2025/04/30 11:57:55 Increased receive buffer size to 14336 kiB 2025/04/30 11:57:55 Increased send buffer size to 14336 kiB 2025/04/30 11:57:55 Setting DF for IPv4 and IPv6. 2025/04/30 11:57:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:57:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:57:55 server Listening for udp connections on [::]:443 2025/04/30 11:57:56 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:57:56 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:57:56 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:57:56 server <- Received Initial packet. 2025/04/30 11:57:56 Created qlog file: /logs/qlog/3ded2f05ee9098dbac6348e328.sqlog 2025/04/30 11:57:56 server Changing connection ID to 1eb3c79e. 2025/04/30 11:57:56 Adding connection IDs 3ded2f05ee9098dbac6348e328 and 1eb3c79e for a new connection. 2025/04/30 11:57:56 server <- Reading packet 0 (1252 bytes) for connection 3ded2f05ee9098dbac6348e328, Initial 2025/04/30 11:57:56 server Long Header{Type: Initial, DestConnectionID: 3ded2f05ee9098dbac6348e328, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1229, Version: v1} 2025/04/30 11:57:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 1208, Offset + Data length: 1208} 2025/04/30 11:57:56 server -> Sending packet 0 (40 bytes) for connection 3ded2f05ee9098dbac6348e328, Initial 2025/04/30 11:57:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1eb3c79e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:57:56 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server Parsed a coalesced packet. Part 1: 367 bytes. Remaining: 885 bytes. 2025/04/30 11:57:57 server <- Reading packet 3 (367 bytes) for connection 1eb3c79e, Initial 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: 1eb3c79e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 353, Version: v1} 2025/04/30 11:57:57 server <- &wire.CryptoFrame{Offset: 1208, Data length: 331, Offset + Data length: 1539} 2025/04/30 11:57:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:57:57 Adding connection ID 4e691d09. 2025/04/30 11:57:57 Adding connection ID 0807eeb1. 2025/04/30 11:57:57 Adding connection ID af47f070. 2025/04/30 11:57:57 Adding connection ID 53638fc2. 2025/04/30 11:57:57 Adding connection ID 39b0b95f. 2025/04/30 11:57:57 server coalesced packet has different destination connection ID: 00000000, expected 1eb3c79e 2025/04/30 11:57:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ded2f05ee9098dbac6348e328 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1eb3c79e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 383, Version: v1} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:57:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1eb3c79e, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:57:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4e691d09, StatelessResetToken: 0x7ba7887e69f41ddb2069cadedbc2bb84} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0807eeb1, StatelessResetToken: 0x588ac7db113537ed02c7d5b93cc6223d} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 53638fc2, StatelessResetToken: 0xde8ad1ba08e0f39ab4c1405c6e25b5ad} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: af47f070, StatelessResetToken: 0x20be99000c21a3dac34c4363c14b5e95} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 39b0b95f, StatelessResetToken: 0x91dae20068faa17d113f5aa0e136aa50} 2025/04/30 11:57:57 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:57:57 server <- Reading packet 1 (69 bytes) for connection 1eb3c79e, Handshake 2025/04/30 11:57:57 server Long Header{Type: Handshake, DestConnectionID: 1eb3c79e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:57:57 server Dropping Initial keys. 2025/04/30 11:57:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:57:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:57 Retiring connection ID 3ded2f05ee9098dbac6348e328 in 5s. 2025/04/30 11:57:57 server Dropping Handshake keys. 2025/04/30 11:57:57 server <- Reading packet 0 (42 bytes) for connection 1eb3c79e, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 1eb3c79e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:57:57 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:57:57 server -> Sending packet 1 (1366 bytes) for connection 3ded2f05ee9098dbac6348e328, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 Received request: GET /sjrsqrrdms 2025/04/30 11:57:57 server -> &wire.PingFrame{} 2025/04/30 11:57:57 server -> Sending packet 2 (256 bytes) for connection 3ded2f05ee9098dbac6348e328, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 360.745µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:57:57 server -> &wire.NewTokenFrame{Token: 0xe1093c8da123b107908f7b607ed266452084049457bd14b5541a6112ea6ae9c9348092080ef47e76455b8032f6fd9aa17c55025332eba3d1b8ee7762458ca822cc0f8399d9578e1dadb0485e0b4a360c5ad11dc01dc5} 2025/04/30 11:57:57 server -> Sending packet 3 (1045 bytes) for connection 3ded2f05ee9098dbac6348e328, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:57:57 server <- Reading packet 2 (1352 bytes) for connection 1eb3c79e, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 1eb3c79e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 264µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server newly acked packets (2): [0 2] 2025/04/30 11:57:57 server updated RTT: 33.363282ms (σ: 16.681641ms) 2025/04/30 11:57:57 server ECN capability confirmed. 2025/04/30 11:57:57 server setting loss timer for packet 1 (1-RTT) to 37.533692ms (in 2025-04-30 11:57:57.103677185 +0000 UTC m=+1.472557911) 2025/04/30 11:57:57 server <- &wire.PingFrame{} 2025/04/30 11:57:57 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:57:57 server Ignoring all packets below 1. 2025/04/30 11:57:57 server -> Sending packet 4 (27 bytes) for connection 3ded2f05ee9098dbac6348e328, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 138.87µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:57:57.103677185 +0000 UTC m=+1.472557911 2025/04/30 11:57:57 server lost packet 1 (time threshold) 2025/04/30 11:57:57 server <- Reading packet 3 (1392 bytes) for connection 1eb3c79e, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 1eb3c79e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.PingFrame{} 2025/04/30 11:57:57 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:57:57 server Sending ACK because the ACK timer expired. 2025/04/30 11:57:57 server -> Sending packet 5 (28 bytes) for connection 3ded2f05ee9098dbac6348e328, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.29318ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:57:57 server -> Sending packet 7 (1045 bytes) for connection 3ded2f05ee9098dbac6348e328, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:57:57 server -> Sending packet 8 (1045 bytes) for connection 3ded2f05ee9098dbac6348e328, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:57:57 server <- Reading packet 5 (32 bytes) for connection 1eb3c79e, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 1eb3c79e, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 40µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server <- Reading packet 6 (43 bytes) for connection 1eb3c79e, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 1eb3c79e, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 224µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:57:57 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:57 Replacing connection for connection IDs [1eb3c79e 4e691d09 0807eeb1 af47f070 53638fc2 39b0b95f] with a closed connection. 2025/04/30 11:57:57 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:57 server Connection 3ded2f05ee9098dbac6348e328 closed. 2025/04/30 11:57:57 server <- Received Initial packet. 2025/04/30 11:57:57 Created qlog file: /logs/qlog/fffb2fd5f9fd4e17.sqlog 2025/04/30 11:57:57 server Changing connection ID to 99331f15. 2025/04/30 11:57:57 Adding connection IDs fffb2fd5f9fd4e17 and 99331f15 for a new connection. 2025/04/30 11:57:57 server <- Reading packet 0 (1252 bytes) for connection fffb2fd5f9fd4e17, Initial 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: fffb2fd5f9fd4e17, SrcConnectionID: (empty), Token: 0xe1093c8da123b107908f7b607ed266452084049457bd14b5541a6112ea6ae9c9348092080ef47e76455b8032f6fd9aa17c55025332eba3d1b8ee7762458ca822cc0f8399d9578e1dadb0485e0b4a360c5ad11dc01dc5, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:57:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:57:57 server -> Sending packet 0 (40 bytes) for connection fffb2fd5f9fd4e17, Initial 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 99331f15, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server Parsed a coalesced packet. Part 1: 705 bytes. Remaining: 547 bytes. 2025/04/30 11:57:57 server <- Reading packet 1 (705 bytes) for connection fffb2fd5f9fd4e17, Initial 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: fffb2fd5f9fd4e17, SrcConnectionID: (empty), Token: 0xe1093c8da123b107908f7b607ed266452084049457bd14b5541a6112ea6ae9c9348092080ef47e76455b8032f6fd9aa17c55025332eba3d1b8ee7762458ca822cc0f8399d9578e1dadb0485e0b4a360c5ad11dc01dc5, PacketNumber: 1, PacketNumberLen: 1, Length: 600, Version: v1} 2025/04/30 11:57:57 server <- &wire.CryptoFrame{Offset: 1126, Data length: 578, Offset + Data length: 1704} 2025/04/30 11:57:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:57:57 Adding connection ID ed3650fd. 2025/04/30 11:57:57 Adding connection ID 610e2305. 2025/04/30 11:57:57 Adding connection ID 8ca38365. 2025/04/30 11:57:57 Adding connection ID f2b250c5. 2025/04/30 11:57:57 Adding connection ID cdc63b57. 2025/04/30 11:57:57 server coalesced packet has different destination connection ID: 00000000, expected fffb2fd5f9fd4e17 2025/04/30 11:57:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fffb2fd5f9fd4e17 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 99331f15, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 936, Version: v1} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:57:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 99331f15, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:57:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ed3650fd, StatelessResetToken: 0xbe44c24d214943e3533f4f3dde74add6} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f2b250c5, StatelessResetToken: 0xab2d6b454bdf30ccf59658e06e183960} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 610e2305, StatelessResetToken: 0x5e624be671c48873bb50809e130e06b3} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: cdc63b57, StatelessResetToken: 0x1f32904931c748e10bbeee4ef18b0bd0} 2025/04/30 11:57:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8ca38365, StatelessResetToken: 0x0c214b1fd96aa3c0f0d7fcccc8e7f0cd} 2025/04/30 11:57:57 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:57:57 server <- Reading packet 2 (124 bytes) for connection 99331f15, Initial 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: 99331f15, SrcConnectionID: (empty), Token: 0xe1093c8da123b107908f7b607ed266452084049457bd14b5541a6112ea6ae9c9348092080ef47e76455b8032f6fd9aa17c55025332eba3d1b8ee7762458ca822cc0f8399d9578e1dadb0485e0b4a360c5ad11dc01dc5, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:57:57 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 904µs} 2025/04/30 11:57:57 server newly acked packets (1): [1] 2025/04/30 11:57:57 server updated RTT: 32.744053ms (σ: 16.372026ms) 2025/04/30 11:57:57 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:57:57 server <- Reading packet 0 (75 bytes) for connection 99331f15, Handshake 2025/04/30 11:57:57 server Long Header{Type: Handshake, DestConnectionID: 99331f15, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:57:57 server Dropping Initial keys. 2025/04/30 11:57:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 904µs} 2025/04/30 11:57:57 server newly acked packets (1): [0] 2025/04/30 11:57:57 server updated RTT: 32.744ms (σ: 12.279ms) 2025/04/30 11:57:57 server Canceling loss detection timer. 2025/04/30 11:57:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:57:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:57 Retiring connection ID fffb2fd5f9fd4e17 in 5s. 2025/04/30 11:57:57 server Dropping Handshake keys. 2025/04/30 11:57:57 server -> Sending packet 1 (251 bytes) for connection fffb2fd5f9fd4e17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.NewTokenFrame{Token: 0x4a7cf2c0934603012839c124c2d47047351278d5cadd8de10db78cf85c16809ddbc3c8a18112168d6623e80e9b07bd5426832f355b26716d68e99dee202f992ed2d8c7510080d8434ba8c251bf1cee65193786ab3fc8} 2025/04/30 11:57:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:57 server <- Reading packet 0 (42 bytes) for connection 99331f15, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 99331f15, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:57:57 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:57:57 server -> Sending packet 2 (27 bytes) for connection fffb2fd5f9fd4e17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 283.173µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:57 Received request: GET /xyvksgtztz 2025/04/30 11:57:57 server -> Sending packet 3 (1045 bytes) for connection fffb2fd5f9fd4e17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:57:57 server <- Reading packet 1 (28 bytes) for connection 99331f15, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 99331f15, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.336ms} 2025/04/30 11:57:57 server newly acked packets (1): [0] 2025/04/30 11:57:57 server updated RTT: 35.148ms (σ: 14.018ms) 2025/04/30 11:57:57 Tracking 14 connection IDs and 0 reset tokens. 2025/04/30 11:57:57 server <- Reading packet 2 (1352 bytes) for connection 99331f15, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 99331f15, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.PingFrame{} 2025/04/30 11:57:57 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:57:57 server <- Reading packet 3 (30 bytes) for connection 99331f15, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 99331f15, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server newly acked packets (2): [1 3] 2025/04/30 11:57:57 server updated RTT: 34.757ms (σ: 11.294ms) 2025/04/30 11:57:57 server ECN capability confirmed. 2025/04/30 11:57:57 server Canceling loss detection timer. 2025/04/30 11:57:57 server -> Sending packet 4 (30 bytes) for connection fffb2fd5f9fd4e17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:57 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 55.184µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:57:57 server <- Reading packet 4 (41 bytes) for connection 99331f15, 1-RTT 2025/04/30 11:57:57 server Short Header{DestConnectionID: 99331f15, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:57 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 256µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:57:57 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:57:57 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:57 Replacing connection for connection IDs [ed3650fd 610e2305 8ca38365 f2b250c5 cdc63b57 99331f15] with a closed connection. 2025/04/30 11:57:57 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:57 server Connection fffb2fd5f9fd4e17 closed. 2025/04/30 11:57:57 server <- Received Initial packet. 2025/04/30 11:57:57 Created qlog file: /logs/qlog/f56cdcbb1d62f740.sqlog 2025/04/30 11:57:57 server Changing connection ID to c9371c4d. 2025/04/30 11:57:57 Adding connection IDs f56cdcbb1d62f740 and c9371c4d for a new connection. 2025/04/30 11:57:57 server <- Reading packet 0 (1252 bytes) for connection f56cdcbb1d62f740, Initial 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: f56cdcbb1d62f740, SrcConnectionID: (empty), Token: 0x4a7cf2c0934603012839c124c2d47047351278d5cadd8de10db78cf85c16809ddbc3c8a18112168d6623e80e9b07bd5426832f355b26716d68e99dee202f992ed2d8c7510080d8434ba8c251bf1cee65193786ab3fc8, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:57:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:57:57 server -> Sending packet 0 (40 bytes) for connection f56cdcbb1d62f740, Initial 2025/04/30 11:57:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9371c4d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:57:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:57:58 server <- Reading packet 3 (704 bytes) for connection c9371c4d, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: c9371c4d, SrcConnectionID: (empty), Token: 0x4a7cf2c0934603012839c124c2d47047351278d5cadd8de10db78cf85c16809ddbc3c8a18112168d6623e80e9b07bd5426832f355b26716d68e99dee202f992ed2d8c7510080d8434ba8c251bf1cee65193786ab3fc8, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:57:58 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:57:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:57:58 Adding connection ID 4d866258. 2025/04/30 11:57:58 Adding connection ID be22a3a2. 2025/04/30 11:57:58 Adding connection ID ec3b6c2e. 2025/04/30 11:57:58 Adding connection ID 35da08db. 2025/04/30 11:57:58 Adding connection ID c1a34332. 2025/04/30 11:57:58 server coalesced packet has different destination connection ID: 00000000, expected c9371c4d 2025/04/30 11:57:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f56cdcbb1d62f740 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c9371c4d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 930, Version: v1} 2025/04/30 11:57:58 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:57:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c9371c4d, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d866258, StatelessResetToken: 0x04f44bdc9e7d4b57b8560501dd0a0187} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be22a3a2, StatelessResetToken: 0x72595eab3f225d52e9dfcfabac542ec1} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 35da08db, StatelessResetToken: 0xebb8865eb24a3288538833b8d48a7c9b} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c1a34332, StatelessResetToken: 0xba8eaf3b4361109dd28c23a6bff8beea} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec3b6c2e, StatelessResetToken: 0x0a52625fe2d8e3a7081a34ef4c90b79f} 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:57:58 server <- Reading packet 4 (124 bytes) for connection c9371c4d, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: c9371c4d, SrcConnectionID: (empty), Token: 0x4a7cf2c0934603012839c124c2d47047351278d5cadd8de10db78cf85c16809ddbc3c8a18112168d6623e80e9b07bd5426832f355b26716d68e99dee202f992ed2d8c7510080d8434ba8c251bf1cee65193786ab3fc8, PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.112ms} 2025/04/30 11:57:58 server newly acked packets (1): [1] 2025/04/30 11:57:58 server updated RTT: 33.095526ms (σ: 16.547763ms) 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:57:58 server <- Reading packet 0 (75 bytes) for connection c9371c4d, Handshake 2025/04/30 11:57:58 server Long Header{Type: Handshake, DestConnectionID: c9371c4d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:57:58 server Dropping Initial keys. 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.112ms} 2025/04/30 11:57:58 server newly acked packets (1): [0] 2025/04/30 11:57:58 server updated RTT: 33.095ms (σ: 12.41ms) 2025/04/30 11:57:58 server Canceling loss detection timer. 2025/04/30 11:57:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:57:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:58 Retiring connection ID f56cdcbb1d62f740 in 5s. 2025/04/30 11:57:58 server Dropping Handshake keys. 2025/04/30 11:57:58 server <- Reading packet 0 (42 bytes) for connection c9371c4d, 1-RTT 2025/04/30 11:57:58 server Short Header{DestConnectionID: c9371c4d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:57:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:57:58 server -> Sending packet 1 (259 bytes) for connection f56cdcbb1d62f740, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 381.053µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:58 Received request: GET /gzmzkwkhrz 2025/04/30 11:57:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:58 server -> &wire.NewTokenFrame{Token: 0xcc1c61366e3f9e4806265674f5b1eeb0d923b016335140199e390dd88dce0813e78abd9bd78824ca7805c121bc2def22c24ca3bfcb651b25cb4e0d2323eb0945977340a847bac851f97ed91c0c21fce2865bb417b600} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:58 server -> Sending packet 2 (1045 bytes) for connection f56cdcbb1d62f740, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:57:58 server <- Reading packet 1 (28 bytes) for connection c9371c4d, 1-RTT 2025/04/30 11:57:58 server Short Header{DestConnectionID: c9371c4d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.568ms} 2025/04/30 11:57:58 server newly acked packets (1): [0] 2025/04/30 11:57:58 server updated RTT: 35.499ms (σ: 14.116ms) 2025/04/30 11:57:58 server <- Reading packet 2 (32 bytes) for connection c9371c4d, 1-RTT 2025/04/30 11:57:58 server Short Header{DestConnectionID: c9371c4d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server newly acked packets (1): [2] 2025/04/30 11:57:58 server updated RTT: 35.008ms (σ: 11.568ms) 2025/04/30 11:57:58 server ECN capability confirmed. 2025/04/30 11:57:58 server setting loss timer for packet 1 (1-RTT) to 39.384ms (in 2025-04-30 11:57:58.303296466 +0000 UTC m=+2.672177192) 2025/04/30 11:57:58 server -> Sending packet 3 (22 bytes) for connection f56cdcbb1d62f740, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:57:58 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:57:58.303296466 +0000 UTC m=+2.672177192 2025/04/30 11:57:58 server lost packet 1 (time threshold) 2025/04/30 11:57:58 server -> Sending packet 4 (251 bytes) for connection f56cdcbb1d62f740, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.NewTokenFrame{Token: 0xcc1c61366e3f9e4806265674f5b1eeb0d923b016335140199e390dd88dce0813e78abd9bd78824ca7805c121bc2def22c24ca3bfcb651b25cb4e0d2323eb0945977340a847bac851f97ed91c0c21fce2865bb417b600} 2025/04/30 11:57:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 44 bytes. 2025/04/30 11:57:58 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 11:57:58 server <- Reading packet 4 (44 bytes) for connection c9371c4d, 1-RTT 2025/04/30 11:57:58 server Short Header{DestConnectionID: c9371c4d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 30.832ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:57:58 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:58 Replacing connection for connection IDs [c9371c4d 4d866258 be22a3a2 ec3b6c2e 35da08db c1a34332] with a closed connection. 2025/04/30 11:57:58 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:58 server Connection f56cdcbb1d62f740 closed. 2025/04/30 11:57:58 server <- Received Initial packet. 2025/04/30 11:57:58 Created qlog file: /logs/qlog/7e2e002336b61dd1609752.sqlog 2025/04/30 11:57:58 server Changing connection ID to 138dd10e. 2025/04/30 11:57:58 Adding connection IDs 7e2e002336b61dd1609752 and 138dd10e for a new connection. 2025/04/30 11:57:58 server <- Reading packet 0 (1252 bytes) for connection 7e2e002336b61dd1609752, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: 7e2e002336b61dd1609752, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1231, Version: v1} 2025/04/30 11:57:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 1210, Offset + Data length: 1210} 2025/04/30 11:57:58 server -> Sending packet 0 (40 bytes) for connection 7e2e002336b61dd1609752, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 138dd10e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:57:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 1: 365 bytes. Remaining: 887 bytes. 2025/04/30 11:57:58 server <- Reading packet 2 (365 bytes) for connection 138dd10e, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: 138dd10e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 351, Version: v1} 2025/04/30 11:57:58 server <- &wire.CryptoFrame{Offset: 1210, Data length: 329, Offset + Data length: 1539} 2025/04/30 11:57:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:57:58 Adding connection ID d783fa2e. 2025/04/30 11:57:58 Adding connection ID a1308be8. 2025/04/30 11:57:58 Adding connection ID 5f426b18. 2025/04/30 11:57:58 Adding connection ID bcc2ac5b. 2025/04/30 11:57:58 Adding connection ID ab18e56b. 2025/04/30 11:57:58 server coalesced packet has different destination connection ID: 00000000, expected 138dd10e 2025/04/30 11:57:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7e2e002336b61dd1609752 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 138dd10e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 381, Version: v1} 2025/04/30 11:57:58 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:57:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 138dd10e, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bcc2ac5b, StatelessResetToken: 0xa6cbce8f09976aec5148d7ff3763d82a} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f426b18, StatelessResetToken: 0x7c6a6a4b7e0ca357ac6b29a28b9c12ad} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ab18e56b, StatelessResetToken: 0x3ebf0087c8bf0dc15a0f7051cbcec95d} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a1308be8, StatelessResetToken: 0xf09d2a9d189dde0fee0bf102e25cc8f8} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d783fa2e, StatelessResetToken: 0xc80697af340c526e4657fca75630f10d} 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 1: 365 bytes. Remaining: 887 bytes. 2025/04/30 11:57:58 server <- Reading packet 3 (365 bytes) for connection 138dd10e, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: 138dd10e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 351, Version: v1} 2025/04/30 11:57:58 server <- &wire.CryptoFrame{Offset: 1210, Data length: 329, Offset + Data length: 1539} 2025/04/30 11:57:58 server coalesced packet has different destination connection ID: 00000000, expected 138dd10e 2025/04/30 11:57:58 server -> Sending packet 2 (42 bytes) for connection 7e2e002336b61dd1609752, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 138dd10e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:57:58 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:57:58 server -> Sending packet 3 (1280 bytes) for connection 7e2e002336b61dd1609752, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 138dd10e, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:57:58 server -> Sending packet 4 (1280 bytes) for connection 7e2e002336b61dd1609752, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 138dd10e, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 1: 38 bytes. Remaining: 1214 bytes. 2025/04/30 11:57:58 server <- Reading packet 4 (38 bytes) for connection 138dd10e, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: 138dd10e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 480µs} 2025/04/30 11:57:58 server coalesced packet has different destination connection ID: 00000000, expected 138dd10e 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 1212 bytes. 2025/04/30 11:57:58 server <- Reading packet 6 (40 bytes) for connection 138dd10e, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: 138dd10e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 44.248ms} 2025/04/30 11:57:58 server newly acked packets (1): [4] 2025/04/30 11:57:58 server updated RTT: 78.147607ms (σ: 39.073803ms) 2025/04/30 11:57:58 server <- &wire.PingFrame{} 2025/04/30 11:57:58 server coalesced packet has different destination connection ID: 00000000, expected 138dd10e 2025/04/30 11:57:58 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:57:58 server -> Sending packet 1 (746 bytes) for connection 7e2e002336b61dd1609752, Handshake 2025/04/30 11:57:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 138dd10e, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:57:58 server -> Sending packet 2 (746 bytes) for connection 7e2e002336b61dd1609752, Handshake 2025/04/30 11:57:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 138dd10e, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:57:58 server -> Sending packet 5 (44 bytes) for connection 7e2e002336b61dd1609752, Initial 2025/04/30 11:57:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 138dd10e, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 11:57:58 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server <- Reading packet 0 (36 bytes) for connection 138dd10e, Handshake 2025/04/30 11:57:58 server Long Header{Type: Handshake, DestConnectionID: 138dd10e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:57:58 server Dropping Initial keys. 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 768µs} 2025/04/30 11:57:58 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:57:58 server <- Reading packet 2 (69 bytes) for connection 138dd10e, Handshake 2025/04/30 11:57:58 server Long Header{Type: Handshake, DestConnectionID: 138dd10e, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:57:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:57:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:58 Retiring connection ID 7e2e002336b61dd1609752 in 5s. 2025/04/30 11:57:58 server Dropping Handshake keys. 2025/04/30 11:57:58 server <- Reading packet 0 (42 bytes) for connection 138dd10e, 1-RTT 2025/04/30 11:57:58 server Short Header{DestConnectionID: 138dd10e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:57:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:57:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:57:58 server -> Sending packet 2 (379 bytes) for connection 7e2e002336b61dd1609752, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 228.788µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a1308be8, StatelessResetToken: 0xf09d2a9d189dde0fee0bf102e25cc8f8} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d783fa2e, StatelessResetToken: 0xc80697af340c526e4657fca75630f10d} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ab18e56b, StatelessResetToken: 0x3ebf0087c8bf0dc15a0f7051cbcec95d} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f426b18, StatelessResetToken: 0x7c6a6a4b7e0ca357ac6b29a28b9c12ad} 2025/04/30 11:57:58 server -> &wire.NewTokenFrame{Token: 0x078de5f2253e688929fcb336be7856cb8b9ded3c603b476ef6e422db9ff3420974ab542783f2c9c525a55e11826c010cf137149b9a750db047d3969f91f173cbf1d29cddb2af758d18fa71755379b82b4143b4f05087} 2025/04/30 11:57:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bcc2ac5b, StatelessResetToken: 0xa6cbce8f09976aec5148d7ff3763d82a} 2025/04/30 11:57:58 Received request: GET /cudlvraggb 2025/04/30 11:57:58 server -> Sending packet 3 (371 bytes) for connection 7e2e002336b61dd1609752, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ab18e56b, StatelessResetToken: 0x3ebf0087c8bf0dc15a0f7051cbcec95d} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f426b18, StatelessResetToken: 0x7c6a6a4b7e0ca357ac6b29a28b9c12ad} 2025/04/30 11:57:58 server -> &wire.NewTokenFrame{Token: 0x078de5f2253e688929fcb336be7856cb8b9ded3c603b476ef6e422db9ff3420974ab542783f2c9c525a55e11826c010cf137149b9a750db047d3969f91f173cbf1d29cddb2af758d18fa71755379b82b4143b4f05087} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d783fa2e, StatelessResetToken: 0xc80697af340c526e4657fca75630f10d} 2025/04/30 11:57:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bcc2ac5b, StatelessResetToken: 0xa6cbce8f09976aec5148d7ff3763d82a} 2025/04/30 11:57:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a1308be8, StatelessResetToken: 0xf09d2a9d189dde0fee0bf102e25cc8f8} 2025/04/30 11:57:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:58 server -> Sending packet 4 (1045 bytes) for connection 7e2e002336b61dd1609752, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:57:58 server <- Reading packet 1 (1352 bytes) for connection 138dd10e, 1-RTT 2025/04/30 11:57:58 server Short Header{DestConnectionID: 138dd10e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 344µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server <- &wire.PingFrame{} 2025/04/30 11:57:58 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:57:58 server <- Reading packet 3 (30 bytes) for connection 138dd10e, 1-RTT 2025/04/30 11:57:58 server Short Header{DestConnectionID: 138dd10e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server newly acked packets (2): [3 4] 2025/04/30 11:57:58 server updated RTT: 72.597ms (σ: 40.403ms) 2025/04/30 11:57:58 server ECN capability confirmed. 2025/04/30 11:57:58 server Canceling loss detection timer. 2025/04/30 11:57:58 server -> Sending packet 5 (32 bytes) for connection 7e2e002336b61dd1609752, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:58 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:58 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 107.952µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:57:58 server <- Reading packet 4 (41 bytes) for connection 138dd10e, 1-RTT 2025/04/30 11:57:58 server Short Header{DestConnectionID: 138dd10e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:58 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 368µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:57:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:57:58 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:58 Replacing connection for connection IDs [5f426b18 bcc2ac5b ab18e56b 138dd10e d783fa2e a1308be8] with a closed connection. 2025/04/30 11:57:58 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:58 server Connection 7e2e002336b61dd1609752 closed. 2025/04/30 11:57:59 server <- Received Initial packet. 2025/04/30 11:57:59 Created qlog file: /logs/qlog/d640981cba6ae50a221939854c94a0d42d.sqlog 2025/04/30 11:57:59 server Changing connection ID to 6242b295. 2025/04/30 11:57:59 Adding connection IDs d640981cba6ae50a221939854c94a0d42d and 6242b295 for a new connection. 2025/04/30 11:57:59 server <- Reading packet 0 (1252 bytes) for connection d640981cba6ae50a221939854c94a0d42d, Initial 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: d640981cba6ae50a221939854c94a0d42d, SrcConnectionID: (empty), Token: 0x078de5f2253e688929fcb336be7856cb8b9ded3c603b476ef6e422db9ff3420974ab542783f2c9c525a55e11826c010cf137149b9a750db047d3969f91f173cbf1d29cddb2af758d18fa71755379b82b4143b4f05087, PacketNumber: 0, PacketNumberLen: 1, Length: 1138, Version: v1} 2025/04/30 11:57:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 1117, Offset + Data length: 1117} 2025/04/30 11:57:59 server -> Sending packet 0 (40 bytes) for connection d640981cba6ae50a221939854c94a0d42d, Initial 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6242b295, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:57:59 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 1: 726 bytes. Remaining: 526 bytes. 