:45 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 328µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:45 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:45 Replacing connection for connection IDs [40ba97a8 e89e1d0b bc527392 45802bf0 4e7e07a5 e13fe7a7] with a closed connection. 2025/04/30 11:59:45 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:45 server Connection 8b4e8d465e2330f1 closed. 2025/04/30 11:59:46 server <- Received Initial packet. 2025/04/30 11:59:46 Created qlog file: /logs/qlog/e38e768d6fc1194334.sqlog 2025/04/30 11:59:46 server Changing connection ID to b736ed42. 2025/04/30 11:59:46 Adding connection IDs e38e768d6fc1194334 and b736ed42 for a new connection. 2025/04/30 11:59:46 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:59:46 server <- Reading packet 1 (710 bytes) for connection e38e768d6fc1194334, Initial 2025/04/30 11:59:46 server Long Header{Type: Initial, DestConnectionID: e38e768d6fc1194334, SrcConnectionID: (empty), Token: 0x68fcf6efe5f0eed799cc0ca977f33b9d478b1a8e88989dc0bad0351b524ea17f3eba8e86d235484d240e06320974f867d31e46a45d362ffda49206543e21650e4ff84fd9681f0a851345d2c37b27ec53fcff949d57b4, PacketNumber: 1, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:59:46 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:59:46 server coalesced packet has different destination connection ID: 00000000, expected e38e768d6fc1194334 2025/04/30 11:59:46 server -> Sending packet 0 (40 bytes) for connection e38e768d6fc1194334, Initial 2025/04/30 11:59:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b736ed42, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:59:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:46 server Parsed a coalesced packet. Part 1: 1247 bytes. Remaining: 5 bytes. 2025/04/30 11:59:46 server <- Reading packet 2 (1247 bytes) for connection b736ed42, Initial 2025/04/30 11:59:46 server Long Header{Type: Initial, DestConnectionID: b736ed42, SrcConnectionID: (empty), Token: 0x68fcf6efe5f0eed799cc0ca977f33b9d478b1a8e88989dc0bad0351b524ea17f3eba8e86d235484d240e06320974f867d31e46a45d362ffda49206543e21650e4ff84fd9681f0a851345d2c37b27ec53fcff949d57b4, PacketNumber: 2, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:59:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:59:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:59:46 Adding connection ID 04f8373f. 2025/04/30 11:59:46 Adding connection ID 48cb3669. 2025/04/30 11:59:46 Adding connection ID 992c0f72. 2025/04/30 11:59:46 Adding connection ID a3af490e. 2025/04/30 11:59:46 Adding connection ID bd8da746. 2025/04/30 11:59:46 server coalesced packet has different destination connection ID: 00000000, expected b736ed42 2025/04/30 11:59:46 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e38e768d6fc1194334 2025/04/30 11:59:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b736ed42, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 932, Version: v1} 2025/04/30 11:59:46 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b736ed42, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:46 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 48cb3669, StatelessResetToken: 0xda6485d8d1ece2759119935a35aa4bdd} 2025/04/30 11:59:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 04f8373f, StatelessResetToken: 0xf384e40c5aab68eb4740d5376f239f0b} 2025/04/30 11:59:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a3af490e, StatelessResetToken: 0x3ee6cb843d884f3b9799f3dffeb74326} 2025/04/30 11:59:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 992c0f72, StatelessResetToken: 0x0dcb178171b665b4fece2e3aebfe7472} 2025/04/30 11:59:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: bd8da746, StatelessResetToken: 0xb0e6b185d2c841d5f9491e5629375585} 2025/04/30 11:59:46 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:59:46 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:59:46 server -> Sending packet 2 (1280 bytes) for connection e38e768d6fc1194334, Initial 2025/04/30 11:59:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b736ed42, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:46 server -> Sending packet 3 (1280 bytes) for connection e38e768d6fc1194334, Initial 2025/04/30 11:59:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b736ed42, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:59:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:59:46 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:59:46 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:59:46 server -> Sending packet 1 (195 bytes) for connection e38e768d6fc1194334, Handshake 2025/04/30 11:59:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b736ed42, PacketNumber: 1, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:46 server -> Sending packet 2 (195 bytes) for connection e38e768d6fc1194334, Handshake 2025/04/30 11:59:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b736ed42, PacketNumber: 2, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:59:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:59:46 server <- Reading packet 1 (76 bytes) for connection b736ed42, Handshake 2025/04/30 11:59:46 server Long Header{Type: Handshake, DestConnectionID: b736ed42, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 11:59:46 server Dropping Initial keys. 2025/04/30 11:59:46 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/04/30 11:59:46 server newly acked packets (1): [2] 2025/04/30 11:59:46 server updated RTT: 31.175887ms (σ: 15.587943ms) 2025/04/30 11:59:46 server Canceling loss detection timer. 