2025/04/30 11:57:59 server <- Reading packet 1 (726 bytes) for connection d640981cba6ae50a221939854c94a0d42d, Initial 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: d640981cba6ae50a221939854c94a0d42d, SrcConnectionID: (empty), Token: 0x078de5f2253e688929fcb336be7856cb8b9ded3c603b476ef6e422db9ff3420974ab542783f2c9c525a55e11826c010cf137149b9a750db047d3969f91f173cbf1d29cddb2af758d18fa71755379b82b4143b4f05087, PacketNumber: 1, PacketNumberLen: 1, Length: 612, Version: v1} 2025/04/30 11:57:59 server <- &wire.CryptoFrame{Offset: 1117, Data length: 590, Offset + Data length: 1707} 2025/04/30 11:57:59 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:59 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:59 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:59 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:57:59 Adding connection ID 9c6b6f43. 2025/04/30 11:57:59 Adding connection ID 7c3b0dae. 2025/04/30 11:57:59 Adding connection ID 73836618. 2025/04/30 11:57:59 Adding connection ID 0f7e73be. 2025/04/30 11:57:59 Adding connection ID 43772117. 2025/04/30 11:57:59 server coalesced packet has different destination connection ID: 00000000, expected d640981cba6ae50a221939854c94a0d42d 2025/04/30 11:57:59 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d640981cba6ae50a221939854c94a0d42d 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6242b295, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:57:59 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:57:59 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6242b295, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:57:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0f7e73be, StatelessResetToken: 0x1ee159179ae795c5cc80cd91865fc309} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7c3b0dae, StatelessResetToken: 0x3ee83f31f6a7b2e13fc32093f0cc22d0} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 73836618, StatelessResetToken: 0x0c9e7b8c271b95ebc8729804169aaefe} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 43772117, StatelessResetToken: 0x8680f886eda0256e6353eb4696271382} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c6b6f43, StatelessResetToken: 0x2c3c1a080c04957263151d81feae024e} 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:57:59 server <- Reading packet 2 (124 bytes) for connection 6242b295, Initial 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: 6242b295, SrcConnectionID: (empty), Token: 0x078de5f2253e688929fcb336be7856cb8b9ded3c603b476ef6e422db9ff3420974ab542783f2c9c525a55e11826c010cf137149b9a750db047d3969f91f173cbf1d29cddb2af758d18fa71755379b82b4143b4f05087, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 856µs} 2025/04/30 11:57:59 server newly acked packets (1): [1] 2025/04/30 11:57:59 server updated RTT: 32.68548ms (σ: 16.34274ms) 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:57:59 server <- Reading packet 0 (75 bytes) for connection 6242b295, Handshake 2025/04/30 11:57:59 server Long Header{Type: Handshake, DestConnectionID: 6242b295, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:57:59 server Dropping Initial keys. 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 856µs} 2025/04/30 11:57:59 server newly acked packets (1): [0] 2025/04/30 11:57:59 server updated RTT: 32.685ms (σ: 12.256ms) 2025/04/30 11:57:59 server Canceling loss detection timer. 2025/04/30 11:57:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:57:59 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:59 Retiring connection ID d640981cba6ae50a221939854c94a0d42d in 5s. 2025/04/30 11:57:59 server Dropping Handshake keys. 2025/04/30 11:57:59 server -> Sending packet 1 (251 bytes) for connection d640981cba6ae50a221939854c94a0d42d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:59 server -> &wire.NewTokenFrame{Token: 0x89a105dda0b5a7fa618854adfba5bea825afae4ac709d07be2ff238dcb50ebed97db0d01568a079838aa727886d5ea732070f9793b09945111e0f80ac9054fd92e80e225cc51eea0f02c2099e690018bce11d2368df4} 2025/04/30 11:57:59 server <- Reading packet 1 (28 bytes) for connection 6242b295, 1-RTT 2025/04/30 11:57:59 server Short Header{DestConnectionID: 6242b295, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.248ms} 2025/04/30 11:57:59 server newly acked packets (1): [0] 2025/04/30 11:57:59 server updated RTT: 32.716ms (σ: 9.254ms) 2025/04/30 11:57:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:57:59 server -> Sending packet 3 (251 bytes) for connection d640981cba6ae50a221939854c94a0d42d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:59 server -> &wire.NewTokenFrame{Token: 0x89a105dda0b5a7fa618854adfba5bea825afae4ac709d07be2ff238dcb50ebed97db0d01568a079838aa727886d5ea732070f9793b09945111e0f80ac9054fd92e80e225cc51eea0f02c2099e690018bce11d2368df4} 2025/04/30 11:57:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:59 server -> Sending packet 4 (251 bytes) for connection d640981cba6ae50a221939854c94a0d42d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:59 server -> &wire.NewTokenFrame{Token: 0x89a105dda0b5a7fa618854adfba5bea825afae4ac709d07be2ff238dcb50ebed97db0d01568a079838aa727886d5ea732070f9793b09945111e0f80ac9054fd92e80e225cc51eea0f02c2099e690018bce11d2368df4} 2025/04/30 11:57:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:57:59 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:57:59 server <- Reading packet 2 (42 bytes) for connection 6242b295, 1-RTT 2025/04/30 11:57:59 server Short Header{DestConnectionID: 6242b295, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:57:59 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:57:59 server -> Sending packet 5 (27 bytes) for connection d640981cba6ae50a221939854c94a0d42d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 129.084µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:57:59 Received request: GET /xwsajygukh 2025/04/30 11:57:59 server -> Sending packet 6 (1045 bytes) for connection d640981cba6ae50a221939854c94a0d42d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:57:59 server <- Reading packet 4 (1392 bytes) for connection 6242b295, 1-RTT 2025/04/30 11:57:59 server Short Header{DestConnectionID: 6242b295, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:59 server <- &wire.PingFrame{} 2025/04/30 11:57:59 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:57:59 server -> Sending packet 7 (29 bytes) for connection d640981cba6ae50a221939854c94a0d42d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 74.339µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server <- Reading packet 5 (30 bytes) for connection 6242b295, 1-RTT 2025/04/30 11:57:59 server Short Header{DestConnectionID: 6242b295, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 32µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server newly acked packets (2): [4 6] 2025/04/30 11:57:59 server updated RTT: 32.557ms (σ: 7.258ms) 2025/04/30 11:57:59 server ECN capability confirmed. 2025/04/30 11:57:59 server Canceling loss detection timer. 2025/04/30 11:57:59 server -> Sending packet 8 (22 bytes) for connection d640981cba6ae50a221939854c94a0d42d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:57:59 server <- Reading packet 6 (41 bytes) for connection 6242b295, 1-RTT 2025/04/30 11:57:59 server Short Header{DestConnectionID: 6242b295, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 256µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:57:59 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:59 Replacing connection for connection IDs [0f7e73be 43772117 6242b295 9c6b6f43 7c3b0dae 73836618] with a closed connection. 2025/04/30 11:57:59 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:59 server Connection d640981cba6ae50a221939854c94a0d42d closed. 2025/04/30 11:57:59 Tracking 35 connection IDs and 0 reset tokens. 2025/04/30 11:57:59 server <- Received Initial packet. 2025/04/30 11:57:59 Created qlog file: /logs/qlog/36e1e25181d6eaa5.sqlog 2025/04/30 11:57:59 server Changing connection ID to 56508a18. 2025/04/30 11:57:59 Adding connection IDs 36e1e25181d6eaa5 and 56508a18 for a new connection. 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:57:59 server <- Reading packet 1 (708 bytes) for connection 36e1e25181d6eaa5, Initial 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: 36e1e25181d6eaa5, SrcConnectionID: (empty), Token: 0x89a105dda0b5a7fa618854adfba5bea825afae4ac709d07be2ff238dcb50ebed97db0d01568a079838aa727886d5ea732070f9793b09945111e0f80ac9054fd92e80e225cc51eea0f02c2099e690018bce11d2368df4, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:57:59 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:57:59 server coalesced packet has different destination connection ID: 00000000, expected 36e1e25181d6eaa5 2025/04/30 11:57:59 server -> Sending packet 0 (40 bytes) for connection 36e1e25181d6eaa5, Initial 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56508a18, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:57:59 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:57:59 server <- Reading packet 2 (1248 bytes) for connection 56508a18, Initial 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: 56508a18, SrcConnectionID: (empty), Token: 0x89a105dda0b5a7fa618854adfba5bea825afae4ac709d07be2ff238dcb50ebed97db0d01568a079838aa727886d5ea732070f9793b09945111e0f80ac9054fd92e80e225cc51eea0f02c2099e690018bce11d2368df4, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:57:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:57:59 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:59 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:59 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:59 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:57:59 Adding connection ID 09beffcf. 2025/04/30 11:57:59 Adding connection ID 30766db0. 2025/04/30 11:57:59 Adding connection ID bd85a22b. 2025/04/30 11:57:59 Adding connection ID a4e8accf. 2025/04/30 11:57:59 Adding connection ID 1f5ac11e. 2025/04/30 11:57:59 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:57:59 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 36e1e25181d6eaa5 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56508a18, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 929, Version: v1} 2025/04/30 11:57:59 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:57:59 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56508a18, PacketNumber: 0, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 11:57:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a4e8accf, StatelessResetToken: 0xebfdfc6a3643d4de1dc1e5c40846b3ff} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bd85a22b, StatelessResetToken: 0xcba0ffde83c4bf7c5dff1370dd121062} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 30766db0, StatelessResetToken: 0x4b93ba65b4287fcdcdf3d4656ef1714f} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f5ac11e, StatelessResetToken: 0xa0c4d56c0d8574ac5c7439ef90b0ca07} 2025/04/30 11:57:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 09beffcf, StatelessResetToken: 0xea4b4882417d843f5f0717707a0ca6eb} 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:57:59 server <- Reading packet 3 (124 bytes) for connection 56508a18, Initial 2025/04/30 11:57:59 server Long Header{Type: Initial, DestConnectionID: 56508a18, SrcConnectionID: (empty), Token: 0x89a105dda0b5a7fa618854adfba5bea825afae4ac709d07be2ff238dcb50ebed97db0d01568a079838aa727886d5ea732070f9793b09945111e0f80ac9054fd92e80e225cc51eea0f02c2099e690018bce11d2368df4, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 920µs} 2025/04/30 11:57:59 server newly acked packets (1): [1] 2025/04/30 11:57:59 server updated RTT: 32.995666ms (σ: 16.497833ms) 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:57:59 server <- Reading packet 0 (75 bytes) for connection 56508a18, Handshake 2025/04/30 11:57:59 server Long Header{Type: Handshake, DestConnectionID: 56508a18, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:57:59 server Dropping Initial keys. 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 920µs} 2025/04/30 11:57:59 server newly acked packets (1): [0] 2025/04/30 11:57:59 server updated RTT: 32.995ms (σ: 12.372ms) 2025/04/30 11:57:59 server Canceling loss detection timer. 2025/04/30 11:57:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:57:59 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:57:59 Retiring connection ID 36e1e25181d6eaa5 in 5s. 2025/04/30 11:57:59 server Dropping Handshake keys. 2025/04/30 11:57:59 server <- Reading packet 0 (42 bytes) for connection 56508a18, 1-RTT 2025/04/30 11:57:59 server Short Header{DestConnectionID: 56508a18, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:57:59 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:57:59 server -> Sending packet 1 (259 bytes) for connection 36e1e25181d6eaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 255.468µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server -> &wire.NewTokenFrame{Token: 0xf54d81cc0206ad365f20d60091821f1aacc4fd3748d962c4f26167741abee2d022fa3ddcc5c069cedf632867973de0642857d82b29e1f4cc3cdb2dff2bc597eb6943336c43ac06434194dc53f55b65067c2d82262792} 2025/04/30 11:57:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:57:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:57:59 Received request: GET /clatycqcyl 2025/04/30 11:57:59 server -> Sending packet 2 (1045 bytes) for connection 36e1e25181d6eaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:57:59 server <- Reading packet 2 (32 bytes) for connection 56508a18, 1-RTT 2025/04/30 11:57:59 server Short Header{DestConnectionID: 56508a18, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server newly acked packets (2): [0 2] 2025/04/30 11:57:59 server updated RTT: 32.805ms (σ: 9.657ms) 2025/04/30 11:57:59 server ECN capability confirmed. 2025/04/30 11:57:59 server setting loss timer for packet 1 (1-RTT) to 36.905625ms (in 2025-04-30 11:57:59.905285747 +0000 UTC m=+4.274166473) 2025/04/30 11:57:59 server -> Sending packet 3 (22 bytes) for connection 36e1e25181d6eaa5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:57:59 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:57:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:57:59 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 43 bytes. 2025/04/30 11:57:59 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 11:57:59 server <- Reading packet 3 (43 bytes) for connection 56508a18, 1-RTT 2025/04/30 11:57:59 server Short Header{DestConnectionID: 56508a18, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:57:59 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 208µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:57:59 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:57:59 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:57:59 Replacing connection for connection IDs [30766db0 bd85a22b a4e8accf 1f5ac11e 56508a18 09beffcf] with a closed connection. 2025/04/30 11:57:59 server Connection 36e1e25181d6eaa5 closed. 2025/04/30 11:57:59 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:00 server <- Received Initial packet. 2025/04/30 11:58:00 Created qlog file: /logs/qlog/1877df41d02e765dd815d198.sqlog 2025/04/30 11:58:00 server Changing connection ID to ec60286d. 2025/04/30 11:58:00 Adding connection IDs 1877df41d02e765dd815d198 and ec60286d for a new connection. 2025/04/30 11:58:00 server <- Reading packet 0 (1252 bytes) for connection 1877df41d02e765dd815d198, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: 1877df41d02e765dd815d198, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1230, Version: v1} 2025/04/30 11:58:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 1209, Offset + Data length: 1209} 2025/04/30 11:58:00 server -> Sending packet 0 (40 bytes) for connection 1877df41d02e765dd815d198, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec60286d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 1: 374 bytes. Remaining: 878 bytes. 2025/04/30 11:58:00 server <- Reading packet 1 (374 bytes) for connection 1877df41d02e765dd815d198, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: 1877df41d02e765dd815d198, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 352, Version: v1} 2025/04/30 11:58:00 server <- &wire.CryptoFrame{Offset: 1209, Data length: 330, Offset + Data length: 1539} 2025/04/30 11:58:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:00 Adding connection ID f12a20d2. 2025/04/30 11:58:00 Adding connection ID fcc69ed3. 2025/04/30 11:58:00 Adding connection ID 251a4653. 2025/04/30 11:58:00 Adding connection ID 26bf19af. 2025/04/30 11:58:00 Adding connection ID f01b6f00. 2025/04/30 11:58:00 server coalesced packet has different destination connection ID: 00000000, expected 1877df41d02e765dd815d198 2025/04/30 11:58:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1877df41d02e765dd815d198 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec60286d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 387, Version: v1} 2025/04/30 11:58:00 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ec60286d, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:58:00 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f01b6f00, StatelessResetToken: 0xe36c49805f6854e13c2c344364147d63} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 26bf19af, StatelessResetToken: 0xf2680ebd9cc54b16b31cacb27a335805} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f12a20d2, StatelessResetToken: 0x03034a1653784e8a5d2654fc68bd5946} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 251a4653, StatelessResetToken: 0xd6dc9daa47f637b3598bda09cba08a77} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fcc69ed3, StatelessResetToken: 0x58536b5b31bad30a7fc5d8510d32dc23} 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 36 bytes. 2025/04/30 11:58:00 server <- Reading packet 2 (37 bytes) for connection ec60286d, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: ec60286d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:00 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.048ms} 2025/04/30 11:58:00 server newly acked packets (1): [1] 2025/04/30 11:58:00 server updated RTT: 32.829874ms (σ: 16.414937ms) 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 2: 36 bytes. Remaining: 0 bytes. 2025/04/30 11:58:00 server <- Reading packet 0 (36 bytes) for connection ec60286d, Handshake 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: ec60286d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:00 server Dropping Initial keys. 2025/04/30 11:58:00 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.048ms} 2025/04/30 11:58:00 server newly acked packets (1): [0] 2025/04/30 11:58:00 server updated RTT: 32.829ms (σ: 12.31ms) 2025/04/30 11:58:00 server Canceling loss detection timer. 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:58:00 server <- Reading packet 1 (69 bytes) for connection ec60286d, Handshake 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: ec60286d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:58:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:00 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 Retiring connection ID 1877df41d02e765dd815d198 in 5s. 2025/04/30 11:58:00 server Dropping Handshake keys. 2025/04/30 11:58:00 server <- Reading packet 0 (42 bytes) for connection ec60286d, 1-RTT 2025/04/30 11:58:00 server Short Header{DestConnectionID: ec60286d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:00 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:00 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:00 server -> Sending packet 1 (259 bytes) for connection 1877df41d02e765dd815d198, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:00 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:00 Received request: GET /lahaugkrqv 2025/04/30 11:58:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 228.297µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:00 server -> &wire.NewTokenFrame{Token: 0x1ff073e587f70d92a36aab7285a3a307b8e567d83ef8ee94fc8430b7256791858a09278d2d96b7959b115a4aed9bc71b5cd139d3eabdae364f8784f7475c1701e2556c2ec2cc3f950e5ef83d0e46441bc91fb8bdb24a} 2025/04/30 11:58:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:00 server -> Sending packet 2 (1045 bytes) for connection 1877df41d02e765dd815d198, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:00 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:00 server <- Reading packet 1 (28 bytes) for connection ec60286d, 1-RTT 2025/04/30 11:58:00 server Short Header{DestConnectionID: ec60286d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:00 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.832ms} 2025/04/30 11:58:00 server newly acked packets (1): [0] 2025/04/30 11:58:00 server updated RTT: 35.298ms (σ: 14.172ms) 2025/04/30 11:58:00 server <- Reading packet 2 (32 bytes) for connection ec60286d, 1-RTT 2025/04/30 11:58:00 server Short Header{DestConnectionID: ec60286d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:00 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server newly acked packets (1): [2] 2025/04/30 11:58:00 server updated RTT: 34.847ms (σ: 11.53ms) 2025/04/30 11:58:00 server ECN capability confirmed. 2025/04/30 11:58:00 server setting loss timer for packet 1 (1-RTT) to 39.202875ms (in 2025-04-30 11:58:00.227263364 +0000 UTC m=+4.596144090) 2025/04/30 11:58:00 server -> Sending packet 3 (22 bytes) for connection 1877df41d02e765dd815d198, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:00 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 43 bytes. 2025/04/30 11:58:00 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 11:58:00 server <- Reading packet 3 (43 bytes) for connection ec60286d, 1-RTT 2025/04/30 11:58:00 server Short Header{DestConnectionID: ec60286d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:00 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 248µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:00 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:00 Replacing connection for connection IDs [251a4653 26bf19af f01b6f00 ec60286d f12a20d2 fcc69ed3] with a closed connection. 2025/04/30 11:58:00 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:00 server Connection 1877df41d02e765dd815d198 closed. 2025/04/30 11:58:00 server <- Received Initial packet. 2025/04/30 11:58:00 Created qlog file: /logs/qlog/818941910a9add78.sqlog 2025/04/30 11:58:00 server Changing connection ID to 6373225e. 2025/04/30 11:58:00 Adding connection IDs 818941910a9add78 and 6373225e for a new connection. 2025/04/30 11:58:00 server <- Reading packet 0 (1252 bytes) for connection 818941910a9add78, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: 818941910a9add78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:58:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:58:00 server -> Sending packet 0 (40 bytes) for connection 818941910a9add78, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6373225e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:58:00 server <- Reading packet 1 (366 bytes) for connection 818941910a9add78, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: 818941910a9add78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:58:00 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:58:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:00 Adding connection ID 3ba8641f. 2025/04/30 11:58:00 Adding connection ID 4419d8cd. 2025/04/30 11:58:00 Adding connection ID 4297b738. 2025/04/30 11:58:00 Adding connection ID d21c0933. 2025/04/30 11:58:00 Adding connection ID 6b9cfa20. 2025/04/30 11:58:00 server coalesced packet has different destination connection ID: 00000000, expected 818941910a9add78 2025/04/30 11:58:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 818941910a9add78 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6373225e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 393, Version: v1} 2025/04/30 11:58:00 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6373225e, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:58:00 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3ba8641f, StatelessResetToken: 0xd13b592091bd28273e3aa8c479431637} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4419d8cd, StatelessResetToken: 0xa7690ae12198caed4429bf92d4e1d113} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d21c0933, StatelessResetToken: 0x62ef960bf81057313b3383ba7b2903e8} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4297b738, StatelessResetToken: 0x71a4905f3e2e533941d769668cf07eb2} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 6b9cfa20, StatelessResetToken: 0xc7d29cc9eaabad7af2bf615b087271a3} 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 36 bytes. 2025/04/30 11:58:00 server <- Reading packet 2 (37 bytes) for connection 6373225e, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: 6373225e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:00 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.184ms} 2025/04/30 11:58:00 server newly acked packets (1): [1] 2025/04/30 11:58:00 server updated RTT: 32.961066ms (σ: 16.480533ms) 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 2: 36 bytes. Remaining: 0 bytes. 2025/04/30 11:58:00 server <- Reading packet 0 (36 bytes) for connection 6373225e, Handshake 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: 6373225e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:00 server Dropping Initial keys. 2025/04/30 11:58:00 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.184ms} 2025/04/30 11:58:00 server newly acked packets (1): [0] 2025/04/30 11:58:00 server updated RTT: 32.961ms (σ: 12.36ms) 2025/04/30 11:58:00 server Canceling loss detection timer. 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:58:00 server <- Reading packet 1 (69 bytes) for connection 6373225e, Handshake 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: 6373225e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:58:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:00 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 Retiring connection ID 818941910a9add78 in 5s. 2025/04/30 11:58:00 server Dropping Handshake keys. 2025/04/30 11:58:00 server <- Reading packet 0 (42 bytes) for connection 6373225e, 1-RTT 2025/04/30 11:58:00 server Short Header{DestConnectionID: 6373225e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:00 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:00 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:00 server -> Sending packet 1 (259 bytes) for connection 818941910a9add78, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:00 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 214.882µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:00 Received request: GET /cbbmlepawf 2025/04/30 11:58:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:00 server -> &wire.NewTokenFrame{Token: 0xaf078e96d3845d8f8c32b659e4eb039e53379724655388dbeaf93ba164776c4823cb3e73ced4df703f03916846300ff07f7f110211fc71237138ce1d1c0658ebead4db6e9d3b4f612543b34b18b724c576942bf63c82} 2025/04/30 11:58:00 server -> Sending packet 2 (1045 bytes) for connection 818941910a9add78, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:00 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:00 server <- Reading packet 4 (41 bytes) for connection 6373225e, 1-RTT 2025/04/30 11:58:00 server Short Header{DestConnectionID: 6373225e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:00 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 240µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server newly acked packets (3): [0 1 2] 2025/04/30 11:58:00 server updated RTT: 32.881ms (σ: 9.429ms) 2025/04/30 11:58:00 server ECN capability confirmed. 2025/04/30 11:58:00 server Canceling loss detection timer. 2025/04/30 11:58:00 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:00 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:00 Replacing connection for connection IDs [4297b738 d21c0933 6b9cfa20 6373225e 3ba8641f 4419d8cd] with a closed connection. 2025/04/30 11:58:00 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:00 server Connection 818941910a9add78 closed. 2025/04/30 11:58:00 server <- Received Initial packet. 2025/04/30 11:58:00 Created qlog file: /logs/qlog/2dc13afd3ff30578.sqlog 2025/04/30 11:58:00 server Changing connection ID to 8569eac5. 2025/04/30 11:58:00 Adding connection IDs 2dc13afd3ff30578 and 8569eac5 for a new connection. 2025/04/30 11:58:00 server <- Reading packet 0 (1252 bytes) for connection 2dc13afd3ff30578, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: 2dc13afd3ff30578, SrcConnectionID: (empty), Token: 0xaf078e96d3845d8f8c32b659e4eb039e53379724655388dbeaf93ba164776c4823cb3e73ced4df703f03916846300ff07f7f110211fc71237138ce1d1c0658ebead4db6e9d3b4f612543b34b18b724c576942bf63c82, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:00 server -> Sending packet 0 (40 bytes) for connection 2dc13afd3ff30578, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8569eac5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:00 server <- Reading packet 1 (708 bytes) for connection 2dc13afd3ff30578, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: 2dc13afd3ff30578, SrcConnectionID: (empty), Token: 0xaf078e96d3845d8f8c32b659e4eb039e53379724655388dbeaf93ba164776c4823cb3e73ced4df703f03916846300ff07f7f110211fc71237138ce1d1c0658ebead4db6e9d3b4f612543b34b18b724c576942bf63c82, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:00 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:00 Adding connection ID 7e6f1ac0. 2025/04/30 11:58:00 Adding connection ID 0093fa62. 2025/04/30 11:58:00 Adding connection ID 6a439671. 2025/04/30 11:58:00 Adding connection ID 70bd9cb9. 2025/04/30 11:58:00 Adding connection ID d95785eb. 2025/04/30 11:58:00 server coalesced packet has different destination connection ID: 00000000, expected 2dc13afd3ff30578 2025/04/30 11:58:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2dc13afd3ff30578 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8569eac5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 940, Version: v1} 2025/04/30 11:58:00 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8569eac5, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:00 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0093fa62, StatelessResetToken: 0x4c77e1e1dd3fc55d811732bd43fcf367} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a439671, StatelessResetToken: 0x1f81e3495cff15714582cee86c4c565e} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70bd9cb9, StatelessResetToken: 0xa21c8c7f376cbc1a5827a3cd28ec89ec} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d95785eb, StatelessResetToken: 0x4fdbce69f8a388a68ee8b78538b749a5} 2025/04/30 11:58:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e6f1ac0, StatelessResetToken: 0x08cfdb94b319e46e51c9b1756c4a5c6d} 2025/04/30 11:58:00 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:00 server -> Sending packet 2 (1280 bytes) for connection 2dc13afd3ff30578, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8569eac5, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:00 server -> Sending packet 3 (1280 bytes) for connection 2dc13afd3ff30578, Initial 2025/04/30 11:58:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8569eac5, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:00 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:58:00 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:00 server -> Sending packet 1 (187 bytes) for connection 2dc13afd3ff30578, Handshake 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8569eac5, PacketNumber: 1, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:00 server -> Sending packet 2 (187 bytes) for connection 2dc13afd3ff30578, Handshake 2025/04/30 11:58:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8569eac5, PacketNumber: 2, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:01 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:58:01 server <- Reading packet 1 (75 bytes) for connection 8569eac5, Handshake 2025/04/30 11:58:01 server Long Header{Type: Handshake, DestConnectionID: 8569eac5, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:01 server Dropping Initial keys. 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.504ms} 2025/04/30 11:58:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:01 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:01 Retiring connection ID 2dc13afd3ff30578 in 5s. 2025/04/30 11:58:01 server Dropping Handshake keys. 2025/04/30 11:58:01 server <- Reading packet 2 (42 bytes) for connection 8569eac5, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 8569eac5, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:01 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:01 server -> Sending packet 2 (379 bytes) for connection 2dc13afd3ff30578, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 266.038µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server -> &wire.NewTokenFrame{Token: 0x2d5d8b843b8343969b0e7d360025c034aa1f43f962b36a8f59c79c8013bad3ad5ea344f353f138183cb9f1a6d8ece6a04fe38eaf664378b2527083241a3b5274d0507b96d83bcab5e1267972a0d62c81dca311f96c09} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70bd9cb9, StatelessResetToken: 0xa21c8c7f376cbc1a5827a3cd28ec89ec} 2025/04/30 11:58:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0093fa62, StatelessResetToken: 0x4c77e1e1dd3fc55d811732bd43fcf367} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d95785eb, StatelessResetToken: 0x4fdbce69f8a388a68ee8b78538b749a5} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a439671, StatelessResetToken: 0x1f81e3495cff15714582cee86c4c565e} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e6f1ac0, StatelessResetToken: 0x08cfdb94b319e46e51c9b1756c4a5c6d} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:01 server -> Sending packet 3 (371 bytes) for connection 2dc13afd3ff30578, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 Received request: GET /hddieyvghl 2025/04/30 11:58:01 server -> &wire.NewTokenFrame{Token: 0x2d5d8b843b8343969b0e7d360025c034aa1f43f962b36a8f59c79c8013bad3ad5ea344f353f138183cb9f1a6d8ece6a04fe38eaf664378b2527083241a3b5274d0507b96d83bcab5e1267972a0d62c81dca311f96c09} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70bd9cb9, StatelessResetToken: 0xa21c8c7f376cbc1a5827a3cd28ec89ec} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0093fa62, StatelessResetToken: 0x4c77e1e1dd3fc55d811732bd43fcf367} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d95785eb, StatelessResetToken: 0x4fdbce69f8a388a68ee8b78538b749a5} 2025/04/30 11:58:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e6f1ac0, StatelessResetToken: 0x08cfdb94b319e46e51c9b1756c4a5c6d} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6a439671, StatelessResetToken: 0x1f81e3495cff15714582cee86c4c565e} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:01 server -> Sending packet 4 (1045 bytes) for connection 2dc13afd3ff30578, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:01 server <- Reading packet 1 (28 bytes) for connection 8569eac5, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 8569eac5, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.12ms} 2025/04/30 11:58:01 server <- Reading packet 3 (1352 bytes) for connection 8569eac5, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 8569eac5, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 216µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server newly acked packets (1): [3] 2025/04/30 11:58:01 server updated RTT: 32.640167ms (σ: 16.320083ms) 2025/04/30 11:58:01 server ECN capability confirmed. 2025/04/30 11:58:01 server <- &wire.PingFrame{} 2025/04/30 11:58:01 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:01 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:01 server -> Sending packet 5 (28 bytes) for connection 2dc13afd3ff30578, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.383748ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:01 server -> Sending packet 7 (1045 bytes) for connection 2dc13afd3ff30578, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:01 server -> Sending packet 8 (1045 bytes) for connection 2dc13afd3ff30578, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:01 server <- Reading packet 5 (32 bytes) for connection 8569eac5, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 8569eac5, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 48µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server <- Reading packet 7 (44 bytes) for connection 8569eac5, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 8569eac5, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 808µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:01 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:01 Replacing connection for connection IDs [7e6f1ac0 0093fa62 6a439671 70bd9cb9 d95785eb 8569eac5] with a closed connection. 2025/04/30 11:58:01 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:01 server Connection 2dc13afd3ff30578 closed. 2025/04/30 11:58:01 server <- Received Initial packet. 2025/04/30 11:58:01 Created qlog file: /logs/qlog/07ef99ec6276ca8f.sqlog 2025/04/30 11:58:01 server Changing connection ID to 35522b67. 2025/04/30 11:58:01 Adding connection IDs 07ef99ec6276ca8f and 35522b67 for a new connection. 2025/04/30 11:58:01 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:01 server <- Reading packet 1 (708 bytes) for connection 07ef99ec6276ca8f, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: 07ef99ec6276ca8f, SrcConnectionID: (empty), Token: 0x2d5d8b843b8343969b0e7d360025c034aa1f43f962b36a8f59c79c8013bad3ad5ea344f353f138183cb9f1a6d8ece6a04fe38eaf664378b2527083241a3b5274d0507b96d83bcab5e1267972a0d62c81dca311f96c09, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:01 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:01 server coalesced packet has different destination connection ID: 00000000, expected 07ef99ec6276ca8f 2025/04/30 11:58:01 server -> Sending packet 0 (40 bytes) for connection 07ef99ec6276ca8f, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35522b67, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:01 Tracking 65 connection IDs and 0 reset tokens. 2025/04/30 11:58:01 server <- Reading packet 2 (1252 bytes) for connection 07ef99ec6276ca8f, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: 07ef99ec6276ca8f, SrcConnectionID: (empty), Token: 0x2d5d8b843b8343969b0e7d360025c034aa1f43f962b36a8f59c79c8013bad3ad5ea344f353f138183cb9f1a6d8ece6a04fe38eaf664378b2527083241a3b5274d0507b96d83bcab5e1267972a0d62c81dca311f96c09, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:01 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:01 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:01 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:01 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:01 Adding connection ID 11d80819. 2025/04/30 11:58:01 Adding connection ID 972cd2a8. 2025/04/30 11:58:01 Adding connection ID 563bd9fd. 2025/04/30 11:58:01 Adding connection ID cfeb2318. 2025/04/30 11:58:01 Adding connection ID 1a1ad409. 2025/04/30 11:58:01 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 07ef99ec6276ca8f 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35522b67, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 936, Version: v1} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35522b67, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 972cd2a8, StatelessResetToken: 0xae5d4ea94864354d4fea2304531f3eef} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 563bd9fd, StatelessResetToken: 0xaeb11b4cae3874511b0de607286ee70e} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 11d80819, StatelessResetToken: 0xbae152c9e4ca6e1ed55018f04ab75234} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cfeb2318, StatelessResetToken: 0x2a1ae347f3f5e9254b92f74c12a724e6} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1a1ad409, StatelessResetToken: 0x636076fcf3972ed390efeb3c1c587f19} 2025/04/30 11:58:01 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:01 server -> Sending packet 2 (1280 bytes) for connection 07ef99ec6276ca8f, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35522b67, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:01 server -> Sending packet 3 (1280 bytes) for connection 07ef99ec6276ca8f, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35522b67, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:01 server Parsed a coalesced packet. Part 1: 123 bytes. Remaining: 1129 bytes. 2025/04/30 11:58:01 server <- Reading packet 4 (123 bytes) for connection 35522b67, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: 35522b67, SrcConnectionID: (empty), Token: 0x2d5d8b843b8343969b0e7d360025c034aa1f43f962b36a8f59c79c8013bad3ad5ea344f353f138183cb9f1a6d8ece6a04fe38eaf664378b2527083241a3b5274d0507b96d83bcab5e1267972a0d62c81dca311f96c09, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 400µs} 2025/04/30 11:58:01 server coalesced packet has different destination connection ID: 00000000, expected 35522b67 2025/04/30 11:58:01 server <- Reading packet 5 (1252 bytes) for connection 35522b67, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: 35522b67, SrcConnectionID: (empty), Token: 0x2d5d8b843b8343969b0e7d360025c034aa1f43f962b36a8f59c79c8013bad3ad5ea344f353f138183cb9f1a6d8ece6a04fe38eaf664378b2527083241a3b5274d0507b96d83bcab5e1267972a0d62c81dca311f96c09, PacketNumber: 5, PacketNumberLen: 1, Length: 1151, Version: v1} 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 56µs} 2025/04/30 11:58:01 server newly acked packets (1): [3] 2025/04/30 11:58:01 server updated RTT: 34.108927ms (σ: 17.054463ms) 2025/04/30 11:58:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:58:01 server -> Sending packet 4 (42 bytes) for connection 07ef99ec6276ca8f, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35522b67, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server Parsed a coalesced packet. Part 1: 705 bytes. Remaining: 547 bytes. 2025/04/30 11:58:01 server <- Reading packet 6 (705 bytes) for connection 35522b67, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: 35522b67, SrcConnectionID: (empty), Token: 0x2d5d8b843b8343969b0e7d360025c034aa1f43f962b36a8f59c79c8013bad3ad5ea344f353f138183cb9f1a6d8ece6a04fe38eaf664378b2527083241a3b5274d0507b96d83bcab5e1267972a0d62c81dca311f96c09, PacketNumber: 6, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:58:01 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:58:01 server coalesced packet has different destination connection ID: 00000000, expected 35522b67 2025/04/30 11:58:01 server -> Sending packet 5 (42 bytes) for connection 07ef99ec6276ca8f, Initial 2025/04/30 11:58:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 35522b67, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:58:01 server -> Sending packet 1 (191 bytes) for connection 07ef99ec6276ca8f, Handshake 2025/04/30 11:58:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35522b67, PacketNumber: 1, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:58:01 server -> Sending packet 2 (191 bytes) for connection 07ef99ec6276ca8f, Handshake 2025/04/30 11:58:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 35522b67, PacketNumber: 2, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:58:01 server <- Reading packet 0 (75 bytes) for connection 35522b67, Handshake 2025/04/30 11:58:01 server Long Header{Type: Handshake, DestConnectionID: 35522b67, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:01 server Dropping Initial keys. 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 544µs} 2025/04/30 11:58:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:01 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:01 Retiring connection ID 07ef99ec6276ca8f in 5s. 2025/04/30 11:58:01 server Dropping Handshake keys. 2025/04/30 11:58:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:01 server -> Sending packet 2 (371 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1a1ad409, StatelessResetToken: 0x636076fcf3972ed390efeb3c1c587f19} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cfeb2318, StatelessResetToken: 0x2a1ae347f3f5e9254b92f74c12a724e6} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 11d80819, StatelessResetToken: 0xbae152c9e4ca6e1ed55018f04ab75234} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 563bd9fd, StatelessResetToken: 0xaeb11b4cae3874511b0de607286ee70e} 2025/04/30 11:58:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:01 server -> &wire.NewTokenFrame{Token: 0x6b37aa89642a1ccf99cb66190e57d3166ca4ec11d01aebdac4a5de5d1b411e3904e008daa37216fdc559e6ef773f9bfdfcbaabb500d935071a572474ba490326c7c353a936047eeb66362821f0582d37b056fcefdec8} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 972cd2a8, StatelessResetToken: 0xae5d4ea94864354d4fea2304531f3eef} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:01 server -> Sending packet 3 (371 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 563bd9fd, StatelessResetToken: 0xaeb11b4cae3874511b0de607286ee70e} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cfeb2318, StatelessResetToken: 0x2a1ae347f3f5e9254b92f74c12a724e6} 2025/04/30 11:58:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:01 server -> &wire.NewTokenFrame{Token: 0x6b37aa89642a1ccf99cb66190e57d3166ca4ec11d01aebdac4a5de5d1b411e3904e008daa37216fdc559e6ef773f9bfdfcbaabb500d935071a572474ba490326c7c353a936047eeb66362821f0582d37b056fcefdec8} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 972cd2a8, StatelessResetToken: 0xae5d4ea94864354d4fea2304531f3eef} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 11d80819, StatelessResetToken: 0xbae152c9e4ca6e1ed55018f04ab75234} 2025/04/30 11:58:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1a1ad409, StatelessResetToken: 0x636076fcf3972ed390efeb3c1c587f19} 2025/04/30 11:58:01 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:58:01 server <- Reading packet 0 (42 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 35522b67, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:01 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:01 server -> Sending packet 4 (27 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 216.017µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:01 Received request: GET /fznxquvgop 2025/04/30 11:58:01 server -> Sending packet 5 (1045 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:01 server <- Reading packet 1 (1352 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 35522b67, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 256µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server <- &wire.PingFrame{} 2025/04/30 11:58:01 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:01 server <- Reading packet 2 (1392 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 35522b67, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.PingFrame{} 2025/04/30 11:58:01 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:58:01 server -> Sending packet 6 (27 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 63.919µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server <- Reading packet 3 (31 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 35522b67, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 21.224ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server newly acked packets (1): [3] 2025/04/30 11:58:01 server ECN capability confirmed. 2025/04/30 11:58:01 server <- Reading packet 4 (1444 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 35522b67, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.PingFrame{} 2025/04/30 11:58:01 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:01 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:01 server -> Sending packet 7 (28 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 25.368008ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:01 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 11:58:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:01 server -> Sending packet 9 (1045 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:01 server -> Sending packet 10 (1045 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:01 server <- Reading packet 6 (25 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:01 server Short Header{DestConnectionID: 35522b67, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:01 server <- &wire.PingFrame{} 2025/04/30 11:58:01 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:01 server -> Sending packet 11 (1366 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.PingFrame{} 2025/04/30 11:58:01 server -> Sending packet 12 (29 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:01 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:01 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 0}}, DelayTime: 118.653µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server <- Reading packet 8 (32 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:02 server Short Header{DestConnectionID: 35522b67, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:02 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 6}}, DelayTime: 40µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server newly acked packets (1): [11] 2025/04/30 11:58:02 server updated RTT: 33.827ms (σ: 13.352ms) 2025/04/30 11:58:02 server lost packet 10 (time threshold) 2025/04/30 11:58:02 server Canceling loss detection timer. 2025/04/30 11:58:02 server -> Sending packet 13 (1045 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:02 server <- Reading packet 9 (34 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:02 server Short Header{DestConnectionID: 35522b67, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:02 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 6}}, DelayTime: 32µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server newly acked packets (1): [13] 2025/04/30 11:58:02 server updated RTT: 33.542ms (σ: 10.583ms) 2025/04/30 11:58:02 server Canceling loss detection timer. 2025/04/30 11:58:02 server -> Sending packet 14 (22 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:02 Removing connection ID 3ded2f05ee9098dbac6348e328 after it has been retired. 2025/04/30 11:58:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:02 server -> Sending packet 16 (22 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:02 server -> Sending packet 17 (22 bytes) for connection 07ef99ec6276ca8f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:02 server <- Reading packet 12 (46 bytes) for connection 35522b67, 1-RTT 2025/04/30 11:58:02 server Short Header{DestConnectionID: 35522b67, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:02 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 11, Smallest: 11}, {Largest: 7, Smallest: 6}}, DelayTime: 127.648ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:02 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:02 Replacing connection for connection IDs [35522b67 11d80819 972cd2a8 563bd9fd cfeb2318 1a1ad409] with a closed connection. 2025/04/30 11:58:02 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:02 server Connection 07ef99ec6276ca8f closed. 2025/04/30 11:58:02 Removing connection IDs [1eb3c79e 4e691d09 0807eeb1 af47f070 53638fc2 39b0b95f] for a closed connection after it has been retired. 2025/04/30 11:58:02 server <- Received Initial packet. 2025/04/30 11:58:02 Created qlog file: /logs/qlog/a40638aac4440fc94cbe.sqlog 2025/04/30 11:58:02 server Changing connection ID to f98d29ee. 2025/04/30 11:58:02 Adding connection IDs a40638aac4440fc94cbe and f98d29ee for a new connection. 2025/04/30 11:58:02 server <- Reading packet 0 (1252 bytes) for connection a40638aac4440fc94cbe, Initial 2025/04/30 11:58:02 server Long Header{Type: Initial, DestConnectionID: a40638aac4440fc94cbe, SrcConnectionID: (empty), Token: 0x6b37aa89642a1ccf99cb66190e57d3166ca4ec11d01aebdac4a5de5d1b411e3904e008daa37216fdc559e6ef773f9bfdfcbaabb500d935071a572474ba490326c7c353a936047eeb66362821f0582d37b056fcefdec8, PacketNumber: 0, PacketNumberLen: 1, Length: 1145, Version: v1} 2025/04/30 11:58:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 1124, Offset + Data length: 1124} 2025/04/30 11:58:02 server -> Sending packet 0 (40 bytes) for connection a40638aac4440fc94cbe, Initial 2025/04/30 11:58:02 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f98d29ee, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:02 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server Parsed a coalesced packet. Part 1: 706 bytes. Remaining: 546 bytes. 2025/04/30 11:58:02 server <- Reading packet 2 (706 bytes) for connection f98d29ee, Initial 2025/04/30 11:58:02 server Long Header{Type: Initial, DestConnectionID: f98d29ee, SrcConnectionID: (empty), Token: 0x6b37aa89642a1ccf99cb66190e57d3166ca4ec11d01aebdac4a5de5d1b411e3904e008daa37216fdc559e6ef773f9bfdfcbaabb500d935071a572474ba490326c7c353a936047eeb66362821f0582d37b056fcefdec8, PacketNumber: 2, PacketNumberLen: 1, Length: 605, Version: v1} 2025/04/30 11:58:02 server <- &wire.CryptoFrame{Offset: 1124, Data length: 583, Offset + Data length: 1707} 2025/04/30 11:58:02 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:02 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:02 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:02 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:02 Adding connection ID 3ac7ec14. 2025/04/30 11:58:02 Adding connection ID 6d493988. 2025/04/30 11:58:02 Adding connection ID 971c740b. 2025/04/30 11:58:02 Adding connection ID 522c68ad. 2025/04/30 11:58:02 Adding connection ID c195e059. 2025/04/30 11:58:02 server coalesced packet has different destination connection ID: 00000000, expected f98d29ee 2025/04/30 11:58:02 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a40638aac4440fc94cbe 2025/04/30 11:58:02 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f98d29ee, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 935, Version: v1} 2025/04/30 11:58:02 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:02 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f98d29ee, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 11:58:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c195e059, StatelessResetToken: 0xa6add9377d0ae324b06b41bf350771dd} 2025/04/30 11:58:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 522c68ad, StatelessResetToken: 0x36c412b4af2667fd87a55e1882eab453} 2025/04/30 11:58:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6d493988, StatelessResetToken: 0x59db9038f78baf6fe02739b1d4dd6e05} 2025/04/30 11:58:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 971c740b, StatelessResetToken: 0x40e74e76fccbc05d9af27f5c5cb6cb2a} 2025/04/30 11:58:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3ac7ec14, StatelessResetToken: 0x8f43fe0bdaf54a4a4e12d9dbd0e52eba} 2025/04/30 11:58:02 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:02 server <- Reading packet 3 (124 bytes) for connection f98d29ee, Initial 2025/04/30 11:58:02 server Long Header{Type: Initial, DestConnectionID: f98d29ee, SrcConnectionID: (empty), Token: 0x6b37aa89642a1ccf99cb66190e57d3166ca4ec11d01aebdac4a5de5d1b411e3904e008daa37216fdc559e6ef773f9bfdfcbaabb500d935071a572474ba490326c7c353a936047eeb66362821f0582d37b056fcefdec8, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:02 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 984µs} 2025/04/30 11:58:02 server newly acked packets (1): [1] 2025/04/30 11:58:02 server updated RTT: 32.978364ms (σ: 16.489182ms) 2025/04/30 11:58:02 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:02 server <- Reading packet 0 (75 bytes) for connection f98d29ee, Handshake 2025/04/30 11:58:02 server Long Header{Type: Handshake, DestConnectionID: f98d29ee, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:02 server Dropping Initial keys. 2025/04/30 11:58:02 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 984µs} 2025/04/30 11:58:02 server newly acked packets (1): [0] 2025/04/30 11:58:02 server updated RTT: 32.978ms (σ: 12.366ms) 2025/04/30 11:58:02 server Canceling loss detection timer. 2025/04/30 11:58:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:02 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:02 Retiring connection ID a40638aac4440fc94cbe in 5s. 2025/04/30 11:58:02 server Dropping Handshake keys. 2025/04/30 11:58:02 server -> Sending packet 1 (251 bytes) for connection a40638aac4440fc94cbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:02 server -> &wire.NewTokenFrame{Token: 0x8cdf179e133d7bfd1e4f04f66fb7e508466c1e4a9086790be83e8dc99bc64ea915a150f8b1824c8b60af8e55287ba281e605919ce02f437b9ce10dcb13dbe2b2d117c64c6d8ea5d004a2692581160f2fd63487c74941} 2025/04/30 11:58:02 server <- Reading packet 1 (28 bytes) for connection f98d29ee, 1-RTT 2025/04/30 11:58:02 server Short Header{DestConnectionID: f98d29ee, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:02 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.48ms} 2025/04/30 11:58:02 server newly acked packets (1): [0] 2025/04/30 11:58:02 server updated RTT: 33.014ms (σ: 9.346ms) 2025/04/30 11:58:02 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:58:02 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:58:02 server <- Reading packet 2 (42 bytes) for connection f98d29ee, 1-RTT 2025/04/30 11:58:02 server Short Header{DestConnectionID: f98d29ee, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:02 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:02 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:02 server -> Sending packet 2 (27 bytes) for connection a40638aac4440fc94cbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 115.166µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:02 Received request: GET /djturavloa 2025/04/30 11:58:02 server -> Sending packet 3 (1045 bytes) for connection a40638aac4440fc94cbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:02 server Parsed a coalesced packet. Part 1: 77 bytes. Remaining: 25 bytes. 2025/04/30 11:58:02 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 11:58:02 server <- Reading packet 3 (25 bytes) for connection f98d29ee, 1-RTT 2025/04/30 11:58:02 server Short Header{DestConnectionID: f98d29ee, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:02 server <- &wire.PingFrame{} 2025/04/30 11:58:02 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:02 Removing connection ID fffb2fd5f9fd4e17 after it has been retired. 2025/04/30 11:58:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:02 server -> Sending packet 5 (260 bytes) for connection a40638aac4440fc94cbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 20.316943ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:02 server -> &wire.NewTokenFrame{Token: 0x8cdf179e133d7bfd1e4f04f66fb7e508466c1e4a9086790be83e8dc99bc64ea915a150f8b1824c8b60af8e55287ba281e605919ce02f437b9ce10dcb13dbe2b2d117c64c6d8ea5d004a2692581160f2fd63487c74941} 2025/04/30 11:58:02 server Skipping packet number 4 2025/04/30 11:58:02 server -> Sending packet 6 (1045 bytes) for connection a40638aac4440fc94cbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:02 server -> Sending packet 7 (1366 bytes) for connection a40638aac4440fc94cbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.PingFrame{} 2025/04/30 11:58:02 Removing connection IDs [ed3650fd 610e2305 8ca38365 f2b250c5 cdc63b57 99331f15] for a closed connection after it has been retired. 2025/04/30 11:58:02 server <- Reading packet 4 (32 bytes) for connection f98d29ee, 1-RTT 2025/04/30 11:58:02 server Short Header{DestConnectionID: f98d29ee, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:02 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server newly acked packets (1): [6] 2025/04/30 11:58:02 server updated RTT: 32.884ms (σ: 7.269ms) 2025/04/30 11:58:02 server ECN capability confirmed. 2025/04/30 11:58:02 server setting loss timer for packet 5 (1-RTT) to 36.9945ms (in 2025-04-30 11:58:02.656127606 +0000 UTC m=+7.025008332) 2025/04/30 11:58:02 server -> Sending packet 8 (22 bytes) for connection a40638aac4440fc94cbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:02 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:02 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 43 bytes. 2025/04/30 11:58:02 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 11:58:02 server <- Reading packet 5 (43 bytes) for connection f98d29ee, 1-RTT 2025/04/30 11:58:02 server Short Header{DestConnectionID: f98d29ee, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:02 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 264µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:02 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:02 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:02 Replacing connection for connection IDs [f98d29ee 3ac7ec14 6d493988 971c740b 522c68ad c195e059] with a closed connection. 2025/04/30 11:58:02 server Connection a40638aac4440fc94cbe closed. 2025/04/30 11:58:02 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:03 server <- Received Initial packet. 2025/04/30 11:58:03 Created qlog file: /logs/qlog/449c4acf8f33e8f6.sqlog 2025/04/30 11:58:03 server Changing connection ID to 2e733bab. 2025/04/30 11:58:03 Adding connection IDs 449c4acf8f33e8f6 and 2e733bab for a new connection. 2025/04/30 11:58:03 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:58:03 server <- Reading packet 3 (366 bytes) for connection 449c4acf8f33e8f6, Initial 2025/04/30 11:58:03 server Long Header{Type: Initial, DestConnectionID: 449c4acf8f33e8f6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:58:03 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:58:03 server coalesced packet has different destination connection ID: 00000000, expected 449c4acf8f33e8f6 2025/04/30 11:58:03 server -> Sending packet 0 (40 bytes) for connection 449c4acf8f33e8f6, Initial 2025/04/30 11:58:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e733bab, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:03 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:03 Removing connection ID f56cdcbb1d62f740 after it has been retired. 2025/04/30 11:58:03 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:58:03 server <- Reading packet 6 (1248 bytes) for connection 2e733bab, Initial 2025/04/30 11:58:03 server Long Header{Type: Initial, DestConnectionID: 2e733bab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:58:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:58:03 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:03 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:03 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:03 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:03 Adding connection ID c6ecf84c. 2025/04/30 11:58:03 Adding connection ID ae95d29b. 2025/04/30 11:58:03 Adding connection ID 9b443da5. 2025/04/30 11:58:03 Adding connection ID 1b8985ba. 2025/04/30 11:58:03 Adding connection ID 16342289. 2025/04/30 11:58:03 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:58:03 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 449c4acf8f33e8f6 2025/04/30 11:58:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2e733bab, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 394, Version: v1} 2025/04/30 11:58:03 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:03 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2e733bab, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:58:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:58:03 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae95d29b, StatelessResetToken: 0x34354fc802a7e36cc4f46721dff6a414} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9b443da5, StatelessResetToken: 0x1b4722ca529cb5966d9767e04676f5a5} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 16342289, StatelessResetToken: 0xca34d18e1dcd5ae0826f911557bd4be3} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1b8985ba, StatelessResetToken: 0xbe758188c20d2b6c1eda561668fddf4a} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c6ecf84c, StatelessResetToken: 0xb01edf106775d700cc2e8e017b030d15} 2025/04/30 11:58:03 Removing connection IDs [c9371c4d 4d866258 be22a3a2 ec3b6c2e 35da08db c1a34332] for a closed connection after it has been retired. 2025/04/30 11:58:03 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 36 bytes. 2025/04/30 11:58:03 server <- Reading packet 7 (37 bytes) for connection 2e733bab, Initial 2025/04/30 11:58:03 server Long Header{Type: Initial, DestConnectionID: 2e733bab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:03 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.112ms} 2025/04/30 11:58:03 server newly acked packets (1): [1] 2025/04/30 11:58:03 server updated RTT: 33.561074ms (σ: 16.780537ms) 2025/04/30 11:58:03 server Parsed a coalesced packet. Part 2: 36 bytes. Remaining: 0 bytes. 2025/04/30 11:58:03 server <- Reading packet 0 (36 bytes) for connection 2e733bab, Handshake 2025/04/30 11:58:03 server Long Header{Type: Handshake, DestConnectionID: 2e733bab, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:03 server Dropping Initial keys. 2025/04/30 11:58:03 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.112ms} 2025/04/30 11:58:03 server newly acked packets (1): [0] 2025/04/30 11:58:03 server updated RTT: 33.561ms (σ: 12.585ms) 2025/04/30 11:58:03 server Canceling loss detection timer. 2025/04/30 11:58:03 server Parsed a coalesced packet. Part 1: 77 bytes. Remaining: 42 bytes. 2025/04/30 11:58:03 server <- Reading packet 3 (77 bytes) for connection 2e733bab, Handshake 2025/04/30 11:58:03 server Long Header{Type: Handshake, DestConnectionID: 2e733bab, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 11:58:03 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256.664ms} 2025/04/30 11:58:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:03 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:03 Retiring connection ID 449c4acf8f33e8f6 in 5s. 2025/04/30 11:58:03 server Dropping Handshake keys. 2025/04/30 11:58:03 server <- Reading packet 3 (42 bytes) for connection 2e733bab, 1-RTT 2025/04/30 11:58:03 server Short Header{DestConnectionID: 2e733bab, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:03 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:03 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:03 Received request: GET /ctpsdibjun 2025/04/30 11:58:03 server -> Sending packet 2 (376 bytes) for connection 449c4acf8f33e8f6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:03 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:03 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 326.741µs} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c6ecf84c, StatelessResetToken: 0xb01edf106775d700cc2e8e017b030d15} 2025/04/30 11:58:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9b443da5, StatelessResetToken: 0x1b4722ca529cb5966d9767e04676f5a5} 2025/04/30 11:58:03 server -> &wire.NewTokenFrame{Token: 0x4ede98de0bb5c2b6e80bbc13e548f75d61e3b375bb00518abfab17afe29eeb3386888afb26dce53f09e158dd6d21f3e0c2314af574ebadfdee92699ef4aade17d9bdaa257e6f4c3abf39b4ddd6a7fa37714b66ac610d} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 16342289, StatelessResetToken: 0xca34d18e1dcd5ae0826f911557bd4be3} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1b8985ba, StatelessResetToken: 0xbe758188c20d2b6c1eda561668fddf4a} 2025/04/30 11:58:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae95d29b, StatelessResetToken: 0x34354fc802a7e36cc4f46721dff6a414} 2025/04/30 11:58:03 server -> Sending packet 3 (1280 bytes) for connection 449c4acf8f33e8f6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:03 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9b443da5, StatelessResetToken: 0x1b4722ca529cb5966d9767e04676f5a5} 2025/04/30 11:58:03 server -> &wire.NewTokenFrame{Token: 0x4ede98de0bb5c2b6e80bbc13e548f75d61e3b375bb00518abfab17afe29eeb3386888afb26dce53f09e158dd6d21f3e0c2314af574ebadfdee92699ef4aade17d9bdaa257e6f4c3abf39b4ddd6a7fa37714b66ac610d} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1b8985ba, StatelessResetToken: 0xbe758188c20d2b6c1eda561668fddf4a} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 16342289, StatelessResetToken: 0xca34d18e1dcd5ae0826f911557bd4be3} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c6ecf84c, StatelessResetToken: 0xb01edf106775d700cc2e8e017b030d15} 2025/04/30 11:58:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae95d29b, StatelessResetToken: 0x34354fc802a7e36cc4f46721dff6a414} 2025/04/30 11:58:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:03 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:58:03 server -> Sending packet 4 (140 bytes) for connection 449c4acf8f33e8f6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:03 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:58:03 server <- Reading packet 6 (32 bytes) for connection 2e733bab, 1-RTT 2025/04/30 11:58:03 server Short Header{DestConnectionID: 2e733bab, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:03 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 16µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:03 server newly acked packets (2): [3 4] 2025/04/30 11:58:03 server updated RTT: 33.579ms (σ: 9.474ms) 2025/04/30 11:58:03 server ECN capability confirmed. 2025/04/30 11:58:03 server Canceling loss detection timer. 