2025/04/30 11:59:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:59:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:59:46 Retiring connection ID e38e768d6fc1194334 in 5s. 2025/04/30 11:59:46 server Dropping Handshake keys. 2025/04/30 11:59:46 server -> Sending packet 1 (251 bytes) for connection e38e768d6fc1194334, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:46 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:59:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:59:46 server -> &wire.NewTokenFrame{Token: 0xc72649f7209090f003c14e20c3dc88bd735d8159d053bc93fb82c955cb119350a7dc1b50e2d1ba61bf9610150c46f3872b4363bc2157ff7fc0fcbab27c173bb4648591ca6bfd9070c20fdf0d943ba51091d489c4c9a6} 2025/04/30 11:59:46 server <- Reading packet 0 (42 bytes) for connection b736ed42, 1-RTT 2025/04/30 11:59:46 server Short Header{DestConnectionID: b736ed42, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:59:46 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:59:46 server <- Reading packet 1 (28 bytes) for connection b736ed42, 1-RTT 2025/04/30 11:59:46 server Short Header{DestConnectionID: b736ed42, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.224ms} 2025/04/30 11:59:46 server newly acked packets (1): [0] 2025/04/30 11:59:46 server updated RTT: 31.398ms (σ: 12.136ms) 2025/04/30 11:59:46 server -> Sending packet 2 (28 bytes) for connection e38e768d6fc1194334, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:46 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 46.721782ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:59:46 Received request: GET /xluryhtgqd 2025/04/30 11:59:46 server -> Sending packet 3 (1045 bytes) for connection e38e768d6fc1194334, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:46 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:46 server <- Reading packet 2 (1352 bytes) for connection b736ed42, 1-RTT 2025/04/30 11:59:46 server Short Header{DestConnectionID: b736ed42, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:46 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 288µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:59:46 server newly acked packets (1): [1] 2025/04/30 11:59:46 server updated RTT: 31.5ms (σ: 9.306ms) 2025/04/30 11:59:46 server ECN capability confirmed. 2025/04/30 11:59:46 server <- &wire.PingFrame{} 2025/04/30 11:59:46 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:46 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:46 server -> Sending packet 4 (28 bytes) for connection e38e768d6fc1194334, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:46 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:46 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.408963ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:59:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:59:46 server -> Sending packet 6 (1045 bytes) for connection e38e768d6fc1194334, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:46 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:46 server -> Sending packet 7 (1045 bytes) for connection e38e768d6fc1194334, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:46 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:59:46 server <- Reading packet 3 (1392 bytes) for connection b736ed42, 1-RTT 2025/04/30 11:59:46 server Short Header{DestConnectionID: b736ed42, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:46 server <- &wire.PingFrame{} 2025/04/30 11:59:46 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:59:46 server Sending ACK because the ACK timer expired. 2025/04/30 11:59:46 server -> Sending packet 8 (28 bytes) for connection e38e768d6fc1194334, 1-RTT (ECN: ECT(0)) 2025/04/30 11:59:46 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:59:46 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 25.260323ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:46 server <- Reading packet 5 (45 bytes) for connection b736ed42, 1-RTT 2025/04/30 11:59:46 server Short Header{DestConnectionID: b736ed42, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:59:46 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 320µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:59:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:59:46 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:46 Replacing connection for connection IDs [bd8da746 b736ed42 04f8373f 48cb3669 992c0f72 a3af490e] with a closed connection. 2025/04/30 11:59:46 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:59:46 server Connection e38e768d6fc1194334 closed. 2025/04/30 11:59:47 Removing connection ID 388293917e816edb after it has been retired. 2025/04/30 11:59:47 Tracking 54 connection IDs and 0 reset tokens. 2025/04/30 11:59:47 Removing connection IDs [a7bdc2bb 6f2e066f e0c79d1b c9a58dcb b3fcbe5e 66c732e0] for a closed connection after it has been retired. 2025/04/30 11:59:48 Removing connection ID f25cfcc467c0986c after it has been retired. 2025/04/30 11:59:48 Removing connection IDs [4370bf89 02089d43 4d110dc8 225c0610 4e9e3a3d dee6322f] for a closed connection after it has been retired. 2025/04/30 11:59:49 Removing connection ID 758a4dc04aba79b3 after it has been retired. 2025/04/30 11:59:49 Tracking 40 connection IDs and 0 reset tokens. 2025/04/30 11:59:49 Removing connection IDs [f8de227e d6213e00 95ec2918 d6aeed83 a6319255 d0959165] for a closed connection after it has been retired. 2025/04/30 11:59:49 Removing connection ID b1709d68bf76909f after it has been retired. 2025/04/30 11:59:49 Removing connection IDs [5e3165cb 029cb8d0 eea66dda f63e702d 8565c24d fec9258d] for a closed connection after it has been retired. 2025/04/30 11:59:50 Removing connection ID 35e9f799fb50906e after it has been retired. 2025/04/30 11:59:50 Removing connection IDs [99c40495 572b59e0 3e7ac4da 404bf929 d580e668 632b7d8a] for a closed connection after it has been retired. 2025/04/30 11:59:50 server Destroying connection: timeout: no recent network activity 2025/04/30 11:59:50 Removing connection ID a88eabd9. 2025/04/30 11:59:50 Removing connection ID 63302c30. 2025/04/30 11:59:50 Removing connection ID 7d9d6824. 2025/04/30 11:59:50 Removing connection ID a9116eda. 2025/04/30 11:59:50 Error accepting stream: timeout: no recent network activity 2025/04/30 11:59:50 Removing connection ID 3483bdf1. 2025/04/30 11:59:50 Removing connection ID a58eecd2. 2025/04/30 11:59:50 server Connection f56f040a6ffbfcce closed. 2025/04/30 11:59:50 Removing connection ID 8b4e8d465e2330f1 after it has been retired. 2025/04/30 11:59:50 Removing connection IDs [40ba97a8 e89e1d0b bc527392 45802bf0 4e7e07a5 e13fe7a7] for a closed connection after it has been retired. 2025/04/30 11:59:51 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 11:59:51 Removing connection ID e38e768d6fc1194334 after it has been retired. 2025/04/30 11:59:51 Removing connection IDs [bd8da746 b736ed42 04f8373f 48cb3669 992c0f72 a3af490e] for a closed connection after it has been retired. 2025/04/30 11:59:53 Tracking 0 connection IDs and 0 reset tokens.