2025/04/30 11:58:03 server -> Sending packet 5 (22 bytes) for connection 449c4acf8f33e8f6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:03 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:03 server <- Reading packet 7 (43 bytes) for connection 2e733bab, 1-RTT 2025/04/30 11:58:03 server Short Header{DestConnectionID: 2e733bab, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:03 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 192µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:03 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:03 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:03 Replacing connection for connection IDs [2e733bab c6ecf84c ae95d29b 9b443da5 1b8985ba 16342289] with a closed connection. 2025/04/30 11:58:03 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:03 server Connection 449c4acf8f33e8f6 closed. 2025/04/30 11:58:03 Tracking 63 connection IDs and 0 reset tokens. 2025/04/30 11:58:03 Removing connection ID 7e2e002336b61dd1609752 after it has been retired. 2025/04/30 11:58:03 Removing connection IDs [5f426b18 bcc2ac5b ab18e56b 138dd10e d783fa2e a1308be8] for a closed connection after it has been retired. 2025/04/30 11:58:04 server <- Received Initial packet. 2025/04/30 11:58:04 Created qlog file: /logs/qlog/22abc818ba25fbbe.sqlog 2025/04/30 11:58:04 server Changing connection ID to e224dde9. 2025/04/30 11:58:04 Adding connection IDs 22abc818ba25fbbe and e224dde9 for a new connection. 2025/04/30 11:58:04 server <- Reading packet 2 (1252 bytes) for connection 22abc818ba25fbbe, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: 22abc818ba25fbbe, SrcConnectionID: (empty), Token: 0x4ede98de0bb5c2b6e80bbc13e548f75d61e3b375bb00518abfab17afe29eeb3386888afb26dce53f09e158dd6d21f3e0c2314af574ebadfdee92699ef4aade17d9bdaa257e6f4c3abf39b4ddd6a7fa37714b66ac610d, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:04 server -> Sending packet 0 (40 bytes) for connection 22abc818ba25fbbe, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e224dde9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:04 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:58:04 server <- Reading packet 4 (704 bytes) for connection e224dde9, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: e224dde9, SrcConnectionID: (empty), Token: 0x4ede98de0bb5c2b6e80bbc13e548f75d61e3b375bb00518abfab17afe29eeb3386888afb26dce53f09e158dd6d21f3e0c2314af574ebadfdee92699ef4aade17d9bdaa257e6f4c3abf39b4ddd6a7fa37714b66ac610d, PacketNumber: 4, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:04 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:04 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:04 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:04 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:04 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:04 Adding connection ID 811760e8. 2025/04/30 11:58:04 Adding connection ID ee7f9e8d. 2025/04/30 11:58:04 Adding connection ID b5d9eaa5. 2025/04/30 11:58:04 Adding connection ID 96565284. 2025/04/30 11:58:04 Adding connection ID 57ed5315. 2025/04/30 11:58:04 server coalesced packet has different destination connection ID: 00000000, expected e224dde9 2025/04/30 11:58:04 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 22abc818ba25fbbe 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e224dde9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:58:04 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:04 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e224dde9, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 57ed5315, StatelessResetToken: 0xc4c4bef54de7377d299d54e7620fe87c} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 96565284, StatelessResetToken: 0xd149e8a2f0513fe25f455a81f27283ca} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee7f9e8d, StatelessResetToken: 0x9c80b8338dd3782c9ca592867fd4af4c} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811760e8, StatelessResetToken: 0x8784ad9773b5f341c7482b84d47b5179} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b5d9eaa5, StatelessResetToken: 0x034881c5d8ffaddd45063558bfdf0979} 2025/04/30 11:58:04 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:04 server <- Reading packet 5 (124 bytes) for connection e224dde9, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: e224dde9, SrcConnectionID: (empty), Token: 0x4ede98de0bb5c2b6e80bbc13e548f75d61e3b375bb00518abfab17afe29eeb3386888afb26dce53f09e158dd6d21f3e0c2314af574ebadfdee92699ef4aade17d9bdaa257e6f4c3abf39b4ddd6a7fa37714b66ac610d, PacketNumber: 5, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.112ms} 2025/04/30 11:58:04 server newly acked packets (1): [1] 2025/04/30 11:58:04 server updated RTT: 33.011982ms (σ: 16.505991ms) 2025/04/30 11:58:04 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:04 server <- Reading packet 0 (75 bytes) for connection e224dde9, Handshake 2025/04/30 11:58:04 server Long Header{Type: Handshake, DestConnectionID: e224dde9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:04 server Dropping Initial keys. 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.112ms} 2025/04/30 11:58:04 server newly acked packets (1): [0] 2025/04/30 11:58:04 server updated RTT: 33.011ms (σ: 12.378ms) 2025/04/30 11:58:04 server Canceling loss detection timer. 2025/04/30 11:58:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:04 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:04 Retiring connection ID 22abc818ba25fbbe in 5s. 2025/04/30 11:58:04 server Dropping Handshake keys. 2025/04/30 11:58:04 server -> Sending packet 1 (251 bytes) for connection 22abc818ba25fbbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.NewTokenFrame{Token: 0x5974f99712029d189d500dc7752b96fdad44dd13ea87b69fd3eedb7d6a5160a6165915b5f7c1901b54a1d1f909ae3851c64609ab953501d88406d6cd3a89dd57d0a0e5b92866c015a1c3f857f035ec42e9c4a51e6642} 2025/04/30 11:58:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:04 server <- Reading packet 1 (28 bytes) for connection e224dde9, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: e224dde9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.56ms} 2025/04/30 11:58:04 server newly acked packets (1): [0] 2025/04/30 11:58:04 server updated RTT: 35.42ms (σ: 14.102ms) 2025/04/30 11:58:04 server <- Reading packet 2 (1352 bytes) for connection e224dde9, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: e224dde9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.PingFrame{} 2025/04/30 11:58:04 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:04 server -> Sending packet 2 (27 bytes) for connection 22abc818ba25fbbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 83.716µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server <- Reading packet 3 (31 bytes) for connection e224dde9, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: e224dde9, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 21.36ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server newly acked packets (1): [1] 2025/04/30 11:58:04 server updated RTT: 37.524ms (σ: 14.785ms) 2025/04/30 11:58:04 server ECN capability confirmed. 2025/04/30 11:58:04 server Canceling loss detection timer. 2025/04/30 11:58:04 server <- Reading packet 5 (42 bytes) for connection e224dde9, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: e224dde9, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:04 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:04 server <- Reading packet 6 (25 bytes) for connection e224dde9, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: e224dde9, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.PingFrame{} 2025/04/30 11:58:04 server -> Sending packet 3 (29 bytes) for connection 22abc818ba25fbbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 Received request: GET /hjewqkkaqj 2025/04/30 11:58:04 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 140.113µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server -> Sending packet 4 (1045 bytes) for connection 22abc818ba25fbbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:04 server <- Reading packet 7 (32 bytes) for connection e224dde9, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: e224dde9, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 40µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server newly acked packets (1): [4] 2025/04/30 11:58:04 server updated RTT: 36.762ms (σ: 12.612ms) 2025/04/30 11:58:04 server Canceling loss detection timer. 2025/04/30 11:58:04 server -> Sending packet 5 (1366 bytes) for connection 22abc818ba25fbbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.PingFrame{} 2025/04/30 11:58:04 server -> Sending packet 6 (22 bytes) for connection 22abc818ba25fbbe, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:04 Removing connection ID d640981cba6ae50a221939854c94a0d42d after it has been retired. 2025/04/30 11:58:04 server <- Reading packet 9 (44 bytes) for connection e224dde9, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: e224dde9, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 31.92ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:04 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:04 Replacing connection for connection IDs [57ed5315 e224dde9 811760e8 ee7f9e8d b5d9eaa5 96565284] with a closed connection. 2025/04/30 11:58:04 server Connection 22abc818ba25fbbe closed. 2025/04/30 11:58:04 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:04 Removing connection IDs [0f7e73be 43772117 6242b295 9c6b6f43 7c3b0dae 73836618] for a closed connection after it has been retired. 2025/04/30 11:58:04 server <- Received Initial packet. 2025/04/30 11:58:04 Created qlog file: /logs/qlog/a9d028ad686d5677.sqlog 2025/04/30 11:58:04 server Changing connection ID to b9828559. 2025/04/30 11:58:04 Adding connection IDs a9d028ad686d5677 and b9828559 for a new connection. 2025/04/30 11:58:04 server <- Reading packet 0 (1252 bytes) for connection a9d028ad686d5677, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: a9d028ad686d5677, SrcConnectionID: (empty), Token: 0x5974f99712029d189d500dc7752b96fdad44dd13ea87b69fd3eedb7d6a5160a6165915b5f7c1901b54a1d1f909ae3851c64609ab953501d88406d6cd3a89dd57d0a0e5b92866c015a1c3f857f035ec42e9c4a51e6642, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:04 server -> Sending packet 0 (40 bytes) for connection a9d028ad686d5677, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b9828559, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:04 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server <- Reading packet 2 (1252 bytes) for connection a9d028ad686d5677, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: a9d028ad686d5677, SrcConnectionID: (empty), Token: 0x5974f99712029d189d500dc7752b96fdad44dd13ea87b69fd3eedb7d6a5160a6165915b5f7c1901b54a1d1f909ae3851c64609ab953501d88406d6cd3a89dd57d0a0e5b92866c015a1c3f857f035ec42e9c4a51e6642, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:04 server -> Sending packet 1 (42 bytes) for connection a9d028ad686d5677, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b9828559, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:04 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:04 server <- Reading packet 3 (708 bytes) for connection a9d028ad686d5677, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: a9d028ad686d5677, SrcConnectionID: (empty), Token: 0x5974f99712029d189d500dc7752b96fdad44dd13ea87b69fd3eedb7d6a5160a6165915b5f7c1901b54a1d1f909ae3851c64609ab953501d88406d6cd3a89dd57d0a0e5b92866c015a1c3f857f035ec42e9c4a51e6642, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:04 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:04 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:04 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:04 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:04 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:04 Adding connection ID b3f75387. 2025/04/30 11:58:04 Adding connection ID 2e4fed43. 2025/04/30 11:58:04 Adding connection ID dd57ba77. 2025/04/30 11:58:04 Adding connection ID b8e547b1. 2025/04/30 11:58:04 Adding connection ID b6be2052. 2025/04/30 11:58:04 server coalesced packet has different destination connection ID: 00000000, expected a9d028ad686d5677 2025/04/30 11:58:04 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a9d028ad686d5677 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b9828559, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 934, Version: v1} 2025/04/30 11:58:04 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:04 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b9828559, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:58:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b3f75387, StatelessResetToken: 0xa7e81ce50064f2a92455fc6cecf5dde2} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b8e547b1, StatelessResetToken: 0xe3db87631f616cdc8b41e2a71c20e5a1} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dd57ba77, StatelessResetToken: 0xf2e82e008db92027132b4d5f5aa06576} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2e4fed43, StatelessResetToken: 0x8e2f8e6e5789c00eec530953655f746d} 2025/04/30 11:58:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b6be2052, StatelessResetToken: 0x2e18066684ff93062ddefd7497f84a80} 2025/04/30 11:58:04 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:04 server <- Reading packet 5 (124 bytes) for connection b9828559, Initial 2025/04/30 11:58:04 server Long Header{Type: Initial, DestConnectionID: b9828559, SrcConnectionID: (empty), Token: 0x5974f99712029d189d500dc7752b96fdad44dd13ea87b69fd3eedb7d6a5160a6165915b5f7c1901b54a1d1f909ae3851c64609ab953501d88406d6cd3a89dd57d0a0e5b92866c015a1c3f857f035ec42e9c4a51e6642, PacketNumber: 5, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 800µs} 2025/04/30 11:58:04 server newly acked packets (1): [2] 2025/04/30 11:58:04 server updated RTT: 32.707845ms (σ: 16.353922ms) 2025/04/30 11:58:04 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:04 server <- Reading packet 0 (75 bytes) for connection b9828559, Handshake 2025/04/30 11:58:04 server Long Header{Type: Handshake, DestConnectionID: b9828559, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:04 server Dropping Initial keys. 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 800µs} 2025/04/30 11:58:04 server newly acked packets (1): [0] 2025/04/30 11:58:04 server updated RTT: 32.707ms (σ: 12.264ms) 2025/04/30 11:58:04 server Canceling loss detection timer. 2025/04/30 11:58:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:04 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:04 Retiring connection ID a9d028ad686d5677 in 5s. 2025/04/30 11:58:04 server Dropping Handshake keys. 2025/04/30 11:58:04 server <- Reading packet 0 (42 bytes) for connection b9828559, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: b9828559, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:04 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:04 server -> Sending packet 1 (259 bytes) for connection a9d028ad686d5677, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 Received request: GET /ihkvkhptep 2025/04/30 11:58:04 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 341.138µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server -> &wire.NewTokenFrame{Token: 0x3dde2e92b7abce22ba5024ed1f8b34a85039575f761f6a90c74a161ed3e67d932983be228a0d7293a8cca2f7b164aa4f52752463d0e75e9f713baf0527d25327dc4c99f268ed8b5cec31280fc296c6c61ad006ca0e72} 2025/04/30 11:58:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:04 server -> Sending packet 2 (1045 bytes) for connection a9d028ad686d5677, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:04 server <- Reading packet 1 (28 bytes) for connection b9828559, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: b9828559, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.224ms} 2025/04/30 11:58:04 server newly acked packets (1): [0] 2025/04/30 11:58:04 server updated RTT: 32.731ms (σ: 9.247ms) 2025/04/30 11:58:04 server <- Reading packet 2 (32 bytes) for connection b9828559, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: b9828559, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server newly acked packets (1): [2] 2025/04/30 11:58:04 server updated RTT: 32.6ms (σ: 7.196ms) 2025/04/30 11:58:04 server ECN capability confirmed. 2025/04/30 11:58:04 server setting loss timer for packet 1 (1-RTT) to 36.675ms (in 2025-04-30 11:58:04.7474791 +0000 UTC m=+9.116359826) 2025/04/30 11:58:04 server -> Sending packet 3 (22 bytes) for connection a9d028ad686d5677, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:04 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:04 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 43 bytes. 2025/04/30 11:58:04 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 11:58:04 server <- Reading packet 3 (43 bytes) for connection b9828559, 1-RTT 2025/04/30 11:58:04 server Short Header{DestConnectionID: b9828559, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:04 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 240µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:04 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:04 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:04 Replacing connection for connection IDs [b9828559 b3f75387 2e4fed43 dd57ba77 b8e547b1 b6be2052] with a closed connection. 2025/04/30 11:58:04 server Connection a9d028ad686d5677 closed. 2025/04/30 11:58:04 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:04 Removing connection ID 36e1e25181d6eaa5 after it has been retired. 2025/04/30 11:58:04 Removing connection IDs [30766db0 bd85a22b a4e8accf 1f5ac11e 56508a18 09beffcf] for a closed connection after it has been retired. 2025/04/30 11:58:05 Removing connection ID 1877df41d02e765dd815d198 after it has been retired. 2025/04/30 11:58:05 Removing connection IDs [251a4653 26bf19af f01b6f00 ec60286d f12a20d2 fcc69ed3] for a closed connection after it has been retired. 2025/04/30 11:58:05 server <- Received Initial packet. 2025/04/30 11:58:05 Created qlog file: /logs/qlog/1dfffdc883a90e9f03ae8d708d72d11b9cb2ac.sqlog 2025/04/30 11:58:05 server Changing connection ID to 5dab6587. 2025/04/30 11:58:05 Adding connection IDs 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac and 5dab6587 for a new connection. 2025/04/30 11:58:05 server Parsed a coalesced packet. Part 1: 388 bytes. Remaining: 864 bytes. 2025/04/30 11:58:05 server <- Reading packet 3 (388 bytes) for connection 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac, Initial 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 359, Version: v1} 2025/04/30 11:58:05 server <- &wire.CryptoFrame{Offset: 1202, Data length: 337, Offset + Data length: 1539} 2025/04/30 11:58:05 server coalesced packet has different destination connection ID: 00000000, expected 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac 2025/04/30 11:58:05 server -> Sending packet 0 (40 bytes) for connection 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac, Initial 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5dab6587, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:05 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:05 server Parsed a coalesced packet. Part 1: 1237 bytes. Remaining: 15 bytes. 2025/04/30 11:58:05 server <- Reading packet 5 (1237 bytes) for connection 5dab6587, Initial 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: 5dab6587, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1223, Version: v1} 2025/04/30 11:58:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 1202, Offset + Data length: 1202} 2025/04/30 11:58:05 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:05 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:05 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:05 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:05 Adding connection ID c6ea8e10. 2025/04/30 11:58:05 Adding connection ID 7eb405f3. 2025/04/30 11:58:05 Adding connection ID 02e26dc9. 2025/04/30 11:58:05 Adding connection ID 5bbe2cc1. 2025/04/30 11:58:05 Adding connection ID 8593a36b. 2025/04/30 11:58:05 server coalesced packet has different destination connection ID: 00000000, expected 5dab6587 2025/04/30 11:58:05 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5dab6587, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 374, Version: v1} 2025/04/30 11:58:05 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:05 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5dab6587, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 11:58:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 11:58:05 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7eb405f3, StatelessResetToken: 0x70831fd8684d71c0b853df5364a117e8} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5bbe2cc1, StatelessResetToken: 0xd91b3eb9af2d7f61b797960e75aa84d0} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c6ea8e10, StatelessResetToken: 0xd300e7df25a4888e8b4cc97a1941bbb2} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 8593a36b, StatelessResetToken: 0x818be4e768047e68824d41830ae12ccc} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 02e26dc9, StatelessResetToken: 0xa9d24183caf903fe37990632070a59ea} 2025/04/30 11:58:05 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 36 bytes. 2025/04/30 11:58:05 server <- Reading packet 6 (37 bytes) for connection 5dab6587, Initial 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: 5dab6587, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:05 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.24ms} 2025/04/30 11:58:05 server newly acked packets (1): [1] 2025/04/30 11:58:05 server updated RTT: 33.125826ms (σ: 16.562913ms) 2025/04/30 11:58:05 server Parsed a coalesced packet. Part 2: 36 bytes. Remaining: 0 bytes. 2025/04/30 11:58:05 server <- Reading packet 0 (36 bytes) for connection 5dab6587, Handshake 2025/04/30 11:58:05 server Long Header{Type: Handshake, DestConnectionID: 5dab6587, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:05 server Dropping Initial keys. 2025/04/30 11:58:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.24ms} 2025/04/30 11:58:05 server newly acked packets (1): [0] 2025/04/30 11:58:05 server updated RTT: 33.125ms (σ: 12.421ms) 2025/04/30 11:58:05 server Canceling loss detection timer. 2025/04/30 11:58:05 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:58:05 server <- Reading packet 1 (69 bytes) for connection 5dab6587, Handshake 2025/04/30 11:58:05 server Long Header{Type: Handshake, DestConnectionID: 5dab6587, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:58:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:05 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:05 Retiring connection ID 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac in 5s. 2025/04/30 11:58:05 server Dropping Handshake keys. 2025/04/30 11:58:05 server <- Reading packet 0 (42 bytes) for connection 5dab6587, 1-RTT 2025/04/30 11:58:05 server Short Header{DestConnectionID: 5dab6587, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:05 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:05 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:05 server -> Sending packet 1 (259 bytes) for connection 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:05 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:05 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 251.107µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:05 server -> &wire.NewTokenFrame{Token: 0x747b92ab3e2558b0e826982ddc25776034038e6c513c664c25474f55be679f5144c0006575b716a347ada99cdd9810ec6b6d8dd13636ebfa23b0a63d066a22164fa672d4ac08dd263765f01c8aa0c1ec1c04f46eb10c} 2025/04/30 11:58:05 Received request: GET /usnujkbdde 2025/04/30 11:58:05 server -> Sending packet 2 (1045 bytes) for connection 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:05 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:05 server <- Reading packet 1 (28 bytes) for connection 5dab6587, 1-RTT 2025/04/30 11:58:05 server Short Header{DestConnectionID: 5dab6587, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.992ms} 2025/04/30 11:58:05 server newly acked packets (1): [0] 2025/04/30 11:58:05 server updated RTT: 35.579ms (σ: 14.224ms) 2025/04/30 11:58:05 server <- Reading packet 2 (1352 bytes) for connection 5dab6587, 1-RTT 2025/04/30 11:58:05 server Short Header{DestConnectionID: 5dab6587, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:05 server <- &wire.PingFrame{} 2025/04/30 11:58:05 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:05 server <- Reading packet 4 (41 bytes) for connection 5dab6587, 1-RTT 2025/04/30 11:58:05 server Short Header{DestConnectionID: 5dab6587, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:05 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 328µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:05 server newly acked packets (2): [1 2] 2025/04/30 11:58:05 server updated RTT: 35.162ms (σ: 11.5ms) 2025/04/30 11:58:05 server ECN capability confirmed. 2025/04/30 11:58:05 server Canceling loss detection timer. 2025/04/30 11:58:05 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:05 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:05 Replacing connection for connection IDs [c6ea8e10 7eb405f3 02e26dc9 5bbe2cc1 8593a36b 5dab6587] with a closed connection. 2025/04/30 11:58:05 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:05 server Connection 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac closed. 2025/04/30 11:58:05 Removing connection ID 818941910a9add78 after it has been retired. 2025/04/30 11:58:05 Removing connection IDs [4297b738 d21c0933 6b9cfa20 6373225e 3ba8641f 4419d8cd] for a closed connection after it has been retired. 2025/04/30 11:58:05 Tracking 49 connection IDs and 0 reset tokens. 2025/04/30 11:58:05 server <- Received Initial packet. 2025/04/30 11:58:05 Created qlog file: /logs/qlog/0e1021d5b6b8df5c97568a821e.sqlog 2025/04/30 11:58:05 server Changing connection ID to 41a938aa. 2025/04/30 11:58:05 Adding connection IDs 0e1021d5b6b8df5c97568a821e and 41a938aa for a new connection. 2025/04/30 11:58:05 server <- Reading packet 2 (1252 bytes) for connection 0e1021d5b6b8df5c97568a821e, Initial 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: 0e1021d5b6b8df5c97568a821e, SrcConnectionID: (empty), Token: 0x747b92ab3e2558b0e826982ddc25776034038e6c513c664c25474f55be679f5144c0006575b716a347ada99cdd9810ec6b6d8dd13636ebfa23b0a63d066a22164fa672d4ac08dd263765f01c8aa0c1ec1c04f46eb10c, PacketNumber: 2, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:58:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:05 server -> Sending packet 0 (40 bytes) for connection 0e1021d5b6b8df5c97568a821e, Initial 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 41a938aa, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:05 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:05 server Parsed a coalesced packet. Part 1: 718 bytes. Remaining: 534 bytes. 2025/04/30 11:58:05 server <- Reading packet 3 (718 bytes) for connection 0e1021d5b6b8df5c97568a821e, Initial 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: 0e1021d5b6b8df5c97568a821e, SrcConnectionID: (empty), Token: 0x747b92ab3e2558b0e826982ddc25776034038e6c513c664c25474f55be679f5144c0006575b716a347ada99cdd9810ec6b6d8dd13636ebfa23b0a63d066a22164fa672d4ac08dd263765f01c8aa0c1ec1c04f46eb10c, PacketNumber: 3, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:05 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:05 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:05 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:05 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:05 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:05 Adding connection ID a534b5b1. 2025/04/30 11:58:05 Adding connection ID f37d4186. 2025/04/30 11:58:05 Adding connection ID cf3e50b4. 2025/04/30 11:58:05 Adding connection ID 6f28c214. 2025/04/30 11:58:05 Adding connection ID 5a276cd6. 2025/04/30 11:58:05 server coalesced packet has different destination connection ID: 00000000, expected 0e1021d5b6b8df5c97568a821e 2025/04/30 11:58:05 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0e1021d5b6b8df5c97568a821e 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 41a938aa, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 925, Version: v1} 2025/04/30 11:58:05 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:05 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 41a938aa, PacketNumber: 0, PacketNumberLen: 2, Length: 189, Version: v1} 2025/04/30 11:58:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 167, Offset + Data length: 167} 2025/04/30 11:58:05 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 5a276cd6, StatelessResetToken: 0xa56257b7e3c9797d90d67e06d65df08b} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6f28c214, StatelessResetToken: 0x69978ec0611bb2754d7acc131bd0376a} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a534b5b1, StatelessResetToken: 0xef182e151cb8c6ebff784e43137f654f} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f37d4186, StatelessResetToken: 0xbd20db49c4a88940b0692ec2e5423d86} 2025/04/30 11:58:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cf3e50b4, StatelessResetToken: 0xc3bed17bf8b36b290016f0fa2c07bafc} 2025/04/30 11:58:05 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:05 server <- Reading packet 5 (124 bytes) for connection 41a938aa, Initial 2025/04/30 11:58:05 server Long Header{Type: Initial, DestConnectionID: 41a938aa, SrcConnectionID: (empty), Token: 0x747b92ab3e2558b0e826982ddc25776034038e6c513c664c25474f55be679f5144c0006575b716a347ada99cdd9810ec6b6d8dd13636ebfa23b0a63d066a22164fa672d4ac08dd263765f01c8aa0c1ec1c04f46eb10c, PacketNumber: 5, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:05 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 784µs} 2025/04/30 11:58:05 server newly acked packets (1): [1] 2025/04/30 11:58:05 server updated RTT: 32.636731ms (σ: 16.318365ms) 2025/04/30 11:58:05 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:05 server <- Reading packet 0 (75 bytes) for connection 41a938aa, Handshake 2025/04/30 11:58:05 server Long Header{Type: Handshake, DestConnectionID: 41a938aa, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:05 server Dropping Initial keys. 2025/04/30 11:58:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 784µs} 2025/04/30 11:58:05 server newly acked packets (1): [0] 2025/04/30 11:58:05 server updated RTT: 32.636ms (σ: 12.238ms) 2025/04/30 11:58:05 server Canceling loss detection timer. 2025/04/30 11:58:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:05 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:05 Retiring connection ID 0e1021d5b6b8df5c97568a821e in 5s. 2025/04/30 11:58:05 server Dropping Handshake keys. 2025/04/30 11:58:05 server -> Sending packet 1 (251 bytes) for connection 0e1021d5b6b8df5c97568a821e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:05 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:05 server -> &wire.NewTokenFrame{Token: 0xfd2667c0a98ca682aa5a685e4b6ccec71d4b0eced5ceb0c95c65c59a3dfa3e5b921850ae87321aefb17f04271fa65a90f711c2e877b3d20240d094efbfdfe976669ccc128546c092459e87d2868c288cceb7ab3088f7} 2025/04/30 11:58:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:05 server <- Reading packet 1 (28 bytes) for connection 41a938aa, 1-RTT 2025/04/30 11:58:05 server Short Header{DestConnectionID: 41a938aa, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.304ms} 2025/04/30 11:58:05 server newly acked packets (1): [0] 2025/04/30 11:58:05 server updated RTT: 32.688ms (σ: 9.283ms) 2025/04/30 11:58:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:05 server -> Sending packet 3 (251 bytes) for connection 0e1021d5b6b8df5c97568a821e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:05 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:05 server -> &wire.NewTokenFrame{Token: 0xfd2667c0a98ca682aa5a685e4b6ccec71d4b0eced5ceb0c95c65c59a3dfa3e5b921850ae87321aefb17f04271fa65a90f711c2e877b3d20240d094efbfdfe976669ccc128546c092459e87d2868c288cceb7ab3088f7} 2025/04/30 11:58:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:05 server -> Sending packet 4 (251 bytes) for connection 0e1021d5b6b8df5c97568a821e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:05 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:05 server -> &wire.NewTokenFrame{Token: 0xfd2667c0a98ca682aa5a685e4b6ccec71d4b0eced5ceb0c95c65c59a3dfa3e5b921850ae87321aefb17f04271fa65a90f711c2e877b3d20240d094efbfdfe976669ccc128546c092459e87d2868c288cceb7ab3088f7} 2025/04/30 11:58:06 Removing connection ID 2dc13afd3ff30578 after it has been retired. 2025/04/30 11:58:06 server <- Reading packet 5 (25 bytes) for connection 41a938aa, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 41a938aa, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.PingFrame{} 2025/04/30 11:58:06 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:06 server -> Sending packet 5 (1366 bytes) for connection 0e1021d5b6b8df5c97568a821e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.PingFrame{} 2025/04/30 11:58:06 server -> Sending packet 6 (29 bytes) for connection 0e1021d5b6b8df5c97568a821e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 197.57µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server <- Reading packet 8 (42 bytes) for connection 41a938aa, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 41a938aa, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:06 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:06 server -> Sending packet 7 (31 bytes) for connection 0e1021d5b6b8df5c97568a821e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 Received request: GET /ctecxvhjgc 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 120.827µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server -> Sending packet 8 (1045 bytes) for connection 0e1021d5b6b8df5c97568a821e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:06 server <- Reading packet 9 (30 bytes) for connection 41a938aa, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 41a938aa, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, DelayTime: 32µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server newly acked packets (3): [4 5 8] 2025/04/30 11:58:06 server updated RTT: 32.543ms (σ: 7.251ms) 2025/04/30 11:58:06 server ECN capability confirmed. 2025/04/30 11:58:06 server Canceling loss detection timer. 2025/04/30 11:58:06 server -> Sending packet 9 (22 bytes) for connection 0e1021d5b6b8df5c97568a821e, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:06 server <- Reading packet 10 (41 bytes) for connection 41a938aa, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 41a938aa, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, DelayTime: 232µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:06 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:06 Replacing connection for connection IDs [5a276cd6 41a938aa a534b5b1 f37d4186 cf3e50b4 6f28c214] with a closed connection. 2025/04/30 11:58:06 server Connection 0e1021d5b6b8df5c97568a821e closed. 2025/04/30 11:58:06 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:06 Removing connection IDs [7e6f1ac0 0093fa62 6a439671 70bd9cb9 d95785eb 8569eac5] for a closed connection after it has been retired. 2025/04/30 11:58:06 server <- Received Initial packet. 2025/04/30 11:58:06 Created qlog file: /logs/qlog/81d2d67c083d12c5.sqlog 2025/04/30 11:58:06 server Changing connection ID to 9c49e101. 2025/04/30 11:58:06 Adding connection IDs 81d2d67c083d12c5 and 9c49e101 for a new connection. 2025/04/30 11:58:06 server <- Reading packet 0 (1252 bytes) for connection 81d2d67c083d12c5, Initial 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: 81d2d67c083d12c5, SrcConnectionID: (empty), Token: 0xfd2667c0a98ca682aa5a685e4b6ccec71d4b0eced5ceb0c95c65c59a3dfa3e5b921850ae87321aefb17f04271fa65a90f711c2e877b3d20240d094efbfdfe976669ccc128546c092459e87d2868c288cceb7ab3088f7, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:06 server -> Sending packet 0 (40 bytes) for connection 81d2d67c083d12c5, Initial 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9c49e101, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:06 server <- Reading packet 1 (708 bytes) for connection 81d2d67c083d12c5, Initial 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: 81d2d67c083d12c5, SrcConnectionID: (empty), Token: 0xfd2667c0a98ca682aa5a685e4b6ccec71d4b0eced5ceb0c95c65c59a3dfa3e5b921850ae87321aefb17f04271fa65a90f711c2e877b3d20240d094efbfdfe976669ccc128546c092459e87d2868c288cceb7ab3088f7, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:06 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:06 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:06 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:06 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:06 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:06 Adding connection ID 1ccb8ff8. 2025/04/30 11:58:06 Adding connection ID aeac8c69. 2025/04/30 11:58:06 Adding connection ID 81c1a7fc. 2025/04/30 11:58:06 Adding connection ID dfe545d0. 2025/04/30 11:58:06 Adding connection ID 10abc6cd. 2025/04/30 11:58:06 server coalesced packet has different destination connection ID: 00000000, expected 81d2d67c083d12c5 2025/04/30 11:58:06 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 81d2d67c083d12c5 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9c49e101, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 943, Version: v1} 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9c49e101, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 11:58:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1ccb8ff8, StatelessResetToken: 0x4da28f8d1b9a3255783812e651dee172} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 10abc6cd, StatelessResetToken: 0x8002d564225a4dd65d9a1c1a4e931404} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dfe545d0, StatelessResetToken: 0x02eca8d6014bb6d320319d02d4b48889} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aeac8c69, StatelessResetToken: 0x97c4f8e7d67b9c90427eb7cff7a2985c} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 81c1a7fc, StatelessResetToken: 0x207a70435eb993ec214f28e6ebd0bdbc} 2025/04/30 11:58:06 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:06 server <- Reading packet 2 (124 bytes) for connection 9c49e101, Initial 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: 9c49e101, SrcConnectionID: (empty), Token: 0xfd2667c0a98ca682aa5a685e4b6ccec71d4b0eced5ceb0c95c65c59a3dfa3e5b921850ae87321aefb17f04271fa65a90f711c2e877b3d20240d094efbfdfe976669ccc128546c092459e87d2868c288cceb7ab3088f7, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 928µs} 2025/04/30 11:58:06 server newly acked packets (1): [1] 2025/04/30 11:58:06 server updated RTT: 32.86758ms (σ: 16.43379ms) 2025/04/30 11:58:06 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:06 server <- Reading packet 0 (75 bytes) for connection 9c49e101, Handshake 2025/04/30 11:58:06 server Long Header{Type: Handshake, DestConnectionID: 9c49e101, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:06 server Dropping Initial keys. 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 928µs} 2025/04/30 11:58:06 server newly acked packets (1): [0] 2025/04/30 11:58:06 server updated RTT: 32.867ms (σ: 12.324ms) 2025/04/30 11:58:06 server Canceling loss detection timer. 2025/04/30 11:58:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:06 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:06 Retiring connection ID 81d2d67c083d12c5 in 5s. 2025/04/30 11:58:06 server Dropping Handshake keys. 2025/04/30 11:58:06 server -> Sending packet 1 (251 bytes) for connection 81d2d67c083d12c5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:06 server -> &wire.NewTokenFrame{Token: 0xcca6ce995d00a0d3c466e33b5d13a83441b084cfccf40b80ccf4af0897552826cd01d691085474edeebd6fd7225a2d5d8bbc8755b32fc6e91da246cec4538676ca63f923803c3b16681c6f91cd38ae6f38012dd93424} 2025/04/30 11:58:06 server <- Reading packet 0 (42 bytes) for connection 9c49e101, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 9c49e101, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:06 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:06 server -> Sending packet 2 (27 bytes) for connection 81d2d67c083d12c5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 279.2µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:06 Received request: GET /yjnpklisof 2025/04/30 11:58:06 server -> Sending packet 3 (1045 bytes) for connection 81d2d67c083d12c5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:06 server <- Reading packet 1 (28 bytes) for connection 9c49e101, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 9c49e101, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.408ms} 2025/04/30 11:58:06 server newly acked packets (1): [0] 2025/04/30 11:58:06 server updated RTT: 32.897ms (σ: 9.304ms) 2025/04/30 11:58:06 server <- Reading packet 2 (1352 bytes) for connection 9c49e101, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 9c49e101, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.PingFrame{} 2025/04/30 11:58:06 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:06 server <- Reading packet 3 (30 bytes) for connection 9c49e101, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 9c49e101, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server newly acked packets (2): [1 3] 2025/04/30 11:58:06 server updated RTT: 32.808ms (σ: 7.154ms) 2025/04/30 11:58:06 server ECN capability confirmed. 2025/04/30 11:58:06 server Canceling loss detection timer. 2025/04/30 11:58:06 server -> Sending packet 4 (30 bytes) for connection 81d2d67c083d12c5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 190.526µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:06 server <- Reading packet 4 (41 bytes) for connection 9c49e101, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 9c49e101, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 216µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:06 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:06 Replacing connection for connection IDs [aeac8c69 81c1a7fc dfe545d0 10abc6cd 9c49e101 1ccb8ff8] with a closed connection. 2025/04/30 11:58:06 server Connection 81d2d67c083d12c5 closed. 2025/04/30 11:58:06 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:06 server <- Received Initial packet. 2025/04/30 11:58:06 Created qlog file: /logs/qlog/fd4a815fb5d0248b.sqlog 2025/04/30 11:58:06 server Changing connection ID to 7b5cf2f9. 2025/04/30 11:58:06 Adding connection IDs fd4a815fb5d0248b and 7b5cf2f9 for a new connection. 2025/04/30 11:58:06 server <- Reading packet 0 (1252 bytes) for connection fd4a815fb5d0248b, Initial 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: fd4a815fb5d0248b, SrcConnectionID: (empty), Token: 0xcca6ce995d00a0d3c466e33b5d13a83441b084cfccf40b80ccf4af0897552826cd01d691085474edeebd6fd7225a2d5d8bbc8755b32fc6e91da246cec4538676ca63f923803c3b16681c6f91cd38ae6f38012dd93424, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:06 server -> Sending packet 0 (40 bytes) for connection fd4a815fb5d0248b, Initial 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7b5cf2f9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:06 server <- Reading packet 1 (708 bytes) for connection fd4a815fb5d0248b, Initial 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: fd4a815fb5d0248b, SrcConnectionID: (empty), Token: 0xcca6ce995d00a0d3c466e33b5d13a83441b084cfccf40b80ccf4af0897552826cd01d691085474edeebd6fd7225a2d5d8bbc8755b32fc6e91da246cec4538676ca63f923803c3b16681c6f91cd38ae6f38012dd93424, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:06 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:06 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:06 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:06 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:06 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:06 Adding connection ID ab1af06d. 2025/04/30 11:58:06 Adding connection ID 2ae234a3. 2025/04/30 11:58:06 Adding connection ID b94a67d9. 2025/04/30 11:58:06 Adding connection ID eeca3b58. 2025/04/30 11:58:06 Adding connection ID a4aae65c. 2025/04/30 11:58:06 server coalesced packet has different destination connection ID: 00000000, expected fd4a815fb5d0248b 2025/04/30 11:58:06 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fd4a815fb5d0248b 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7b5cf2f9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b5cf2f9, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2ae234a3, StatelessResetToken: 0xee81c8503c9b937e1ff99efd91cb5e3a} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a4aae65c, StatelessResetToken: 0x81dea05f3c3e3fddc52e5d15d77fadfd} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: eeca3b58, StatelessResetToken: 0xc880915d3bf52110a9388024c00af0e2} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ab1af06d, StatelessResetToken: 0xd14c96b97ba4b2938bad9b0fbfa0d8b8} 2025/04/30 11:58:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b94a67d9, StatelessResetToken: 0x4682a35e197641935123982484ae3dfa} 2025/04/30 11:58:06 Removing connection ID 07ef99ec6276ca8f after it has been retired. 2025/04/30 11:58:06 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:06 server <- Reading packet 2 (124 bytes) for connection 7b5cf2f9, Initial 2025/04/30 11:58:06 server Long Header{Type: Initial, DestConnectionID: 7b5cf2f9, SrcConnectionID: (empty), Token: 0xcca6ce995d00a0d3c466e33b5d13a83441b084cfccf40b80ccf4af0897552826cd01d691085474edeebd6fd7225a2d5d8bbc8755b32fc6e91da246cec4538676ca63f923803c3b16681c6f91cd38ae6f38012dd93424, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 928µs} 2025/04/30 11:58:06 server newly acked packets (1): [1] 2025/04/30 11:58:06 server updated RTT: 32.813721ms (σ: 16.40686ms) 2025/04/30 11:58:06 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:06 server <- Reading packet 0 (75 bytes) for connection 7b5cf2f9, Handshake 2025/04/30 11:58:06 server Long Header{Type: Handshake, DestConnectionID: 7b5cf2f9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:06 server Dropping Initial keys. 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 928µs} 2025/04/30 11:58:06 server newly acked packets (1): [0] 2025/04/30 11:58:06 server updated RTT: 32.813ms (σ: 12.304ms) 2025/04/30 11:58:06 server Canceling loss detection timer. 2025/04/30 11:58:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:06 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:06 Retiring connection ID fd4a815fb5d0248b in 5s. 2025/04/30 11:58:06 server Dropping Handshake keys. 2025/04/30 11:58:06 server <- Reading packet 0 (42 bytes) for connection 7b5cf2f9, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 7b5cf2f9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:06 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:06 server -> Sending packet 1 (259 bytes) for connection fd4a815fb5d0248b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392.224µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:06 server -> &wire.NewTokenFrame{Token: 0x32622cbe960277c948cbfebd622ffddb217c41deaa9034a69033df02ce07f8eac19bbf2c3a2dc2b9d2e67bad078808efeb182ee447e560bd9bb31cdcf053ce99696c601ac3d6879f8d1d86d9d1ba22cbf1e84fc7a2ea} 2025/04/30 11:58:06 Received request: GET /afwgaryvbv 2025/04/30 11:58:06 server -> Sending packet 2 (1045 bytes) for connection fd4a815fb5d0248b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:06 server <- Reading packet 1 (28 bytes) for connection 7b5cf2f9, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 7b5cf2f9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.384ms} 2025/04/30 11:58:06 server newly acked packets (1): [0] 2025/04/30 11:58:06 server updated RTT: 32.844ms (σ: 9.29ms) 2025/04/30 11:58:06 server <- Reading packet 2 (32 bytes) for connection 7b5cf2f9, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 7b5cf2f9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server newly acked packets (1): [2] 2025/04/30 11:58:06 server updated RTT: 32.676ms (σ: 7.302ms) 2025/04/30 11:58:06 server ECN capability confirmed. 2025/04/30 11:58:06 server setting loss timer for packet 1 (1-RTT) to 36.7605ms (in 2025-04-30 11:58:06.829890131 +0000 UTC m=+11.198770847) 2025/04/30 11:58:06 server -> Sending packet 3 (22 bytes) for connection fd4a815fb5d0248b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:06 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:58:06.829890131 +0000 UTC m=+11.198770847 2025/04/30 11:58:06 server lost packet 1 (time threshold) 2025/04/30 11:58:06 server -> Sending packet 4 (251 bytes) for connection fd4a815fb5d0248b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:06 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:06 server -> &wire.NewTokenFrame{Token: 0x32622cbe960277c948cbfebd622ffddb217c41deaa9034a69033df02ce07f8eac19bbf2c3a2dc2b9d2e67bad078808efeb182ee447e560bd9bb31cdcf053ce99696c601ac3d6879f8d1d86d9d1ba22cbf1e84fc7a2ea} 2025/04/30 11:58:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:06 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 44 bytes. 2025/04/30 11:58:06 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 11:58:06 server <- Reading packet 4 (44 bytes) for connection 7b5cf2f9, 1-RTT 2025/04/30 11:58:06 server Short Header{DestConnectionID: 7b5cf2f9, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:06 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 30.776ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:06 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:06 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:06 Replacing connection for connection IDs [7b5cf2f9 ab1af06d 2ae234a3 b94a67d9 eeca3b58 a4aae65c] with a closed connection. 2025/04/30 11:58:06 server Connection fd4a815fb5d0248b closed. 2025/04/30 11:58:06 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:07 server <- Received Initial packet. 2025/04/30 11:58:07 Created qlog file: /logs/qlog/39dbcd368fa08ccb1a17ac0f3f6be5e7a2.sqlog 2025/04/30 11:58:07 server Changing connection ID to 3b8cb496. 2025/04/30 11:58:07 Adding connection IDs 39dbcd368fa08ccb1a17ac0f3f6be5e7a2 and 3b8cb496 for a new connection. 2025/04/30 11:58:07 server Parsed a coalesced packet. Part 1: 384 bytes. Remaining: 868 bytes. 2025/04/30 11:58:07 server <- Reading packet 1 (384 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, Initial 2025/04/30 11:58:07 server Long Header{Type: Initial, DestConnectionID: 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 357, Version: v1} 2025/04/30 11:58:07 server <- &wire.CryptoFrame{Offset: 1204, Data length: 335, Offset + Data length: 1539} 2025/04/30 11:58:07 server coalesced packet has different destination connection ID: 00000000, expected 39dbcd368fa08ccb1a17ac0f3f6be5e7a2 2025/04/30 11:58:07 server -> Sending packet 0 (40 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, Initial 2025/04/30 11:58:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b8cb496, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:07 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:07 Removing connection IDs [35522b67 11d80819 972cd2a8 563bd9fd cfeb2318 1a1ad409] for a closed connection after it has been retired. 2025/04/30 11:58:07 Removing connection ID a40638aac4440fc94cbe after it has been retired. 2025/04/30 11:58:07 Tracking 57 connection IDs and 0 reset tokens. 2025/04/30 11:58:07 Removing connection IDs [f98d29ee 3ac7ec14 6d493988 971c740b 522c68ad c195e059] for a closed connection after it has been retired. 2025/04/30 11:58:07 server Parsed a coalesced packet. Part 1: 384 bytes. Remaining: 868 bytes. 2025/04/30 11:58:07 server <- Reading packet 5 (384 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, Initial 2025/04/30 11:58:07 server Long Header{Type: Initial, DestConnectionID: 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 357, Version: v1} 2025/04/30 11:58:07 server <- &wire.CryptoFrame{Offset: 1204, Data length: 335, Offset + Data length: 1539} 2025/04/30 11:58:07 server coalesced packet has different destination connection ID: 00000000, expected 39dbcd368fa08ccb1a17ac0f3f6be5e7a2 2025/04/30 11:58:07 server -> Sending packet 1 (42 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, Initial 2025/04/30 11:58:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b8cb496, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:07 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:08 Removing connection ID 449c4acf8f33e8f6 after it has been retired. 2025/04/30 11:58:08 Removing connection IDs [2e733bab c6ecf84c ae95d29b 9b443da5 1b8985ba 16342289] for a closed connection after it has been retired. 2025/04/30 11:58:09 Removing connection ID 22abc818ba25fbbe after it has been retired. 2025/04/30 11:58:09 server Parsed a coalesced packet. Part 1: 384 bytes. Remaining: 868 bytes. 2025/04/30 11:58:09 server <- Reading packet 7 (384 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, Initial 2025/04/30 11:58:09 server Long Header{Type: Initial, DestConnectionID: 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 357, Version: v1} 2025/04/30 11:58:09 server <- &wire.CryptoFrame{Offset: 1204, Data length: 335, Offset + Data length: 1539} 2025/04/30 11:58:09 server coalesced packet has different destination connection ID: 00000000, expected 39dbcd368fa08ccb1a17ac0f3f6be5e7a2 2025/04/30 11:58:09 server -> Sending packet 2 (44 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, Initial 2025/04/30 11:58:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b8cb496, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 11:58:09 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:09 Removing connection IDs [57ed5315 e224dde9 811760e8 ee7f9e8d b5d9eaa5 96565284] for a closed connection after it has been retired. 2025/04/30 11:58:09 Tracking 37 connection IDs and 0 reset tokens. 2025/04/30 11:58:09 Removing connection ID a9d028ad686d5677 after it has been retired. 2025/04/30 11:58:09 Removing connection IDs [b9828559 b3f75387 2e4fed43 dd57ba77 b8e547b1 b6be2052] for a closed connection after it has been retired. 2025/04/30 11:58:10 Removing connection ID 1dfffdc883a90e9f03ae8d708d72d11b9cb2ac after it has been retired. 2025/04/30 11:58:10 Removing connection IDs [c6ea8e10 7eb405f3 02e26dc9 5bbe2cc1 8593a36b 5dab6587] for a closed connection after it has been retired. 2025/04/30 11:58:10 Removing connection ID 0e1021d5b6b8df5c97568a821e after it has been retired. 2025/04/30 11:58:11 Removing connection IDs [5a276cd6 41a938aa a534b5b1 f37d4186 cf3e50b4 6f28c214] for a closed connection after it has been retired. 2025/04/30 11:58:11 Removing connection ID 81d2d67c083d12c5 after it has been retired. 2025/04/30 11:58:11 Removing connection IDs [aeac8c69 81c1a7fc dfe545d0 10abc6cd 9c49e101 1ccb8ff8] for a closed connection after it has been retired. 2025/04/30 11:58:11 server <- Reading packet 8 (1252 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, Initial 2025/04/30 11:58:11 server Long Header{Type: Initial, DestConnectionID: 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 1225, Version: v1} 2025/04/30 11:58:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 1204, Offset + Data length: 1204} 2025/04/30 11:58:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:11 Adding connection ID 38c2cede. 2025/04/30 11:58:11 Adding connection ID 59aa1ca3. 2025/04/30 11:58:11 Adding connection ID 7cb40bfc. 2025/04/30 11:58:11 Adding connection ID 8909aa59. 2025/04/30 11:58:11 Adding connection ID 93b1af12. 2025/04/30 11:58:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2 2025/04/30 11:58:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3b8cb496, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 379, Version: v1} 2025/04/30 11:58:11 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3b8cb496, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:58:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:58:11 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7cb40bfc, StatelessResetToken: 0x1a8567ae01d805e1df0b0b9562c43816} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59aa1ca3, StatelessResetToken: 0x825d0e03ecac5e96fbc346ef9bdff2aa} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 38c2cede, StatelessResetToken: 0xba47d99c61bc9d906588a5ba42327357} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 93b1af12, StatelessResetToken: 0xfc730ea97cdac69f2b0be4787d083bef} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8909aa59, StatelessResetToken: 0xc75c4c94cf3dd64c1ee222056dcb5627} 2025/04/30 11:58:11 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 36 bytes. 2025/04/30 11:58:11 server <- Reading packet 10 (37 bytes) for connection 3b8cb496, Initial 2025/04/30 11:58:11 server Long Header{Type: Initial, DestConnectionID: 3b8cb496, SrcConnectionID: (empty), Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:11 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 1.176ms} 2025/04/30 11:58:11 server newly acked packets (1): [3] 2025/04/30 11:58:11 server updated RTT: 33.176863ms (σ: 16.588431ms) 2025/04/30 11:58:11 server Parsed a coalesced packet. Part 2: 36 bytes. Remaining: 0 bytes. 2025/04/30 11:58:11 server <- Reading packet 0 (36 bytes) for connection 3b8cb496, Handshake 2025/04/30 11:58:11 server Long Header{Type: Handshake, DestConnectionID: 3b8cb496, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:11 server Dropping Initial keys. 2025/04/30 11:58:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.176ms} 2025/04/30 11:58:11 server newly acked packets (1): [0] 2025/04/30 11:58:11 server updated RTT: 33.176ms (σ: 12.441ms) 2025/04/30 11:58:11 server Canceling loss detection timer. 2025/04/30 11:58:11 Tracking 14 connection IDs and 0 reset tokens. 2025/04/30 11:58:11 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:58:11 Removing connection ID fd4a815fb5d0248b after it has been retired. 2025/04/30 11:58:11 Removing connection IDs [7b5cf2f9 ab1af06d 2ae234a3 b94a67d9 eeca3b58 a4aae65c] for a closed connection after it has been retired. 2025/04/30 11:58:11 server Parsed a coalesced packet. Part 1: 77 bytes. Remaining: 42 bytes. 2025/04/30 11:58:11 server <- Reading packet 3 (77 bytes) for connection 3b8cb496, Handshake 2025/04/30 11:58:11 server Long Header{Type: Handshake, DestConnectionID: 3b8cb496, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 11:58:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304.984ms} 2025/04/30 11:58:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:11 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:11 Retiring connection ID 39dbcd368fa08ccb1a17ac0f3f6be5e7a2 in 5s. 2025/04/30 11:58:11 server Dropping Handshake keys. 2025/04/30 11:58:11 server <- Reading packet 3 (42 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:11 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:11 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:11 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:11 server -> Sending packet 2 (376 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:11 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:11 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 292.277µs} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 93b1af12, StatelessResetToken: 0xfc730ea97cdac69f2b0be4787d083bef} 2025/04/30 11:58:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7cb40bfc, StatelessResetToken: 0x1a8567ae01d805e1df0b0b9562c43816} 2025/04/30 11:58:11 Received request: GET /ioswrgrhwc 2025/04/30 11:58:11 server -> &wire.NewTokenFrame{Token: 0xbd437be6bd57353d4a12fd89c9dac49c79f48eb8bb08f922b0117b4289f0ecfe173a46e066e00aa3e8d7c58f63796e60fccb43093b6f1fc72768ba9bbb58a7ed89beb6132c6459203a7e59d1dbf7e45dba147fc99b76} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59aa1ca3, StatelessResetToken: 0x825d0e03ecac5e96fbc346ef9bdff2aa} 2025/04/30 11:58:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8909aa59, StatelessResetToken: 0xc75c4c94cf3dd64c1ee222056dcb5627} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 38c2cede, StatelessResetToken: 0xba47d99c61bc9d906588a5ba42327357} 2025/04/30 11:58:11 server -> Sending packet 3 (1280 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:11 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59aa1ca3, StatelessResetToken: 0x825d0e03ecac5e96fbc346ef9bdff2aa} 2025/04/30 11:58:11 server -> &wire.NewTokenFrame{Token: 0xbd437be6bd57353d4a12fd89c9dac49c79f48eb8bb08f922b0117b4289f0ecfe173a46e066e00aa3e8d7c58f63796e60fccb43093b6f1fc72768ba9bbb58a7ed89beb6132c6459203a7e59d1dbf7e45dba147fc99b76} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7cb40bfc, StatelessResetToken: 0x1a8567ae01d805e1df0b0b9562c43816} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 93b1af12, StatelessResetToken: 0xfc730ea97cdac69f2b0be4787d083bef} 2025/04/30 11:58:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8909aa59, StatelessResetToken: 0xc75c4c94cf3dd64c1ee222056dcb5627} 2025/04/30 11:58:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 38c2cede, StatelessResetToken: 0xba47d99c61bc9d906588a5ba42327357} 2025/04/30 11:58:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:11 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:58:11 server -> Sending packet 4 (140 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:11 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:58:11 server <- Reading packet 1 (28 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:11 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.032ms} 2025/04/30 11:58:11 server <- Reading packet 4 (1352 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:11 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:11 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 304µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:11 server <- &wire.PingFrame{} 2025/04/30 11:58:11 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:11 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:11 server -> Sending packet 5 (27 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:11 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:11 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 25.290244ms} 2025/04/30 11:58:12 server <- Reading packet 6 (25 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.PingFrame{} 2025/04/30 11:58:12 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:12 server -> Sending packet 6 (1366 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.PingFrame{} 2025/04/30 11:58:12 server <- Reading packet 7 (25 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.PingFrame{} 2025/04/30 11:58:12 server -> Sending packet 7 (28 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 78.349µs} 2025/04/30 11:58:12 server <- Reading packet 8 (25 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.PingFrame{} 2025/04/30 11:58:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:12 server <- Reading packet 9 (25 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.PingFrame{} 2025/04/30 11:58:12 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:58:12 server -> Sending packet 8 (28 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 129.853µs} 2025/04/30 11:58:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:58:12 server -> Sending packet 10 (1280 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.NewTokenFrame{Token: 0xbd437be6bd57353d4a12fd89c9dac49c79f48eb8bb08f922b0117b4289f0ecfe173a46e066e00aa3e8d7c58f63796e60fccb43093b6f1fc72768ba9bbb58a7ed89beb6132c6459203a7e59d1dbf7e45dba147fc99b76} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7cb40bfc, StatelessResetToken: 0x1a8567ae01d805e1df0b0b9562c43816} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 93b1af12, StatelessResetToken: 0xfc730ea97cdac69f2b0be4787d083bef} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 59aa1ca3, StatelessResetToken: 0x825d0e03ecac5e96fbc346ef9bdff2aa} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8909aa59, StatelessResetToken: 0xc75c4c94cf3dd64c1ee222056dcb5627} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 38c2cede, StatelessResetToken: 0xba47d99c61bc9d906588a5ba42327357} 2025/04/30 11:58:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:12 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:58:12 server Skipping packet number 9 2025/04/30 11:58:12 server -> Sending packet 11 (140 bytes) for connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:58:12 server <- Reading packet 10 (1444 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 5, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 5, Smallest: 5}}, DelayTime: 136µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server newly acked packets (1): [10] 2025/04/30 11:58:12 server updated RTT: 33.182ms (σ: 9.342ms) 2025/04/30 11:58:12 server ECN capability confirmed. 2025/04/30 11:58:12 server lost packet 6 (time threshold) 2025/04/30 11:58:12 server <- &wire.PingFrame{} 2025/04/30 11:58:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:12 server <- Reading packet 11 (43 bytes) for connection 3b8cb496, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 3b8cb496, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 5, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 5, Smallest: 5}}, DelayTime: 192µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server newly acked packets (1): [11] 2025/04/30 11:58:12 server updated RTT: 33.189ms (σ: 7.022ms) 2025/04/30 11:58:12 server Canceling loss detection timer. 2025/04/30 11:58:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:12 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:12 Replacing connection for connection IDs [38c2cede 59aa1ca3 7cb40bfc 8909aa59 93b1af12 3b8cb496] with a closed connection. 2025/04/30 11:58:12 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:12 server Connection 39dbcd368fa08ccb1a17ac0f3f6be5e7a2 closed. 2025/04/30 11:58:12 server <- Received Initial packet. 2025/04/30 11:58:12 Created qlog file: /logs/qlog/fd32f98a2cf89ad436d9f800e7.sqlog 2025/04/30 11:58:12 server Changing connection ID to 166a6a60. 2025/04/30 11:58:12 Adding connection IDs fd32f98a2cf89ad436d9f800e7 and 166a6a60 for a new connection. 2025/04/30 11:58:12 server Parsed a coalesced packet. Part 1: 718 bytes. Remaining: 534 bytes. 2025/04/30 11:58:12 server <- Reading packet 1 (718 bytes) for connection fd32f98a2cf89ad436d9f800e7, Initial 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: fd32f98a2cf89ad436d9f800e7, SrcConnectionID: (empty), Token: 0xbd437be6bd57353d4a12fd89c9dac49c79f48eb8bb08f922b0117b4289f0ecfe173a46e066e00aa3e8d7c58f63796e60fccb43093b6f1fc72768ba9bbb58a7ed89beb6132c6459203a7e59d1dbf7e45dba147fc99b76, PacketNumber: 1, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:12 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:12 server coalesced packet has different destination connection ID: 00000000, expected fd32f98a2cf89ad436d9f800e7 2025/04/30 11:58:12 server -> Sending packet 0 (40 bytes) for connection fd32f98a2cf89ad436d9f800e7, Initial 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 166a6a60, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:12 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server Parsed a coalesced packet. Part 1: 1243 bytes. Remaining: 9 bytes. 2025/04/30 11:58:12 server <- Reading packet 2 (1243 bytes) for connection 166a6a60, Initial 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: 166a6a60, SrcConnectionID: (empty), Token: 0xbd437be6bd57353d4a12fd89c9dac49c79f48eb8bb08f922b0117b4289f0ecfe173a46e066e00aa3e8d7c58f63796e60fccb43093b6f1fc72768ba9bbb58a7ed89beb6132c6459203a7e59d1dbf7e45dba147fc99b76, PacketNumber: 2, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:58:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:12 Adding connection ID 8f1fdf69. 2025/04/30 11:58:12 Adding connection ID 63aa0412. 2025/04/30 11:58:12 Adding connection ID 2bd33d53. 2025/04/30 11:58:12 Adding connection ID 353dd7f6. 2025/04/30 11:58:12 Adding connection ID d84a2b51. 2025/04/30 11:58:12 server coalesced packet has different destination connection ID: 00000000, expected 166a6a60 2025/04/30 11:58:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fd32f98a2cf89ad436d9f800e7 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 166a6a60, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:58:12 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 166a6a60, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d84a2b51, StatelessResetToken: 0x6fa0f5befbb6389bd03b34cb4c52ca41} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bd33d53, StatelessResetToken: 0xe7ca0618d0beade0a7b811c9efda3832} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63aa0412, StatelessResetToken: 0x4f61ace8c4b88f2997c3277a0357872c} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f1fdf69, StatelessResetToken: 0x5edc6815ace5b094d020a8a1a6f8362f} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 353dd7f6, StatelessResetToken: 0xefe2f05e55f1de9e539f8a825645dfbc} 2025/04/30 11:58:12 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:12 server -> Sending packet 2 (1280 bytes) for connection fd32f98a2cf89ad436d9f800e7, Initial 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 166a6a60, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:12 server -> Sending packet 3 (1280 bytes) for connection fd32f98a2cf89ad436d9f800e7, Initial 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 166a6a60, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:12 server Parsed a coalesced packet. Part 1: 126 bytes. Remaining: 1126 bytes. 2025/04/30 11:58:12 server <- Reading packet 3 (126 bytes) for connection 166a6a60, Initial 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: 166a6a60, SrcConnectionID: (empty), Token: 0xbd437be6bd57353d4a12fd89c9dac49c79f48eb8bb08f922b0117b4289f0ecfe173a46e066e00aa3e8d7c58f63796e60fccb43093b6f1fc72768ba9bbb58a7ed89beb6132c6459203a7e59d1dbf7e45dba147fc99b76, PacketNumber: 3, PacketNumberLen: 1, Length: 25, Version: v1} 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 520µs} 2025/04/30 11:58:12 server coalesced packet has different destination connection ID: 00000000, expected 166a6a60 2025/04/30 11:58:12 server Parsed a coalesced packet. Part 1: 1250 bytes. Remaining: 2 bytes. 2025/04/30 11:58:12 server <- Reading packet 4 (1250 bytes) for connection 166a6a60, Initial 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: 166a6a60, SrcConnectionID: (empty), Token: 0xbd437be6bd57353d4a12fd89c9dac49c79f48eb8bb08f922b0117b4289f0ecfe173a46e066e00aa3e8d7c58f63796e60fccb43093b6f1fc72768ba9bbb58a7ed89beb6132c6459203a7e59d1dbf7e45dba147fc99b76, PacketNumber: 4, PacketNumberLen: 1, Length: 1149, Version: v1} 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs} 2025/04/30 11:58:12 server newly acked packets (1): [3] 2025/04/30 11:58:12 server updated RTT: 34.441856ms (σ: 17.220928ms) 2025/04/30 11:58:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:12 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:58:12 server -> Sending packet 4 (40 bytes) for connection fd32f98a2cf89ad436d9f800e7, Initial 2025/04/30 11:58:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 166a6a60, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:12 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:58:12 server -> Sending packet 1 (194 bytes) for connection fd32f98a2cf89ad436d9f800e7, Handshake 2025/04/30 11:58:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 166a6a60, PacketNumber: 1, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:12 server -> Sending packet 2 (194 bytes) for connection fd32f98a2cf89ad436d9f800e7, Handshake 2025/04/30 11:58:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 166a6a60, PacketNumber: 2, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:12 server <- Reading packet 0 (75 bytes) for connection 166a6a60, Handshake 2025/04/30 11:58:12 server Long Header{Type: Handshake, DestConnectionID: 166a6a60, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:12 server Dropping Initial keys. 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 576µs} 2025/04/30 11:58:12 server newly acked packets (1): [2] 2025/04/30 11:58:12 server updated RTT: 34.104ms (σ: 13.588ms) 2025/04/30 11:58:12 server Canceling loss detection timer. 2025/04/30 11:58:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:12 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:12 Retiring connection ID fd32f98a2cf89ad436d9f800e7 in 5s. 2025/04/30 11:58:12 server Dropping Handshake keys. 2025/04/30 11:58:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:12 server -> Sending packet 2 (371 bytes) for connection fd32f98a2cf89ad436d9f800e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bd33d53, StatelessResetToken: 0xe7ca0618d0beade0a7b811c9efda3832} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f1fdf69, StatelessResetToken: 0x5edc6815ace5b094d020a8a1a6f8362f} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63aa0412, StatelessResetToken: 0x4f61ace8c4b88f2997c3277a0357872c} 2025/04/30 11:58:12 server -> &wire.NewTokenFrame{Token: 0x0cad2c7c8c5c2b583ec7d1835e78ec163f9fc88d2193a2fbbd22129bacc84daf15ee2f6abe854664618460bdf59736e5e60617fbabb3aa63f4f2d899f790d5e50244b8ac3c8df996cb8b9a3dd297c067388f4d479975} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 353dd7f6, StatelessResetToken: 0xefe2f05e55f1de9e539f8a825645dfbc} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d84a2b51, StatelessResetToken: 0x6fa0f5befbb6389bd03b34cb4c52ca41} 2025/04/30 11:58:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:12 server -> Sending packet 3 (371 bytes) for connection fd32f98a2cf89ad436d9f800e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f1fdf69, StatelessResetToken: 0x5edc6815ace5b094d020a8a1a6f8362f} 2025/04/30 11:58:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63aa0412, StatelessResetToken: 0x4f61ace8c4b88f2997c3277a0357872c} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bd33d53, StatelessResetToken: 0xe7ca0618d0beade0a7b811c9efda3832} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d84a2b51, StatelessResetToken: 0x6fa0f5befbb6389bd03b34cb4c52ca41} 2025/04/30 11:58:12 server -> &wire.NewTokenFrame{Token: 0x0cad2c7c8c5c2b583ec7d1835e78ec163f9fc88d2193a2fbbd22129bacc84daf15ee2f6abe854664618460bdf59736e5e60617fbabb3aa63f4f2d899f790d5e50244b8ac3c8df996cb8b9a3dd297c067388f4d479975} 2025/04/30 11:58:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 353dd7f6, StatelessResetToken: 0xefe2f05e55f1de9e539f8a825645dfbc} 2025/04/30 11:58:12 server <- Reading packet 1 (1352 bytes) for connection 166a6a60, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 166a6a60, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 248µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server <- &wire.PingFrame{} 2025/04/30 11:58:12 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:12 server -> Sending packet 4 (27 bytes) for connection fd32f98a2cf89ad436d9f800e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 111.619µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server <- Reading packet 2 (1392 bytes) for connection 166a6a60, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 166a6a60, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.PingFrame{} 2025/04/30 11:58:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:12 server <- Reading packet 3 (31 bytes) for connection 166a6a60, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 166a6a60, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 21.272ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server newly acked packets (1): [3] 2025/04/30 11:58:12 server updated RTT: 33.926ms (σ: 10.546ms) 2025/04/30 11:58:12 server ECN capability confirmed. 2025/04/30 11:58:12 server Canceling loss detection timer. 2025/04/30 11:58:12 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:12 server -> Sending packet 5 (28 bytes) for connection fd32f98a2cf89ad436d9f800e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 6.226004ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server <- Reading packet 4 (42 bytes) for connection 166a6a60, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 166a6a60, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:12 Received request: GET /bzseqjwggj 2025/04/30 11:58:12 server -> Sending packet 6 (1053 bytes) for connection fd32f98a2cf89ad436d9f800e7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:12 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:12 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 256.47µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:12 server <- Reading packet 5 (1444 bytes) for connection 166a6a60, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 166a6a60, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 144µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server newly acked packets (1): [6] 2025/04/30 11:58:12 server updated RTT: 33.771ms (σ: 8.218ms) 2025/04/30 11:58:12 server Canceling loss detection timer. 2025/04/30 11:58:12 server <- &wire.PingFrame{} 2025/04/30 11:58:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:12 server Ignoring all packets below 5. 2025/04/30 11:58:12 server <- Reading packet 6 (44 bytes) for connection 166a6a60, 1-RTT 2025/04/30 11:58:12 server Short Header{DestConnectionID: 166a6a60, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:12 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 512µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:12 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:12 Replacing connection for connection IDs [63aa0412 2bd33d53 353dd7f6 d84a2b51 166a6a60 8f1fdf69] with a closed connection. 2025/04/30 11:58:12 server Connection fd32f98a2cf89ad436d9f800e7 closed. 2025/04/30 11:58:12 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:13 server <- Received Initial packet. 2025/04/30 11:58:13 Created qlog file: /logs/qlog/66ce8fbd3eb14ef2.sqlog 2025/04/30 11:58:13 server Changing connection ID to edc2db3f. 2025/04/30 11:58:13 Adding connection IDs 66ce8fbd3eb14ef2 and edc2db3f for a new connection. 2025/04/30 11:58:13 server <- Reading packet 0 (1252 bytes) for connection 66ce8fbd3eb14ef2, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: 66ce8fbd3eb14ef2, SrcConnectionID: (empty), Token: 0x0cad2c7c8c5c2b583ec7d1835e78ec163f9fc88d2193a2fbbd22129bacc84daf15ee2f6abe854664618460bdf59736e5e60617fbabb3aa63f4f2d899f790d5e50244b8ac3c8df996cb8b9a3dd297c067388f4d479975, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:13 server -> Sending packet 0 (40 bytes) for connection 66ce8fbd3eb14ef2, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: edc2db3f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:13 server <- Reading packet 1 (708 bytes) for connection 66ce8fbd3eb14ef2, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: 66ce8fbd3eb14ef2, SrcConnectionID: (empty), Token: 0x0cad2c7c8c5c2b583ec7d1835e78ec163f9fc88d2193a2fbbd22129bacc84daf15ee2f6abe854664618460bdf59736e5e60617fbabb3aa63f4f2d899f790d5e50244b8ac3c8df996cb8b9a3dd297c067388f4d479975, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:13 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:13 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:13 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:13 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:13 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:13 Adding connection ID 08188c20. 2025/04/30 11:58:13 Adding connection ID 574e5118. 2025/04/30 11:58:13 Adding connection ID dbe09a4e. 2025/04/30 11:58:13 Adding connection ID 473abbe7. 2025/04/30 11:58:13 Adding connection ID 9f641ac6. 2025/04/30 11:58:13 server coalesced packet has different destination connection ID: 00000000, expected 66ce8fbd3eb14ef2 2025/04/30 11:58:13 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 66ce8fbd3eb14ef2 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: edc2db3f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 932, Version: v1} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: edc2db3f, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 473abbe7, StatelessResetToken: 0x4406dbe3e51ea8dcf3a9a3c607cc5900} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 574e5118, StatelessResetToken: 0xe28282039b386af5fd11adeb15885a6b} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dbe09a4e, StatelessResetToken: 0x6b513b9a665f3f207f71953322428b79} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08188c20, StatelessResetToken: 0xc1e4879dd5ea77b747887a88386745ea} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9f641ac6, StatelessResetToken: 0x30c3bcd4f059f3e79a9ae42fcf8d84ac} 2025/04/30 11:58:13 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:13 server <- Reading packet 2 (124 bytes) for connection edc2db3f, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: edc2db3f, SrcConnectionID: (empty), Token: 0x0cad2c7c8c5c2b583ec7d1835e78ec163f9fc88d2193a2fbbd22129bacc84daf15ee2f6abe854664618460bdf59736e5e60617fbabb3aa63f4f2d899f790d5e50244b8ac3c8df996cb8b9a3dd297c067388f4d479975, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:13 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 824µs} 2025/04/30 11:58:13 server newly acked packets (1): [1] 2025/04/30 11:58:13 server updated RTT: 32.907323ms (σ: 16.453661ms) 2025/04/30 11:58:13 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:13 server <- Reading packet 0 (75 bytes) for connection edc2db3f, Handshake 2025/04/30 11:58:13 server Long Header{Type: Handshake, DestConnectionID: edc2db3f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:13 server Dropping Initial keys. 2025/04/30 11:58:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 824µs} 2025/04/30 11:58:13 server newly acked packets (1): [0] 2025/04/30 11:58:13 server updated RTT: 32.907ms (σ: 12.339ms) 2025/04/30 11:58:13 server Canceling loss detection timer. 2025/04/30 11:58:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:13 Retiring connection ID 66ce8fbd3eb14ef2 in 5s. 2025/04/30 11:58:13 server Dropping Handshake keys. 2025/04/30 11:58:13 server <- Reading packet 0 (42 bytes) for connection edc2db3f, 1-RTT 2025/04/30 11:58:13 server Short Header{DestConnectionID: edc2db3f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:13 server -> Sending packet 1 (259 bytes) for connection 66ce8fbd3eb14ef2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 371.976µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:13 server -> &wire.NewTokenFrame{Token: 0x6592f5081545269ddc19b2a2c129ee0b4c8c7e09ab1ce331de10d22832dd3cef0475a46911804345e8b31055e2a600a1611d98ab27063f6f59785be6431d2d71ded256179b15b3fdea13ff1bb73b85d992ca9b96e898} 2025/04/30 11:58:13 Received request: GET /tjifuqgpqc 2025/04/30 11:58:13 server -> Sending packet 2 (1045 bytes) for connection 66ce8fbd3eb14ef2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:13 server -> Sending packet 4 (139 bytes) for connection 66ce8fbd3eb14ef2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9f641ac6, StatelessResetToken: 0x30c3bcd4f059f3e79a9ae42fcf8d84ac} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 473abbe7, StatelessResetToken: 0x4406dbe3e51ea8dcf3a9a3c607cc5900} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08188c20, StatelessResetToken: 0xc1e4879dd5ea77b747887a88386745ea} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dbe09a4e, StatelessResetToken: 0x6b513b9a665f3f207f71953322428b79} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 574e5118, StatelessResetToken: 0xe28282039b386af5fd11adeb15885a6b} 2025/04/30 11:58:13 server Skipping packet number 3 2025/04/30 11:58:13 server -> Sending packet 5 (251 bytes) for connection 66ce8fbd3eb14ef2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:13 server -> &wire.NewTokenFrame{Token: 0x6592f5081545269ddc19b2a2c129ee0b4c8c7e09ab1ce331de10d22832dd3cef0475a46911804345e8b31055e2a600a1611d98ab27063f6f59785be6431d2d71ded256179b15b3fdea13ff1bb73b85d992ca9b96e898} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:13 server <- Reading packet 3 (1352 bytes) for connection edc2db3f, 1-RTT 2025/04/30 11:58:13 server Short Header{DestConnectionID: edc2db3f, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:13 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 272µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server newly acked packets (1): [5] 2025/04/30 11:58:13 server updated RTT: 32.874ms (σ: 9.319ms) 2025/04/30 11:58:13 server ECN capability confirmed. 2025/04/30 11:58:13 server lost packet 2 (time threshold) 2025/04/30 11:58:13 server setting loss timer for packet 4 (1-RTT) to 36.98325ms (in 2025-04-30 11:58:13.364758017 +0000 UTC m=+17.733638733) 2025/04/30 11:58:13 server <- &wire.PingFrame{} 2025/04/30 11:58:13 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:13 server -> Sending packet 6 (1055 bytes) for connection 66ce8fbd3eb14ef2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 190.216µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:13 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:58:13.364758017 +0000 UTC m=+17.733638733 2025/04/30 11:58:13 server lost packet 4 (time threshold) 2025/04/30 11:58:13 server -> Sending packet 7 (139 bytes) for connection 66ce8fbd3eb14ef2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dbe09a4e, StatelessResetToken: 0x6b513b9a665f3f207f71953322428b79} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08188c20, StatelessResetToken: 0xc1e4879dd5ea77b747887a88386745ea} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9f641ac6, StatelessResetToken: 0x30c3bcd4f059f3e79a9ae42fcf8d84ac} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 473abbe7, StatelessResetToken: 0x4406dbe3e51ea8dcf3a9a3c607cc5900} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 574e5118, StatelessResetToken: 0xe28282039b386af5fd11adeb15885a6b} 2025/04/30 11:58:13 server <- Reading packet 4 (34 bytes) for connection edc2db3f, 1-RTT 2025/04/30 11:58:13 server Short Header{DestConnectionID: edc2db3f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:13 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 152µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server newly acked packets (1): [7] 2025/04/30 11:58:13 server updated RTT: 32.656ms (σ: 7.424ms) 2025/04/30 11:58:13 server setting loss timer for packet 6 (1-RTT) to 36.738ms (in 2025-04-30 11:58:13.397350269 +0000 UTC m=+17.766231005) 2025/04/30 11:58:13 server -> Sending packet 8 (1366 bytes) for connection 66ce8fbd3eb14ef2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.PingFrame{} 2025/04/30 11:58:13 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:58:13.397350269 +0000 UTC m=+17.766231005 2025/04/30 11:58:13 server lost packet 6 (time threshold) 2025/04/30 11:58:13 server Canceling loss detection timer. 2025/04/30 11:58:13 server -> Sending packet 9 (1045 bytes) for connection 66ce8fbd3eb14ef2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:13 server <- Reading packet 6 (45 bytes) for connection edc2db3f, 1-RTT 2025/04/30 11:58:13 server Short Header{DestConnectionID: edc2db3f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:13 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 120µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server newly acked packets (2): [8 9] 2025/04/30 11:58:13 server updated RTT: 32.513ms (σ: 5.853ms) 2025/04/30 11:58:13 server Canceling loss detection timer. 2025/04/30 11:58:13 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:13 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:13 Replacing connection for connection IDs [08188c20 574e5118 dbe09a4e 473abbe7 9f641ac6 edc2db3f] with a closed connection. 2025/04/30 11:58:13 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:13 server Connection 66ce8fbd3eb14ef2 closed. 2025/04/30 11:58:13 Tracking 21 connection IDs and 0 reset tokens. 2025/04/30 11:58:13 server <- Received Initial packet. 2025/04/30 11:58:13 Created qlog file: /logs/qlog/d18f2f4de6f60421.sqlog 2025/04/30 11:58:13 server Changing connection ID to c1ce6875. 2025/04/30 11:58:13 Adding connection IDs d18f2f4de6f60421 and c1ce6875 for a new connection. 2025/04/30 11:58:13 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:13 server <- Reading packet 1 (708 bytes) for connection d18f2f4de6f60421, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: d18f2f4de6f60421, SrcConnectionID: (empty), Token: 0x6592f5081545269ddc19b2a2c129ee0b4c8c7e09ab1ce331de10d22832dd3cef0475a46911804345e8b31055e2a600a1611d98ab27063f6f59785be6431d2d71ded256179b15b3fdea13ff1bb73b85d992ca9b96e898, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:13 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:13 server coalesced packet has different destination connection ID: 00000000, expected d18f2f4de6f60421 2025/04/30 11:58:13 server -> Sending packet 0 (40 bytes) for connection d18f2f4de6f60421, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1ce6875, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:58:13 server <- Reading packet 2 (1248 bytes) for connection c1ce6875, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: c1ce6875, SrcConnectionID: (empty), Token: 0x6592f5081545269ddc19b2a2c129ee0b4c8c7e09ab1ce331de10d22832dd3cef0475a46911804345e8b31055e2a600a1611d98ab27063f6f59785be6431d2d71ded256179b15b3fdea13ff1bb73b85d992ca9b96e898, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:13 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:13 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:13 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:13 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:13 Adding connection ID 2d5116db. 2025/04/30 11:58:13 Adding connection ID 05d0f687. 2025/04/30 11:58:13 Adding connection ID da356e50. 2025/04/30 11:58:13 Adding connection ID 59a9282f. 2025/04/30 11:58:13 Adding connection ID a84b4180. 2025/04/30 11:58:13 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:58:13 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d18f2f4de6f60421 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1ce6875, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 944, Version: v1} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c1ce6875, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 05d0f687, StatelessResetToken: 0xb2a9fb35bebdcf18762562aa77004724} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a84b4180, StatelessResetToken: 0x37ae65b5c9c71f40f0f78f73e67bdcc7} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: da356e50, StatelessResetToken: 0xf871280d044badc49d7be38881c5d125} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2d5116db, StatelessResetToken: 0x45370ca49441a407ce1fdca72bc682a3} 2025/04/30 11:58:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 59a9282f, StatelessResetToken: 0xf1acd4cb8614b2165efe23feffd85406} 2025/04/30 11:58:13 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:13 server -> Sending packet 2 (1280 bytes) for connection d18f2f4de6f60421, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1ce6875, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:13 server -> Sending packet 3 (1280 bytes) for connection d18f2f4de6f60421, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1ce6875, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:13 server Parsed a coalesced packet. Part 1: 126 bytes. Remaining: 1126 bytes. 2025/04/30 11:58:13 server <- Reading packet 3 (126 bytes) for connection c1ce6875, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: c1ce6875, SrcConnectionID: (empty), Token: 0x6592f5081545269ddc19b2a2c129ee0b4c8c7e09ab1ce331de10d22832dd3cef0475a46911804345e8b31055e2a600a1611d98ab27063f6f59785be6431d2d71ded256179b15b3fdea13ff1bb73b85d992ca9b96e898, PacketNumber: 3, PacketNumberLen: 1, Length: 25, Version: v1} 2025/04/30 11:58:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 512µs} 2025/04/30 11:58:13 server coalesced packet has different destination connection ID: 00000000, expected c1ce6875 2025/04/30 11:58:13 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:13 server -> Sending packet 1 (183 bytes) for connection d18f2f4de6f60421, Handshake 2025/04/30 11:58:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c1ce6875, PacketNumber: 1, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 11:58:13 server -> Sending packet 2 (183 bytes) for connection d18f2f4de6f60421, Handshake 2025/04/30 11:58:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c1ce6875, PacketNumber: 2, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 11:58:13 server <- Reading packet 4 (1252 bytes) for connection c1ce6875, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: c1ce6875, SrcConnectionID: (empty), Token: 0x6592f5081545269ddc19b2a2c129ee0b4c8c7e09ab1ce331de10d22832dd3cef0475a46911804345e8b31055e2a600a1611d98ab27063f6f59785be6431d2d71ded256179b15b3fdea13ff1bb73b85d992ca9b96e898, PacketNumber: 4, PacketNumberLen: 1, Length: 1151, Version: v1} 2025/04/30 11:58:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 33.152ms} 2025/04/30 11:58:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 1122, Offset + Data length: 1122} 2025/04/30 11:58:13 server -> Sending packet 4 (40 bytes) for connection d18f2f4de6f60421, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1ce6875, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:58:13 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:58:13 server -> Sending packet 5 (1280 bytes) for connection d18f2f4de6f60421, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1ce6875, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:13 server -> Sending packet 6 (1280 bytes) for connection d18f2f4de6f60421, Initial 2025/04/30 11:58:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c1ce6875, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:13 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:58:13 server <- Reading packet 2 (75 bytes) for connection c1ce6875, Handshake 2025/04/30 11:58:13 server Long Header{Type: Handshake, DestConnectionID: c1ce6875, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:13 server Dropping Initial keys. 2025/04/30 11:58:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 100.584ms} 2025/04/30 11:58:13 server newly acked packets (1): [2] 2025/04/30 11:58:13 server updated RTT: 132.728484ms (σ: 66.364242ms) 2025/04/30 11:58:13 server Canceling loss detection timer. 2025/04/30 11:58:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:13 Retiring connection ID d18f2f4de6f60421 in 5s. 2025/04/30 11:58:13 server Dropping Handshake keys. 2025/04/30 11:58:13 server <- Reading packet 1 (42 bytes) for connection c1ce6875, 1-RTT 2025/04/30 11:58:13 server Short Header{DestConnectionID: c1ce6875, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:13 server -> Sending packet 1 (259 bytes) for connection d18f2f4de6f60421, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 316.753µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:13 Received request: GET /piawrlfsho 2025/04/30 11:58:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:13 server -> &wire.NewTokenFrame{Token: 0x16665e01a87cad7c8a5ed77f6c79115e9d3eb2dd3f3539c240e095f05727297cc475200f04653091d8c3c7f8596abcfc9cc5501a75741de921b3235f9de2e50831ad69903143a576919fa31eeae8915e06ff3a9c780d} 2025/04/30 11:58:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:13 server <- Reading packet 0 (42 bytes) for connection c1ce6875, 1-RTT 2025/04/30 11:58:13 server Short Header{DestConnectionID: c1ce6875, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:13 server Queueing ACK because packet 0 was missing before. 2025/04/30 11:58:13 server -> Sending packet 2 (1053 bytes) for connection d18f2f4de6f60421, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 494.756µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:14 server Parsed a coalesced packet. Part 1: 42 bytes. Remaining: 41 bytes. 2025/04/30 11:58:14 server Dropping %!s(logging.PacketType=1) packet (42 bytes) because we already dropped the keys. 2025/04/30 11:58:14 server <- Reading packet 3 (41 bytes) for connection c1ce6875, 1-RTT 2025/04/30 11:58:14 server Short Header{DestConnectionID: c1ce6875, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:14 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 304µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server newly acked packets (1): [2] 2025/04/30 11:58:14 server updated RTT: 120.146ms (σ: 74.936ms) 2025/04/30 11:58:14 server ECN capability confirmed. 2025/04/30 11:58:14 server lost packet 0 (time threshold) 2025/04/30 11:58:14 server setting loss timer for packet 1 (1-RTT) to 135.16425ms (in 2025-04-30 11:58:14.134949759 +0000 UTC m=+18.503830475) 2025/04/30 11:58:14 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:14 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:14 Replacing connection for connection IDs [c1ce6875 2d5116db 05d0f687 da356e50 59a9282f a84b4180] with a closed connection. 2025/04/30 11:58:14 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:14 server Connection d18f2f4de6f60421 closed. 2025/04/30 11:58:14 server <- Received Initial packet. 2025/04/30 11:58:14 Created qlog file: /logs/qlog/7de682ca92192772.sqlog 2025/04/30 11:58:14 server Changing connection ID to 9eba0446. 2025/04/30 11:58:14 Adding connection IDs 7de682ca92192772 and 9eba0446 for a new connection. 2025/04/30 11:58:14 server <- Reading packet 0 (1252 bytes) for connection 7de682ca92192772, Initial 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: 7de682ca92192772, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:58:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:58:14 server -> Sending packet 0 (40 bytes) for connection 7de682ca92192772, Initial 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9eba0446, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:14 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:58:14 server <- Reading packet 1 (366 bytes) for connection 7de682ca92192772, Initial 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: 7de682ca92192772, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:58:14 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:58:14 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:14 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:14 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:14 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:14 Adding connection ID ccdfe9e9. 2025/04/30 11:58:14 Adding connection ID b50a7114. 2025/04/30 11:58:14 Adding connection ID 493f8ddc. 2025/04/30 11:58:14 Adding connection ID 359e35fa. 2025/04/30 11:58:14 Adding connection ID 7c4ae6ca. 2025/04/30 11:58:14 server coalesced packet has different destination connection ID: 00000000, expected 7de682ca92192772 2025/04/30 11:58:14 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7de682ca92192772 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9eba0446, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 393, Version: v1} 2025/04/30 11:58:14 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:14 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9eba0446, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:58:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:58:14 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7c4ae6ca, StatelessResetToken: 0x8692c076f6b0a04e4381b21c89b79400} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 359e35fa, StatelessResetToken: 0x443f407219a883b241257ea4d6cc70a3} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b50a7114, StatelessResetToken: 0x1763c8d813459fd73064c5979db9131d} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ccdfe9e9, StatelessResetToken: 0x32f17122b97ecdb67b87bc61e154628e} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 493f8ddc, StatelessResetToken: 0x6a0122cfd027257100b2032305c4c066} 2025/04/30 11:58:14 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:14 server -> Sending packet 2 (1280 bytes) for connection 7de682ca92192772, Initial 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9eba0446, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:14 server -> Sending packet 3 (1280 bytes) for connection 7de682ca92192772, Initial 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9eba0446, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:14 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 1216 bytes. 2025/04/30 11:58:14 server <- Reading packet 2 (36 bytes) for connection 9eba0446, Initial 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: 9eba0446, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:58:14 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 488µs} 2025/04/30 11:58:14 server coalesced packet has different destination connection ID: 00000000, expected 9eba0446 2025/04/30 11:58:14 server <- Reading packet 3 (1252 bytes) for connection 9eba0446, Initial 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: 9eba0446, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1238, Version: v1} 2025/04/30 11:58:14 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 80µs} 2025/04/30 11:58:14 server newly acked packets (1): [3] 2025/04/30 11:58:14 server updated RTT: 34.526039ms (σ: 17.263019ms) 2025/04/30 11:58:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 1212, Offset + Data length: 1212} 2025/04/30 11:58:14 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:58:14 server -> Sending packet 1 (734 bytes) for connection 7de682ca92192772, Handshake 2025/04/30 11:58:14 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9eba0446, PacketNumber: 1, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:58:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:58:14 server -> Sending packet 2 (734 bytes) for connection 7de682ca92192772, Handshake 2025/04/30 11:58:14 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9eba0446, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:58:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:58:14 server -> Sending packet 4 (40 bytes) for connection 7de682ca92192772, Initial 2025/04/30 11:58:14 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9eba0446, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:14 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server <- Reading packet 2 (33 bytes) for connection 9eba0446, Handshake 2025/04/30 11:58:14 server Long Header{Type: Handshake, DestConnectionID: 9eba0446, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 20, Version: v1} 2025/04/30 11:58:14 server Dropping Initial keys. 2025/04/30 11:58:14 server <- &wire.PingFrame{} 2025/04/30 11:58:14 server -> Sending packet 3 (39 bytes) for connection 7de682ca92192772, Handshake 2025/04/30 11:58:14 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9eba0446, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:14 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:58:14 server <- Reading packet 3 (69 bytes) for connection 9eba0446, Handshake 2025/04/30 11:58:14 server Long Header{Type: Handshake, DestConnectionID: 9eba0446, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:58:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:14 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:14 Retiring connection ID 7de682ca92192772 in 5s. 2025/04/30 11:58:14 server Dropping Handshake keys. 2025/04/30 11:58:14 server <- Reading packet 0 (42 bytes) for connection 9eba0446, 1-RTT 2025/04/30 11:58:14 server Short Header{DestConnectionID: 9eba0446, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:14 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:14 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:14 server -> Sending packet 2 (379 bytes) for connection 7de682ca92192772, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:14 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:14 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 225.382µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7c4ae6ca, StatelessResetToken: 0x8692c076f6b0a04e4381b21c89b79400} 2025/04/30 11:58:14 server -> &wire.NewTokenFrame{Token: 0xb8c41a53584128ab647aafec86a5a29795b31df23a242c4fd54cea102bf0ba152459b260fac512923d789c5228e40243ce0750ce73106b25ad18a319dd2d78b26139665c545662257fa80ec70208b0531b3225ba4875} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 359e35fa, StatelessResetToken: 0x443f407219a883b241257ea4d6cc70a3} 2025/04/30 11:58:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b50a7114, StatelessResetToken: 0x1763c8d813459fd73064c5979db9131d} 2025/04/30 11:58:14 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ccdfe9e9, StatelessResetToken: 0x32f17122b97ecdb67b87bc61e154628e} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 493f8ddc, StatelessResetToken: 0x6a0122cfd027257100b2032305c4c066} 2025/04/30 11:58:14 Received request: GET /rtdjgssimw 2025/04/30 11:58:14 server -> Sending packet 3 (371 bytes) for connection 7de682ca92192772, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:14 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 359e35fa, StatelessResetToken: 0x443f407219a883b241257ea4d6cc70a3} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7c4ae6ca, StatelessResetToken: 0x8692c076f6b0a04e4381b21c89b79400} 2025/04/30 11:58:14 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 493f8ddc, StatelessResetToken: 0x6a0122cfd027257100b2032305c4c066} 2025/04/30 11:58:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:14 server -> &wire.NewTokenFrame{Token: 0xb8c41a53584128ab647aafec86a5a29795b31df23a242c4fd54cea102bf0ba152459b260fac512923d789c5228e40243ce0750ce73106b25ad18a319dd2d78b26139665c545662257fa80ec70208b0531b3225ba4875} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b50a7114, StatelessResetToken: 0x1763c8d813459fd73064c5979db9131d} 2025/04/30 11:58:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ccdfe9e9, StatelessResetToken: 0x32f17122b97ecdb67b87bc61e154628e} 2025/04/30 11:58:14 server -> Sending packet 4 (1045 bytes) for connection 7de682ca92192772, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:14 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:14 server <- Reading packet 2 (1392 bytes) for connection 9eba0446, 1-RTT 2025/04/30 11:58:14 server Short Header{DestConnectionID: 9eba0446, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:14 server <- &wire.PingFrame{} 2025/04/30 11:58:14 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:14 server <- Reading packet 3 (30 bytes) for connection 9eba0446, 1-RTT 2025/04/30 11:58:14 server Short Header{DestConnectionID: 9eba0446, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:14 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server newly acked packets (2): [3 4] 2025/04/30 11:58:14 server updated RTT: 34.374ms (σ: 13.249ms) 2025/04/30 11:58:14 server ECN capability confirmed. 2025/04/30 11:58:14 server Canceling loss detection timer. 2025/04/30 11:58:14 server -> Sending packet 5 (32 bytes) for connection 7de682ca92192772, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:14 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:14 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 150.962µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:14 server <- Reading packet 4 (41 bytes) for connection 9eba0446, 1-RTT 2025/04/30 11:58:14 server Short Header{DestConnectionID: 9eba0446, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:14 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 200µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:14 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:14 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:14 Replacing connection for connection IDs [ccdfe9e9 b50a7114 493f8ddc 359e35fa 7c4ae6ca 9eba0446] with a closed connection. 2025/04/30 11:58:14 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:14 server Connection 7de682ca92192772 closed. 2025/04/30 11:58:15 Tracking 35 connection IDs and 0 reset tokens. 2025/04/30 11:58:16 Removing connection ID 39dbcd368fa08ccb1a17ac0f3f6be5e7a2 after it has been retired. 2025/04/30 11:58:17 Removing connection IDs [38c2cede 59aa1ca3 7cb40bfc 8909aa59 93b1af12 3b8cb496] for a closed connection after it has been retired. 2025/04/30 11:58:17 server <- Received Initial packet. 2025/04/30 11:58:17 Created qlog file: /logs/qlog/c65f0126f509b956d76ce434bc.sqlog 2025/04/30 11:58:17 server Changing connection ID to 80941205. 2025/04/30 11:58:17 Adding connection IDs c65f0126f509b956d76ce434bc and 80941205 for a new connection. 2025/04/30 11:58:17 server <- Reading packet 0 (1252 bytes) for connection c65f0126f509b956d76ce434bc, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: c65f0126f509b956d76ce434bc, SrcConnectionID: (empty), Token: 0xb8c41a53584128ab647aafec86a5a29795b31df23a242c4fd54cea102bf0ba152459b260fac512923d789c5228e40243ce0750ce73106b25ad18a319dd2d78b26139665c545662257fa80ec70208b0531b3225ba4875, PacketNumber: 0, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:58:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:17 server -> Sending packet 0 (40 bytes) for connection c65f0126f509b956d76ce434bc, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 80941205, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server Parsed a coalesced packet. Part 1: 718 bytes. Remaining: 534 bytes. 2025/04/30 11:58:17 server <- Reading packet 1 (718 bytes) for connection c65f0126f509b956d76ce434bc, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: c65f0126f509b956d76ce434bc, SrcConnectionID: (empty), Token: 0xb8c41a53584128ab647aafec86a5a29795b31df23a242c4fd54cea102bf0ba152459b260fac512923d789c5228e40243ce0750ce73106b25ad18a319dd2d78b26139665c545662257fa80ec70208b0531b3225ba4875, PacketNumber: 1, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:17 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:17 Adding connection ID 052aa21b. 2025/04/30 11:58:17 Adding connection ID a1312fb2. 2025/04/30 11:58:17 Adding connection ID e8a1d974. 2025/04/30 11:58:17 Adding connection ID 338a2b12. 2025/04/30 11:58:17 Adding connection ID 1e347ab9. 2025/04/30 11:58:17 server coalesced packet has different destination connection ID: 00000000, expected c65f0126f509b956d76ce434bc 2025/04/30 11:58:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c65f0126f509b956d76ce434bc 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 80941205, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 932, Version: v1} 2025/04/30 11:58:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 80941205, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:58:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 338a2b12, StatelessResetToken: 0xbe8904fe5f48feb95d5f53a19cd44ac4} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1e347ab9, StatelessResetToken: 0x0d5fbc6d13fa2445e12fe28c0f1ab143} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a1312fb2, StatelessResetToken: 0xc844f41af238100b977476616c87a2c4} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 052aa21b, StatelessResetToken: 0x5d9f52bf30bf5759d38579041b8e8d25} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8a1d974, StatelessResetToken: 0xa34605126580bc976b62ebd9ad7b5f53} 2025/04/30 11:58:17 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:17 server <- Reading packet 2 (124 bytes) for connection 80941205, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: 80941205, SrcConnectionID: (empty), Token: 0xb8c41a53584128ab647aafec86a5a29795b31df23a242c4fd54cea102bf0ba152459b260fac512923d789c5228e40243ce0750ce73106b25ad18a319dd2d78b26139665c545662257fa80ec70208b0531b3225ba4875, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 800µs} 2025/04/30 11:58:17 server newly acked packets (1): [1] 2025/04/30 11:58:17 server updated RTT: 32.766944ms (σ: 16.383472ms) 2025/04/30 11:58:17 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:17 server <- Reading packet 0 (75 bytes) for connection 80941205, Handshake 2025/04/30 11:58:17 server Long Header{Type: Handshake, DestConnectionID: 80941205, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:17 server Dropping Initial keys. 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 800µs} 2025/04/30 11:58:17 server newly acked packets (1): [0] 2025/04/30 11:58:17 server updated RTT: 32.766ms (σ: 12.287ms) 2025/04/30 11:58:17 server Canceling loss detection timer. 2025/04/30 11:58:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:17 Retiring connection ID c65f0126f509b956d76ce434bc in 5s. 2025/04/30 11:58:17 server Dropping Handshake keys. 2025/04/30 11:58:17 server <- Reading packet 0 (42 bytes) for connection 80941205, 1-RTT 2025/04/30 11:58:17 server Short Header{DestConnectionID: 80941205, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:17 server -> Sending packet 1 (259 bytes) for connection c65f0126f509b956d76ce434bc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:17 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 344.696µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server -> &wire.NewTokenFrame{Token: 0xcc629965ed7b4b8885ba3b5390c82d2157d15371a949e149725da5802496bb4f04edd45bc9b53b75a5e204c07e913b25e6d852cb92f80ab45843b8fe89df36b3cafc31e1bede84800b797e09dbe9ec7a0eb0f3fc4ba9} 2025/04/30 11:58:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:17 Received request: GET /gtnkqlzjdl 2025/04/30 11:58:17 server -> Sending packet 2 (1045 bytes) for connection c65f0126f509b956d76ce434bc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:17 server <- Reading packet 1 (28 bytes) for connection 80941205, 1-RTT 2025/04/30 11:58:17 server Short Header{DestConnectionID: 80941205, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.256ms} 2025/04/30 11:58:17 server newly acked packets (1): [0] 2025/04/30 11:58:17 server updated RTT: 32.798ms (σ: 9.28ms) 2025/04/30 11:58:17 server <- Reading packet 2 (1352 bytes) for connection 80941205, 1-RTT 2025/04/30 11:58:17 server Short Header{DestConnectionID: 80941205, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:17 server <- &wire.PingFrame{} 2025/04/30 11:58:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:17 server <- Reading packet 3 (30 bytes) for connection 80941205, 1-RTT 2025/04/30 11:58:17 server Short Header{DestConnectionID: 80941205, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server newly acked packets (2): [1 2] 2025/04/30 11:58:17 server updated RTT: 32.734ms (σ: 7.087ms) 2025/04/30 11:58:17 server ECN capability confirmed. 2025/04/30 11:58:17 server Canceling loss detection timer. 2025/04/30 11:58:17 server Ignoring all packets below 1. 2025/04/30 11:58:17 server <- Reading packet 4 (41 bytes) for connection 80941205, 1-RTT 2025/04/30 11:58:17 server Short Header{DestConnectionID: 80941205, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 232µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:17 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:17 Replacing connection for connection IDs [338a2b12 1e347ab9 80941205 052aa21b a1312fb2 e8a1d974] with a closed connection. 2025/04/30 11:58:17 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:17 server Connection c65f0126f509b956d76ce434bc closed. 2025/04/30 11:58:17 Tracking 35 connection IDs and 0 reset tokens. 2025/04/30 11:58:17 server <- Received Initial packet. 2025/04/30 11:58:17 Created qlog file: /logs/qlog/d1c812a6d99b6fffdefb88b6c8.sqlog 2025/04/30 11:58:17 server Changing connection ID to 2335b9a8. 2025/04/30 11:58:17 Adding connection IDs d1c812a6d99b6fffdefb88b6c8 and 2335b9a8 for a new connection. 2025/04/30 11:58:17 server <- Reading packet 0 (1252 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: d1c812a6d99b6fffdefb88b6c8, SrcConnectionID: (empty), Token: 0xcc629965ed7b4b8885ba3b5390c82d2157d15371a949e149725da5802496bb4f04edd45bc9b53b75a5e204c07e913b25e6d852cb92f80ab45843b8fe89df36b3cafc31e1bede84800b797e09dbe9ec7a0eb0f3fc4ba9, PacketNumber: 0, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:58:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:17 server -> Sending packet 0 (40 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server Parsed a coalesced packet. Part 1: 718 bytes. Remaining: 534 bytes. 2025/04/30 11:58:17 server <- Reading packet 1 (718 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: d1c812a6d99b6fffdefb88b6c8, SrcConnectionID: (empty), Token: 0xcc629965ed7b4b8885ba3b5390c82d2157d15371a949e149725da5802496bb4f04edd45bc9b53b75a5e204c07e913b25e6d852cb92f80ab45843b8fe89df36b3cafc31e1bede84800b797e09dbe9ec7a0eb0f3fc4ba9, PacketNumber: 1, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:17 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:17 Adding connection ID d652ff08. 2025/04/30 11:58:17 Adding connection ID 4d4ad77d. 2025/04/30 11:58:17 Adding connection ID 884a96e5. 2025/04/30 11:58:17 Adding connection ID 1e1d467a. 2025/04/30 11:58:17 Adding connection ID f0f75262. 2025/04/30 11:58:17 server coalesced packet has different destination connection ID: 00000000, expected d1c812a6d99b6fffdefb88b6c8 2025/04/30 11:58:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d1c812a6d99b6fffdefb88b6c8 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 929, Version: v1} 2025/04/30 11:58:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, PacketNumber: 0, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 11:58:17 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d652ff08, StatelessResetToken: 0xd63e7a1d633566d460778e2db9687ffc} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d4ad77d, StatelessResetToken: 0x4be6bce6499e73d099b14cb705bb239b} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 884a96e5, StatelessResetToken: 0xf9f4433c862e643458caded101512e3c} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f0f75262, StatelessResetToken: 0x0b415f7a5aaf9469b462ea65277bb36d} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1e1d467a, StatelessResetToken: 0x11617ff0bb77101857816c042363c2df} 2025/04/30 11:58:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:17 server -> Sending packet 2 (1280 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:17 server -> Sending packet 3 (1280 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:17 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:58:17 server <- Reading packet 2 (125 bytes) for connection 2335b9a8, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: 2335b9a8, SrcConnectionID: (empty), Token: 0xcc629965ed7b4b8885ba3b5390c82d2157d15371a949e149725da5802496bb4f04edd45bc9b53b75a5e204c07e913b25e6d852cb92f80ab45843b8fe89df36b3cafc31e1bede84800b797e09dbe9ec7a0eb0f3fc4ba9, PacketNumber: 2, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 456µs} 2025/04/30 11:58:17 server coalesced packet has different destination connection ID: 00000000, expected 2335b9a8 2025/04/30 11:58:17 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:17 server -> Sending packet 1 (198 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Handshake 2025/04/30 11:58:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, PacketNumber: 1, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 11:58:17 server -> Sending packet 2 (198 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Handshake 2025/04/30 11:58:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, PacketNumber: 2, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 11:58:17 server Parsed a coalesced packet. Part 1: 716 bytes. Remaining: 536 bytes. 2025/04/30 11:58:17 server <- Reading packet 3 (716 bytes) for connection 2335b9a8, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: 2335b9a8, SrcConnectionID: (empty), Token: 0xcc629965ed7b4b8885ba3b5390c82d2157d15371a949e149725da5802496bb4f04edd45bc9b53b75a5e204c07e913b25e6d852cb92f80ab45843b8fe89df36b3cafc31e1bede84800b797e09dbe9ec7a0eb0f3fc4ba9, PacketNumber: 3, PacketNumberLen: 1, Length: 615, Version: v1} 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/04/30 11:58:17 server newly acked packets (1): [3] 2025/04/30 11:58:17 server updated RTT: 34.332848ms (σ: 17.166424ms) 2025/04/30 11:58:17 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:17 server coalesced packet has different destination connection ID: 00000000, expected 2335b9a8 2025/04/30 11:58:17 server -> Sending packet 4 (40 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Initial 2025/04/30 11:58:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:17 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:17 Removing connection ID fd32f98a2cf89ad436d9f800e7 after it has been retired. 2025/04/30 11:58:17 Removing connection IDs [63aa0412 2bd33d53 353dd7f6 d84a2b51 166a6a60 8f1fdf69] for a closed connection after it has been retired. 2025/04/30 11:58:17 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:58:17 server -> Sending packet 3 (198 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Handshake 2025/04/30 11:58:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, PacketNumber: 3, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 11:58:17 server -> Sending packet 4 (198 bytes) for connection d1c812a6d99b6fffdefb88b6c8, Handshake 2025/04/30 11:58:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2335b9a8, PacketNumber: 4, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 11:58:17 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:58:17 server <- Reading packet 2 (75 bytes) for connection 2335b9a8, Handshake 2025/04/30 11:58:17 server Long Header{Type: Handshake, DestConnectionID: 2335b9a8, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:17 server Dropping Initial keys. 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 98.56ms} 2025/04/30 11:58:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:17 Retiring connection ID d1c812a6d99b6fffdefb88b6c8 in 5s. 2025/04/30 11:58:17 server Dropping Handshake keys. 2025/04/30 11:58:17 server <- Reading packet 1 (42 bytes) for connection 2335b9a8, 1-RTT 2025/04/30 11:58:17 server Short Header{DestConnectionID: 2335b9a8, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:17 Received request: GET /njglheegdl 2025/04/30 11:58:17 server -> Sending packet 2 (379 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:17 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 291.125µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d4ad77d, StatelessResetToken: 0x4be6bce6499e73d099b14cb705bb239b} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 884a96e5, StatelessResetToken: 0xf9f4433c862e643458caded101512e3c} 2025/04/30 11:58:17 server -> &wire.NewTokenFrame{Token: 0xacf7011f6ed87edb906d3a4a3d9ea414c859bbc3dc37fa115cbc27d02a31d9949e994b0d944e1acbbabbb9ab54b02035b673e4d7cec6f43faa36c60694a39d4fa531f089110e3d49a3b5777ad92f464b5b1854e4603d} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1e1d467a, StatelessResetToken: 0x11617ff0bb77101857816c042363c2df} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f0f75262, StatelessResetToken: 0x0b415f7a5aaf9469b462ea65277bb36d} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d652ff08, StatelessResetToken: 0xd63e7a1d633566d460778e2db9687ffc} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:17 server -> Sending packet 3 (1280 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:17 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:17 server -> &wire.NewTokenFrame{Token: 0xacf7011f6ed87edb906d3a4a3d9ea414c859bbc3dc37fa115cbc27d02a31d9949e994b0d944e1acbbabbb9ab54b02035b673e4d7cec6f43faa36c60694a39d4fa531f089110e3d49a3b5777ad92f464b5b1854e4603d} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d4ad77d, StatelessResetToken: 0x4be6bce6499e73d099b14cb705bb239b} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d652ff08, StatelessResetToken: 0xd63e7a1d633566d460778e2db9687ffc} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1e1d467a, StatelessResetToken: 0x11617ff0bb77101857816c042363c2df} 2025/04/30 11:58:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f0f75262, StatelessResetToken: 0x0b415f7a5aaf9469b462ea65277bb36d} 2025/04/30 11:58:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 884a96e5, StatelessResetToken: 0xf9f4433c862e643458caded101512e3c} 2025/04/30 11:58:17 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:58:17 server -> Sending packet 4 (140 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:17 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:58:17 server Dropping %!s(logging.PacketType=1) packet (76 bytes) because we already dropped the keys. 2025/04/30 11:58:17 server <- Reading packet 2 (1352 bytes) for connection 2335b9a8, 1-RTT 2025/04/30 11:58:17 server Short Header{DestConnectionID: 2335b9a8, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:17 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 424µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:17 server <- &wire.PingFrame{} 2025/04/30 11:58:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:18 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:18 server -> Sending packet 5 (28 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 25.378488ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server <- Reading packet 4 (25 bytes) for connection 2335b9a8, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 2335b9a8, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.PingFrame{} 2025/04/30 11:58:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:18 server -> Sending packet 6 (29 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 123.841µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:58:18 server -> Sending packet 8 (1280 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f0f75262, StatelessResetToken: 0x0b415f7a5aaf9469b462ea65277bb36d} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d652ff08, StatelessResetToken: 0xd63e7a1d633566d460778e2db9687ffc} 2025/04/30 11:58:18 server -> &wire.NewTokenFrame{Token: 0xacf7011f6ed87edb906d3a4a3d9ea414c859bbc3dc37fa115cbc27d02a31d9949e994b0d944e1acbbabbb9ab54b02035b673e4d7cec6f43faa36c60694a39d4fa531f089110e3d49a3b5777ad92f464b5b1854e4603d} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1e1d467a, StatelessResetToken: 0x11617ff0bb77101857816c042363c2df} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 884a96e5, StatelessResetToken: 0xf9f4433c862e643458caded101512e3c} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d4ad77d, StatelessResetToken: 0x4be6bce6499e73d099b14cb705bb239b} 2025/04/30 11:58:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:58:18 server Skipping packet number 7 2025/04/30 11:58:18 server -> Sending packet 9 (140 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:58:18 server -> Sending packet 10 (1366 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.PingFrame{} 2025/04/30 11:58:18 server <- Reading packet 8 (25 bytes) for connection 2335b9a8, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 2335b9a8, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.PingFrame{} 2025/04/30 11:58:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:18 server -> Sending packet 11 (31 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 112.861µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:18 Removing connection ID 66ce8fbd3eb14ef2 after it has been retired. 2025/04/30 11:58:18 server <- Reading packet 9 (34 bytes) for connection 2335b9a8, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 2335b9a8, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 80µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server newly acked packets (1): [10] 2025/04/30 11:58:18 server updated RTT: 34.201ms (σ: 13.136ms) 2025/04/30 11:58:18 server ECN capability confirmed. 2025/04/30 11:58:18 server setting loss timer for packet 8 (1-RTT) to 38.476125ms (in 2025-04-30 11:58:18.235454197 +0000 UTC m=+22.604334913) 2025/04/30 11:58:18 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:58:18.235454197 +0000 UTC m=+22.604334913 2025/04/30 11:58:18 server lost packet 8 (time threshold) 2025/04/30 11:58:18 server lost packet 9 (time threshold) 2025/04/30 11:58:18 server Canceling loss detection timer. 2025/04/30 11:58:18 server -> Sending packet 12 (1280 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.NewTokenFrame{Token: 0xacf7011f6ed87edb906d3a4a3d9ea414c859bbc3dc37fa115cbc27d02a31d9949e994b0d944e1acbbabbb9ab54b02035b673e4d7cec6f43faa36c60694a39d4fa531f089110e3d49a3b5777ad92f464b5b1854e4603d} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 884a96e5, StatelessResetToken: 0xf9f4433c862e643458caded101512e3c} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d652ff08, StatelessResetToken: 0xd63e7a1d633566d460778e2db9687ffc} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1e1d467a, StatelessResetToken: 0x11617ff0bb77101857816c042363c2df} 2025/04/30 11:58:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f0f75262, StatelessResetToken: 0x0b415f7a5aaf9469b462ea65277bb36d} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d4ad77d, StatelessResetToken: 0x4be6bce6499e73d099b14cb705bb239b} 2025/04/30 11:58:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:58:18 server -> Sending packet 13 (140 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:58:18 server <- Reading packet 10 (1392 bytes) for connection 2335b9a8, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 2335b9a8, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.PingFrame{} 2025/04/30 11:58:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:18 server <- Reading packet 11 (1444 bytes) for connection 2335b9a8, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 2335b9a8, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 120µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server newly acked packets (1): [12] 2025/04/30 11:58:18 server updated RTT: 34.091ms (σ: 10.07ms) 2025/04/30 11:58:18 server <- &wire.PingFrame{} 2025/04/30 11:58:18 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:58:18 server -> Sending packet 14 (31 bytes) for connection d1c812a6d99b6fffdefb88b6c8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 169.266µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server <- Reading packet 12 (45 bytes) for connection 2335b9a8, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 2335b9a8, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 4, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 320µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:18 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:18 Replacing connection for connection IDs [2335b9a8 d652ff08 4d4ad77d 884a96e5 1e1d467a f0f75262] with a closed connection. 2025/04/30 11:58:18 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:18 server Connection d1c812a6d99b6fffdefb88b6c8 closed. 2025/04/30 11:58:18 Removing connection IDs [08188c20 574e5118 dbe09a4e 473abbe7 9f641ac6 edc2db3f] for a closed connection after it has been retired. 2025/04/30 11:58:18 server <- Received Initial packet. 2025/04/30 11:58:18 Created qlog file: /logs/qlog/468ce4cfe113f1ff16957a.sqlog 2025/04/30 11:58:18 server Changing connection ID to 9463714d. 2025/04/30 11:58:18 Adding connection IDs 468ce4cfe113f1ff16957a and 9463714d for a new connection. 2025/04/30 11:58:18 server <- Reading packet 2 (1252 bytes) for connection 468ce4cfe113f1ff16957a, Initial 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: 468ce4cfe113f1ff16957a, SrcConnectionID: (empty), Token: 0xacf7011f6ed87edb906d3a4a3d9ea414c859bbc3dc37fa115cbc27d02a31d9949e994b0d944e1acbbabbb9ab54b02035b673e4d7cec6f43faa36c60694a39d4fa531f089110e3d49a3b5777ad92f464b5b1854e4603d, PacketNumber: 2, PacketNumberLen: 1, Length: 1144, Version: v1} 2025/04/30 11:58:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 1123, Offset + Data length: 1123} 2025/04/30 11:58:18 server -> Sending packet 0 (40 bytes) for connection 468ce4cfe113f1ff16957a, Initial 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9463714d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server Parsed a coalesced packet. Part 1: 714 bytes. Remaining: 538 bytes. 2025/04/30 11:58:18 server <- Reading packet 3 (714 bytes) for connection 468ce4cfe113f1ff16957a, Initial 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: 468ce4cfe113f1ff16957a, SrcConnectionID: (empty), Token: 0xacf7011f6ed87edb906d3a4a3d9ea414c859bbc3dc37fa115cbc27d02a31d9949e994b0d944e1acbbabbb9ab54b02035b673e4d7cec6f43faa36c60694a39d4fa531f089110e3d49a3b5777ad92f464b5b1854e4603d, PacketNumber: 3, PacketNumberLen: 1, Length: 606, Version: v1} 2025/04/30 11:58:18 server <- &wire.CryptoFrame{Offset: 1123, Data length: 584, Offset + Data length: 1707} 2025/04/30 11:58:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:18 Adding connection ID 5f0a32c0. 2025/04/30 11:58:18 Adding connection ID a49894a5. 2025/04/30 11:58:18 Adding connection ID 101d0a55. 2025/04/30 11:58:18 Adding connection ID d20d85be. 2025/04/30 11:58:18 Adding connection ID 3fef7d11. 2025/04/30 11:58:18 server coalesced packet has different destination connection ID: 00000000, expected 468ce4cfe113f1ff16957a 2025/04/30 11:58:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 468ce4cfe113f1ff16957a 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9463714d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 927, Version: v1} 2025/04/30 11:58:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9463714d, PacketNumber: 0, PacketNumberLen: 2, Length: 187, Version: v1} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 165, Offset + Data length: 165} 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 3fef7d11, StatelessResetToken: 0xc9d24b3620ab1f06e425dd11aaa0262c} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 101d0a55, StatelessResetToken: 0xde089e4b9eb3b8003e5b6211b6d8c404} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0a32c0, StatelessResetToken: 0xee0b3facacfab43ebd1bb3f41d9d5675} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d20d85be, StatelessResetToken: 0x558dc5032f77007af40341b2fa0186b9} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a49894a5, StatelessResetToken: 0xabbf7997b64420bd741d6f8385defc15} 2025/04/30 11:58:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:18 server -> Sending packet 2 (1280 bytes) for connection 468ce4cfe113f1ff16957a, Initial 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9463714d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:18 server -> Sending packet 3 (1280 bytes) for connection 468ce4cfe113f1ff16957a, Initial 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9463714d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:18 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:58:18 server <- Reading packet 5 (125 bytes) for connection 9463714d, Initial 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: 9463714d, SrcConnectionID: (empty), Token: 0xacf7011f6ed87edb906d3a4a3d9ea414c859bbc3dc37fa115cbc27d02a31d9949e994b0d944e1acbbabbb9ab54b02035b673e4d7cec6f43faa36c60694a39d4fa531f089110e3d49a3b5777ad92f464b5b1854e4603d, PacketNumber: 5, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:58:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 488µs} 2025/04/30 11:58:18 server coalesced packet has different destination connection ID: 00000000, expected 9463714d 2025/04/30 11:58:18 server Parsed a coalesced packet. Part 1: 714 bytes. Remaining: 538 bytes. 2025/04/30 11:58:18 server <- Reading packet 6 (714 bytes) for connection 9463714d, Initial 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: 9463714d, SrcConnectionID: (empty), Token: 0xacf7011f6ed87edb906d3a4a3d9ea414c859bbc3dc37fa115cbc27d02a31d9949e994b0d944e1acbbabbb9ab54b02035b673e4d7cec6f43faa36c60694a39d4fa531f089110e3d49a3b5777ad92f464b5b1854e4603d, PacketNumber: 6, PacketNumberLen: 1, Length: 613, Version: v1} 2025/04/30 11:58:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 32µs} 2025/04/30 11:58:18 server newly acked packets (1): [3] 2025/04/30 11:58:18 server updated RTT: 34.427718ms (σ: 17.213859ms) 2025/04/30 11:58:18 server <- &wire.CryptoFrame{Offset: 1123, Data length: 584, Offset + Data length: 1707} 2025/04/30 11:58:18 server coalesced packet has different destination connection ID: 00000000, expected 9463714d 2025/04/30 11:58:18 server -> Sending packet 4 (42 bytes) for connection 468ce4cfe113f1ff16957a, Initial 2025/04/30 11:58:18 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9463714d, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:58:18 server -> Sending packet 1 (200 bytes) for connection 468ce4cfe113f1ff16957a, Handshake 2025/04/30 11:58:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9463714d, PacketNumber: 1, PacketNumberLen: 2, Length: 187, Version: v1} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 165, Offset + Data length: 165} 2025/04/30 11:58:18 server -> Sending packet 2 (200 bytes) for connection 468ce4cfe113f1ff16957a, Handshake 2025/04/30 11:58:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9463714d, PacketNumber: 2, PacketNumberLen: 2, Length: 187, Version: v1} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 165, Offset + Data length: 165} 2025/04/30 11:58:18 server <- Reading packet 0 (75 bytes) for connection 9463714d, Handshake 2025/04/30 11:58:18 server Long Header{Type: Handshake, DestConnectionID: 9463714d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:18 server Dropping Initial keys. 2025/04/30 11:58:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 536µs} 2025/04/30 11:58:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:18 Retiring connection ID 468ce4cfe113f1ff16957a in 5s. 2025/04/30 11:58:18 server Dropping Handshake keys. 2025/04/30 11:58:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:18 server -> Sending packet 2 (371 bytes) for connection 468ce4cfe113f1ff16957a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.NewTokenFrame{Token: 0x4566b1e74bf23ea3bb75dadbfdc588a81ca92089343dfeee386862155be521dc10cd0e748db44dd3d90088f2fe101c3f39bb780484f24f1977e509a56f8c0e77a36c727f3c005aea149bda98a175dc62f88d40694997} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a49894a5, StatelessResetToken: 0xabbf7997b64420bd741d6f8385defc15} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d20d85be, StatelessResetToken: 0x558dc5032f77007af40341b2fa0186b9} 2025/04/30 11:58:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 101d0a55, StatelessResetToken: 0xde089e4b9eb3b8003e5b6211b6d8c404} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 3fef7d11, StatelessResetToken: 0xc9d24b3620ab1f06e425dd11aaa0262c} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0a32c0, StatelessResetToken: 0xee0b3facacfab43ebd1bb3f41d9d5675} 2025/04/30 11:58:18 server -> Sending packet 3 (371 bytes) for connection 468ce4cfe113f1ff16957a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a49894a5, StatelessResetToken: 0xabbf7997b64420bd741d6f8385defc15} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0a32c0, StatelessResetToken: 0xee0b3facacfab43ebd1bb3f41d9d5675} 2025/04/30 11:58:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d20d85be, StatelessResetToken: 0x558dc5032f77007af40341b2fa0186b9} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 3fef7d11, StatelessResetToken: 0xc9d24b3620ab1f06e425dd11aaa0262c} 2025/04/30 11:58:18 server -> &wire.NewTokenFrame{Token: 0x4566b1e74bf23ea3bb75dadbfdc588a81ca92089343dfeee386862155be521dc10cd0e748db44dd3d90088f2fe101c3f39bb780484f24f1977e509a56f8c0e77a36c727f3c005aea149bda98a175dc62f88d40694997} 2025/04/30 11:58:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 101d0a55, StatelessResetToken: 0xde089e4b9eb3b8003e5b6211b6d8c404} 2025/04/30 11:58:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:18 server <- Reading packet 0 (42 bytes) for connection 9463714d, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 9463714d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:18 server -> Sending packet 4 (27 bytes) for connection 468ce4cfe113f1ff16957a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 183.922µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:18 Received request: GET /ypfrhtleau 2025/04/30 11:58:18 server -> Sending packet 5 (1045 bytes) for connection 468ce4cfe113f1ff16957a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:18 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:18 server <- Reading packet 1 (1352 bytes) for connection 9463714d, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 9463714d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 264µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server <- &wire.PingFrame{} 2025/04/30 11:58:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:18 server <- Reading packet 2 (43 bytes) for connection 9463714d, 1-RTT 2025/04/30 11:58:18 server Short Header{DestConnectionID: 9463714d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 136µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:18 server newly acked packets (1): [5] 2025/04/30 11:58:18 server updated RTT: 34.158ms (σ: 13.446ms) 2025/04/30 11:58:18 server ECN capability confirmed. 2025/04/30 11:58:18 server setting loss timer for packet 3 (1-RTT) to 38.42775ms (in 2025-04-30 11:58:18.808584262 +0000 UTC m=+23.177464988) 2025/04/30 11:58:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:18 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:18 Replacing connection for connection IDs [9463714d 5f0a32c0 a49894a5 101d0a55 d20d85be 3fef7d11] with a closed connection. 2025/04/30 11:58:18 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:18 server Connection 468ce4cfe113f1ff16957a closed. 2025/04/30 11:58:19 Removing connection ID d18f2f4de6f60421 after it has been retired. 2025/04/30 11:58:19 Removing connection IDs [c1ce6875 2d5116db 05d0f687 da356e50 59a9282f a84b4180] for a closed connection after it has been retired. 2025/04/30 11:58:19 server <- Received Initial packet. 2025/04/30 11:58:19 Created qlog file: /logs/qlog/2b98c9e9235471c9.sqlog 2025/04/30 11:58:19 server Changing connection ID to ca39891e. 2025/04/30 11:58:19 Adding connection IDs 2b98c9e9235471c9 and ca39891e for a new connection. 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:19 server <- Reading packet 1 (708 bytes) for connection 2b98c9e9235471c9, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: 2b98c9e9235471c9, SrcConnectionID: (empty), Token: 0x4566b1e74bf23ea3bb75dadbfdc588a81ca92089343dfeee386862155be521dc10cd0e748db44dd3d90088f2fe101c3f39bb780484f24f1977e509a56f8c0e77a36c727f3c005aea149bda98a175dc62f88d40694997, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:19 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:19 server coalesced packet has different destination connection ID: 00000000, expected 2b98c9e9235471c9 2025/04/30 11:58:19 server -> Sending packet 0 (40 bytes) for connection 2b98c9e9235471c9, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ca39891e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:19 server <- Reading packet 3 (708 bytes) for connection 2b98c9e9235471c9, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: 2b98c9e9235471c9, SrcConnectionID: (empty), Token: 0x4566b1e74bf23ea3bb75dadbfdc588a81ca92089343dfeee386862155be521dc10cd0e748db44dd3d90088f2fe101c3f39bb780484f24f1977e509a56f8c0e77a36c727f3c005aea149bda98a175dc62f88d40694997, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:19 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:19 server coalesced packet has different destination connection ID: 00000000, expected 2b98c9e9235471c9 2025/04/30 11:58:19 server -> Sending packet 1 (42 bytes) for connection 2b98c9e9235471c9, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ca39891e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:58:19 server <- Reading packet 4 (1248 bytes) for connection ca39891e, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: ca39891e, SrcConnectionID: (empty), Token: 0x4566b1e74bf23ea3bb75dadbfdc588a81ca92089343dfeee386862155be521dc10cd0e748db44dd3d90088f2fe101c3f39bb780484f24f1977e509a56f8c0e77a36c727f3c005aea149bda98a175dc62f88d40694997, PacketNumber: 4, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:19 Adding connection ID 5db4bfa7. 2025/04/30 11:58:19 Adding connection ID 08bf3c4a. 2025/04/30 11:58:19 Adding connection ID 408c3235. 2025/04/30 11:58:19 Adding connection ID f55efa12. 2025/04/30 11:58:19 Adding connection ID 6f5e6bb7. 2025/04/30 11:58:19 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:58:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2b98c9e9235471c9 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ca39891e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 931, Version: v1} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ca39891e, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:58:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08bf3c4a, StatelessResetToken: 0xfd7ba4f5e646b92bd77e4b37b0287ded} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f55efa12, StatelessResetToken: 0x4e7924ba6ccb1cd94b472cdbae9335d3} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 6f5e6bb7, StatelessResetToken: 0x207b99761088a29a58987064c7af6152} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 408c3235, StatelessResetToken: 0x2bd5abc6b64d40ede226c29d02cba84b} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5db4bfa7, StatelessResetToken: 0x509f04980cf3fc4497d38f0f904baef8} 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:58:19 server <- Reading packet 5 (1248 bytes) for connection ca39891e, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: ca39891e, SrcConnectionID: (empty), Token: 0x4566b1e74bf23ea3bb75dadbfdc588a81ca92089343dfeee386862155be521dc10cd0e748db44dd3d90088f2fe101c3f39bb780484f24f1977e509a56f8c0e77a36c727f3c005aea149bda98a175dc62f88d40694997, PacketNumber: 5, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:19 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:58:19 server -> Sending packet 3 (42 bytes) for connection 2b98c9e9235471c9, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ca39891e, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:19 server <- Reading packet 6 (124 bytes) for connection ca39891e, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: ca39891e, SrcConnectionID: (empty), Token: 0x4566b1e74bf23ea3bb75dadbfdc588a81ca92089343dfeee386862155be521dc10cd0e748db44dd3d90088f2fe101c3f39bb780484f24f1977e509a56f8c0e77a36c727f3c005aea149bda98a175dc62f88d40694997, PacketNumber: 6, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1ms} 2025/04/30 11:58:19 server newly acked packets (1): [2] 2025/04/30 11:58:19 server updated RTT: 33.423239ms (σ: 16.711619ms) 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:19 server <- Reading packet 0 (75 bytes) for connection ca39891e, Handshake 2025/04/30 11:58:19 server Long Header{Type: Handshake, DestConnectionID: ca39891e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:19 server Dropping Initial keys. 2025/04/30 11:58:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:58:19 server newly acked packets (1): [0] 2025/04/30 11:58:19 server updated RTT: 33.423ms (σ: 12.533ms) 2025/04/30 11:58:19 server Canceling loss detection timer. 2025/04/30 11:58:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:19 Retiring connection ID 2b98c9e9235471c9 in 5s. 2025/04/30 11:58:19 server Dropping Handshake keys. 2025/04/30 11:58:19 server -> Sending packet 1 (251 bytes) for connection 2b98c9e9235471c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:19 server -> &wire.NewTokenFrame{Token: 0xc3ac5d4407c7bc60419258e63f461f195854234ed21aa7c556f0ca47a8545054519bca69e4f76934a222a599f6f505324f6148cca300a414f612edadbf2d7ff0b2323cdbba1f9e889d84fd356eb73fef7b61748ac2b8} 2025/04/30 11:58:19 server <- Reading packet 0 (42 bytes) for connection ca39891e, 1-RTT 2025/04/30 11:58:19 server Short Header{DestConnectionID: ca39891e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:19 server -> Sending packet 2 (27 bytes) for connection 2b98c9e9235471c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 289.469µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:19 Received request: GET /pxjkfxamzg 2025/04/30 11:58:19 server -> Sending packet 3 (1045 bytes) for connection 2b98c9e9235471c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:19 server <- Reading packet 2 (1352 bytes) for connection ca39891e, 1-RTT 2025/04/30 11:58:19 server Short Header{DestConnectionID: ca39891e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:19 server <- &wire.PingFrame{} 2025/04/30 11:58:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:19 server <- Reading packet 3 (30 bytes) for connection ca39891e, 1-RTT 2025/04/30 11:58:19 server Short Header{DestConnectionID: ca39891e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server newly acked packets (3): [0 1 3] 2025/04/30 11:58:19 server updated RTT: 33.284ms (σ: 9.675ms) 2025/04/30 11:58:19 server ECN capability confirmed. 2025/04/30 11:58:19 server Canceling loss detection timer. 2025/04/30 11:58:19 server -> Sending packet 4 (32 bytes) for connection 2b98c9e9235471c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 199.553µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:19 server <- Reading packet 4 (41 bytes) for connection ca39891e, 1-RTT 2025/04/30 11:58:19 server Short Header{DestConnectionID: ca39891e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 184µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:19 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:19 Replacing connection for connection IDs [ca39891e 5db4bfa7 08bf3c4a 408c3235 f55efa12 6f5e6bb7] with a closed connection. 2025/04/30 11:58:19 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:19 server Connection 2b98c9e9235471c9 closed. 2025/04/30 11:58:19 Removing connection ID 7de682ca92192772 after it has been retired. 2025/04/30 11:58:19 Removing connection IDs [ccdfe9e9 b50a7114 493f8ddc 359e35fa 7c4ae6ca 9eba0446] for a closed connection after it has been retired. 2025/04/30 11:58:19 server <- Received Initial packet. 2025/04/30 11:58:19 Created qlog file: /logs/qlog/b2fa1ce0dc27ee28.sqlog 2025/04/30 11:58:19 server Changing connection ID to f1dd7807. 2025/04/30 11:58:19 Adding connection IDs b2fa1ce0dc27ee28 and f1dd7807 for a new connection. 2025/04/30 11:58:19 server <- Reading packet 0 (1252 bytes) for connection b2fa1ce0dc27ee28, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: b2fa1ce0dc27ee28, SrcConnectionID: (empty), Token: 0xc3ac5d4407c7bc60419258e63f461f195854234ed21aa7c556f0ca47a8545054519bca69e4f76934a222a599f6f505324f6148cca300a414f612edadbf2d7ff0b2323cdbba1f9e889d84fd356eb73fef7b61748ac2b8, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:19 server -> Sending packet 0 (40 bytes) for connection b2fa1ce0dc27ee28, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f1dd7807, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:19 Tracking 30 connection IDs and 0 reset tokens. 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:58:19 server <- Reading packet 2 (704 bytes) for connection f1dd7807, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: f1dd7807, SrcConnectionID: (empty), Token: 0xc3ac5d4407c7bc60419258e63f461f195854234ed21aa7c556f0ca47a8545054519bca69e4f76934a222a599f6f505324f6148cca300a414f612edadbf2d7ff0b2323cdbba1f9e889d84fd356eb73fef7b61748ac2b8, PacketNumber: 2, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:19 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:19 Adding connection ID 9d10f742. 2025/04/30 11:58:19 Adding connection ID 84bbe854. 2025/04/30 11:58:19 Adding connection ID 08dbeaab. 2025/04/30 11:58:19 Adding connection ID b021f239. 2025/04/30 11:58:19 Adding connection ID abcaccaf. 2025/04/30 11:58:19 server coalesced packet has different destination connection ID: 00000000, expected f1dd7807 2025/04/30 11:58:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b2fa1ce0dc27ee28 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f1dd7807, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 938, Version: v1} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:19 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f1dd7807, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d10f742, StatelessResetToken: 0xd82af6d2d19097f0301f331d8bd83d79} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: abcaccaf, StatelessResetToken: 0x67fd577f1c09c4a07be04f6f3787699f} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 84bbe854, StatelessResetToken: 0x8e1280b81f16ad33fe3ed014d1acc615} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b021f239, StatelessResetToken: 0x61ab66cefaf579af69c339e0b9eb7083} 2025/04/30 11:58:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08dbeaab, StatelessResetToken: 0xe7e7a7f7439bc82bfd33cef6d2871f81} 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:19 server <- Reading packet 3 (124 bytes) for connection f1dd7807, Initial 2025/04/30 11:58:19 server Long Header{Type: Initial, DestConnectionID: f1dd7807, SrcConnectionID: (empty), Token: 0xc3ac5d4407c7bc60419258e63f461f195854234ed21aa7c556f0ca47a8545054519bca69e4f76934a222a599f6f505324f6148cca300a414f612edadbf2d7ff0b2323cdbba1f9e889d84fd356eb73fef7b61748ac2b8, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 944µs} 2025/04/30 11:58:19 server newly acked packets (1): [1] 2025/04/30 11:58:19 server updated RTT: 33.060613ms (σ: 16.530306ms) 2025/04/30 11:58:19 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:19 server <- Reading packet 0 (75 bytes) for connection f1dd7807, Handshake 2025/04/30 11:58:19 server Long Header{Type: Handshake, DestConnectionID: f1dd7807, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:19 server Dropping Initial keys. 2025/04/30 11:58:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 944µs} 2025/04/30 11:58:19 server newly acked packets (1): [0] 2025/04/30 11:58:19 server updated RTT: 33.06ms (σ: 12.397ms) 2025/04/30 11:58:19 server Canceling loss detection timer. 2025/04/30 11:58:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:19 Retiring connection ID b2fa1ce0dc27ee28 in 5s. 2025/04/30 11:58:19 server Dropping Handshake keys. 2025/04/30 11:58:19 server <- Reading packet 0 (42 bytes) for connection f1dd7807, 1-RTT 2025/04/30 11:58:19 server Short Header{DestConnectionID: f1dd7807, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:19 server -> Sending packet 1 (259 bytes) for connection b2fa1ce0dc27ee28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368.39µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:19 server -> &wire.NewTokenFrame{Token: 0x6c707104149e1f4343d79dd333e106ad67ed778d384bfa91884fba7a1857f98e06a77710aa1f2385af0ba1596a614e462f0c5b24ec7594ab258d235d9ee905128a48295d3d12899b584ee0085e4b9781e9e34002acee} 2025/04/30 11:58:19 Received request: GET /ynkwcnmtch 2025/04/30 11:58:19 server -> Sending packet 2 (1045 bytes) for connection b2fa1ce0dc27ee28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:19 server <- Reading packet 1 (28 bytes) for connection f1dd7807, 1-RTT 2025/04/30 11:58:19 server Short Header{DestConnectionID: f1dd7807, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.416ms} 2025/04/30 11:58:19 server newly acked packets (1): [0] 2025/04/30 11:58:19 server updated RTT: 33.104ms (σ: 9.386ms) 2025/04/30 11:58:19 server <- Reading packet 2 (1352 bytes) for connection f1dd7807, 1-RTT 2025/04/30 11:58:19 server Short Header{DestConnectionID: f1dd7807, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:19 server <- &wire.PingFrame{} 2025/04/30 11:58:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:19 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:19 server -> Sending packet 3 (28 bytes) for connection b2fa1ce0dc27ee28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.274396ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:19 server -> Sending packet 5 (251 bytes) for connection b2fa1ce0dc27ee28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:19 server -> &wire.NewTokenFrame{Token: 0x6c707104149e1f4343d79dd333e106ad67ed778d384bfa91884fba7a1857f98e06a77710aa1f2385af0ba1596a614e462f0c5b24ec7594ab258d235d9ee905128a48295d3d12899b584ee0085e4b9781e9e34002acee} 2025/04/30 11:58:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:19 server Skipping packet number 4 2025/04/30 11:58:19 server -> Sending packet 6 (1045 bytes) for connection b2fa1ce0dc27ee28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:19 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:58:20 server -> Sending packet 8 (251 bytes) for connection b2fa1ce0dc27ee28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.NewTokenFrame{Token: 0x6c707104149e1f4343d79dd333e106ad67ed778d384bfa91884fba7a1857f98e06a77710aa1f2385af0ba1596a614e462f0c5b24ec7594ab258d235d9ee905128a48295d3d12899b584ee0085e4b9781e9e34002acee} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:20 server Skipping packet number 7 2025/04/30 11:58:20 server -> Sending packet 9 (1045 bytes) for connection b2fa1ce0dc27ee28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:20 server -> Sending packet 10 (1366 bytes) for connection b2fa1ce0dc27ee28, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.PingFrame{} 2025/04/30 11:58:20 server <- Reading packet 5 (44 bytes) for connection f1dd7807, 1-RTT 2025/04/30 11:58:20 server Short Header{DestConnectionID: f1dd7807, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:20 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 272.032ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:20 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:20 Replacing connection for connection IDs [84bbe854 08dbeaab b021f239 abcaccaf f1dd7807 9d10f742] with a closed connection. 2025/04/30 11:58:20 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:20 server Connection b2fa1ce0dc27ee28 closed. 2025/04/30 11:58:20 server <- Received Initial packet. 2025/04/30 11:58:20 Created qlog file: /logs/qlog/bce98593b5348abfdc937fb927.sqlog 2025/04/30 11:58:20 server Changing connection ID to dad0d2c1. 2025/04/30 11:58:20 Adding connection IDs bce98593b5348abfdc937fb927 and dad0d2c1 for a new connection. 2025/04/30 11:58:20 server <- Reading packet 0 (1252 bytes) for connection bce98593b5348abfdc937fb927, Initial 2025/04/30 11:58:20 server Long Header{Type: Initial, DestConnectionID: bce98593b5348abfdc937fb927, SrcConnectionID: (empty), Token: 0x6c707104149e1f4343d79dd333e106ad67ed778d384bfa91884fba7a1857f98e06a77710aa1f2385af0ba1596a614e462f0c5b24ec7594ab258d235d9ee905128a48295d3d12899b584ee0085e4b9781e9e34002acee, PacketNumber: 0, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:58:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:20 server -> Sending packet 0 (40 bytes) for connection bce98593b5348abfdc937fb927, Initial 2025/04/30 11:58:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dad0d2c1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:20 server Parsed a coalesced packet. Part 1: 709 bytes. Remaining: 543 bytes. 2025/04/30 11:58:20 server <- Reading packet 4 (709 bytes) for connection dad0d2c1, Initial 2025/04/30 11:58:20 server Long Header{Type: Initial, DestConnectionID: dad0d2c1, SrcConnectionID: (empty), Token: 0x6c707104149e1f4343d79dd333e106ad67ed778d384bfa91884fba7a1857f98e06a77710aa1f2385af0ba1596a614e462f0c5b24ec7594ab258d235d9ee905128a48295d3d12899b584ee0085e4b9781e9e34002acee, PacketNumber: 4, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:20 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:20 Adding connection ID 25c463b1. 2025/04/30 11:58:20 Adding connection ID 21a8f293. 2025/04/30 11:58:20 Adding connection ID 4871f1bf. 2025/04/30 11:58:20 Adding connection ID 74711a80. 2025/04/30 11:58:20 Adding connection ID bef0896e. 2025/04/30 11:58:20 server coalesced packet has different destination connection ID: 00000000, expected dad0d2c1 2025/04/30 11:58:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bce98593b5348abfdc937fb927 2025/04/30 11:58:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dad0d2c1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 924, Version: v1} 2025/04/30 11:58:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dad0d2c1, PacketNumber: 0, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: bef0896e, StatelessResetToken: 0xf21ad2dbc60aae49112763f61f210e3a} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 21a8f293, StatelessResetToken: 0x70dda071bb23206698bd606ba2faa488} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4871f1bf, StatelessResetToken: 0xdf26ee938c988af42b9dea63b8bebd2c} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 25c463b1, StatelessResetToken: 0xc663bb380cb02038ccf1892b131a70fd} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 74711a80, StatelessResetToken: 0x8229d8ce007750ee0f8eb0464ee73965} 2025/04/30 11:58:20 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:20 server -> Sending packet 2 (1280 bytes) for connection bce98593b5348abfdc937fb927, Initial 2025/04/30 11:58:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dad0d2c1, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:20 server -> Sending packet 3 (1280 bytes) for connection bce98593b5348abfdc937fb927, Initial 2025/04/30 11:58:20 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: dad0d2c1, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:20 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:58:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:20 server -> Sending packet 1 (203 bytes) for connection bce98593b5348abfdc937fb927, Handshake 2025/04/30 11:58:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dad0d2c1, PacketNumber: 1, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:58:20 server -> Sending packet 2 (203 bytes) for connection bce98593b5348abfdc937fb927, Handshake 2025/04/30 11:58:20 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: dad0d2c1, PacketNumber: 2, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:58:20 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:58:20 server <- Reading packet 1 (75 bytes) for connection dad0d2c1, Handshake 2025/04/30 11:58:20 server Long Header{Type: Handshake, DestConnectionID: dad0d2c1, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:20 server Dropping Initial keys. 2025/04/30 11:58:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.528ms} 2025/04/30 11:58:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:20 Retiring connection ID bce98593b5348abfdc937fb927 in 5s. 2025/04/30 11:58:20 server Dropping Handshake keys. 2025/04/30 11:58:20 server <- Reading packet 2 (42 bytes) for connection dad0d2c1, 1-RTT 2025/04/30 11:58:20 server Short Header{DestConnectionID: dad0d2c1, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:20 Received request: GET /mlqoztzsde 2025/04/30 11:58:20 server -> Sending packet 2 (379 bytes) for connection bce98593b5348abfdc937fb927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 342.712µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4871f1bf, StatelessResetToken: 0xdf26ee938c988af42b9dea63b8bebd2c} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 21a8f293, StatelessResetToken: 0x70dda071bb23206698bd606ba2faa488} 2025/04/30 11:58:20 server -> &wire.NewTokenFrame{Token: 0x41eb6e5467d498103ee1656df4e310e905cc9bc7e5ec5aac7d150187e966821b973fd18d3875b16f0746ea64243b0ee9f6a7b020d8771de05444ff715b39ed68bb7fe37c3d21e9c68590bd91476c7c23ecac3a794904} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: bef0896e, StatelessResetToken: 0xf21ad2dbc60aae49112763f61f210e3a} 2025/04/30 11:58:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 74711a80, StatelessResetToken: 0x8229d8ce007750ee0f8eb0464ee73965} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 25c463b1, StatelessResetToken: 0xc663bb380cb02038ccf1892b131a70fd} 2025/04/30 11:58:20 server -> Sending packet 3 (1280 bytes) for connection bce98593b5348abfdc937fb927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.NewTokenFrame{Token: 0x41eb6e5467d498103ee1656df4e310e905cc9bc7e5ec5aac7d150187e966821b973fd18d3875b16f0746ea64243b0ee9f6a7b020d8771de05444ff715b39ed68bb7fe37c3d21e9c68590bd91476c7c23ecac3a794904} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 21a8f293, StatelessResetToken: 0x70dda071bb23206698bd606ba2faa488} 2025/04/30 11:58:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4871f1bf, StatelessResetToken: 0xdf26ee938c988af42b9dea63b8bebd2c} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: bef0896e, StatelessResetToken: 0xf21ad2dbc60aae49112763f61f210e3a} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 25c463b1, StatelessResetToken: 0xc663bb380cb02038ccf1892b131a70fd} 2025/04/30 11:58:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 74711a80, StatelessResetToken: 0x8229d8ce007750ee0f8eb0464ee73965} 2025/04/30 11:58:20 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 907, Offset + Data length: 907} 2025/04/30 11:58:20 server -> Sending packet 4 (140 bytes) for connection bce98593b5348abfdc937fb927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 907, Data length: 117, Offset + Data length: 1024} 2025/04/30 11:58:20 server <- Reading packet 1 (28 bytes) for connection dad0d2c1, 1-RTT 2025/04/30 11:58:20 server Short Header{DestConnectionID: dad0d2c1, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.848ms} 2025/04/30 11:58:20 server <- Reading packet 3 (1352 bytes) for connection dad0d2c1, 1-RTT 2025/04/30 11:58:20 server Short Header{DestConnectionID: dad0d2c1, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:20 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 376µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:20 server <- &wire.PingFrame{} 2025/04/30 11:58:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:20 server <- Reading packet 4 (1392 bytes) for connection dad0d2c1, 1-RTT 2025/04/30 11:58:20 server Short Header{DestConnectionID: dad0d2c1, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:20 server <- &wire.PingFrame{} 2025/04/30 11:58:20 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:58:20 server -> Sending packet 5 (27 bytes) for connection bce98593b5348abfdc937fb927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 69.72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:20 server <- Reading packet 5 (32 bytes) for connection dad0d2c1, 1-RTT 2025/04/30 11:58:20 server Short Header{DestConnectionID: dad0d2c1, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 16µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:20 server newly acked packets (2): [3 4] 2025/04/30 11:58:20 server updated RTT: 33.82615ms (σ: 16.913075ms) 2025/04/30 11:58:20 server ECN capability confirmed. 2025/04/30 11:58:20 server Canceling loss detection timer. 2025/04/30 11:58:20 server -> Sending packet 6 (22 bytes) for connection bce98593b5348abfdc937fb927, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:20 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:20 server <- Reading packet 7 (44 bytes) for connection dad0d2c1, 1-RTT 2025/04/30 11:58:20 server Short Header{DestConnectionID: dad0d2c1, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 32.296ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:20 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:20 Replacing connection for connection IDs [dad0d2c1 25c463b1 21a8f293 4871f1bf 74711a80 bef0896e] with a closed connection. 2025/04/30 11:58:20 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:20 server Connection bce98593b5348abfdc937fb927 closed. 2025/04/30 11:58:21 server <- Received Initial packet. 2025/04/30 11:58:21 Created qlog file: /logs/qlog/5023ead9984c501b.sqlog 2025/04/30 11:58:21 server Changing connection ID to 5545c9a9. 2025/04/30 11:58:21 Adding connection IDs 5023ead9984c501b and 5545c9a9 for a new connection. 2025/04/30 11:58:21 server <- Reading packet 0 (1252 bytes) for connection 5023ead9984c501b, Initial 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: 5023ead9984c501b, SrcConnectionID: (empty), Token: 0x41eb6e5467d498103ee1656df4e310e905cc9bc7e5ec5aac7d150187e966821b973fd18d3875b16f0746ea64243b0ee9f6a7b020d8771de05444ff715b39ed68bb7fe37c3d21e9c68590bd91476c7c23ecac3a794904, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:21 server -> Sending packet 0 (40 bytes) for connection 5023ead9984c501b, Initial 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5545c9a9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:58:21 server <- Reading packet 3 (704 bytes) for connection 5545c9a9, Initial 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: 5545c9a9, SrcConnectionID: (empty), Token: 0x41eb6e5467d498103ee1656df4e310e905cc9bc7e5ec5aac7d150187e966821b973fd18d3875b16f0746ea64243b0ee9f6a7b020d8771de05444ff715b39ed68bb7fe37c3d21e9c68590bd91476c7c23ecac3a794904, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:21 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:21 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:21 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:21 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:21 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:21 Adding connection ID 36c1422e. 2025/04/30 11:58:21 Adding connection ID a2dc256d. 2025/04/30 11:58:21 Adding connection ID ee93db15. 2025/04/30 11:58:21 Adding connection ID 0cd1ddd5. 2025/04/30 11:58:21 Adding connection ID e9d26198. 2025/04/30 11:58:21 server coalesced packet has different destination connection ID: 00000000, expected 5545c9a9 2025/04/30 11:58:21 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5023ead9984c501b 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5545c9a9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 936, Version: v1} 2025/04/30 11:58:21 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5545c9a9, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a2dc256d, StatelessResetToken: 0xe519fe083c2ed177c6dd22c88bc42e5d} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e9d26198, StatelessResetToken: 0xb2b07e9b56be070b44a6f77b2f87f897} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0cd1ddd5, StatelessResetToken: 0x5c74d1e4a4797a7de3f93439532220df} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee93db15, StatelessResetToken: 0x229ce79bf2abc681029eb9346284e7db} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36c1422e, StatelessResetToken: 0x72ef64f90b2bdc7dc8e571ce803595cc} 2025/04/30 11:58:21 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:21 server -> Sending packet 2 (1280 bytes) for connection 5023ead9984c501b, Initial 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5545c9a9, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:21 server -> Sending packet 3 (1280 bytes) for connection 5023ead9984c501b, Initial 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5545c9a9, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:21 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:58:21 server <- Reading packet 4 (125 bytes) for connection 5545c9a9, Initial 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: 5545c9a9, SrcConnectionID: (empty), Token: 0x41eb6e5467d498103ee1656df4e310e905cc9bc7e5ec5aac7d150187e966821b973fd18d3875b16f0746ea64243b0ee9f6a7b020d8771de05444ff715b39ed68bb7fe37c3d21e9c68590bd91476c7c23ecac3a794904, PacketNumber: 4, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:58:21 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 456µs} 2025/04/30 11:58:21 server coalesced packet has different destination connection ID: 00000000, expected 5545c9a9 2025/04/30 11:58:21 server Parsed a coalesced packet. Part 1: 711 bytes. Remaining: 541 bytes. 2025/04/30 11:58:21 server <- Reading packet 5 (711 bytes) for connection 5545c9a9, Initial 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: 5545c9a9, SrcConnectionID: (empty), Token: 0x41eb6e5467d498103ee1656df4e310e905cc9bc7e5ec5aac7d150187e966821b973fd18d3875b16f0746ea64243b0ee9f6a7b020d8771de05444ff715b39ed68bb7fe37c3d21e9c68590bd91476c7c23ecac3a794904, PacketNumber: 5, PacketNumberLen: 1, Length: 610, Version: v1} 2025/04/30 11:58:21 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs} 2025/04/30 11:58:21 server newly acked packets (1): [3] 2025/04/30 11:58:21 server updated RTT: 34.38972ms (σ: 17.19486ms) 2025/04/30 11:58:21 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:21 server coalesced packet has different destination connection ID: 00000000, expected 5545c9a9 2025/04/30 11:58:21 server -> Sending packet 4 (42 bytes) for connection 5023ead9984c501b, Initial 2025/04/30 11:58:21 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5545c9a9, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:21 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:58:21 server -> Sending packet 1 (191 bytes) for connection 5023ead9984c501b, Handshake 2025/04/30 11:58:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5545c9a9, PacketNumber: 1, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:58:21 server -> Sending packet 2 (191 bytes) for connection 5023ead9984c501b, Handshake 2025/04/30 11:58:21 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5545c9a9, PacketNumber: 2, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 11:58:21 Tracking 49 connection IDs and 0 reset tokens. 2025/04/30 11:58:21 server <- Reading packet 0 (75 bytes) for connection 5545c9a9, Handshake 2025/04/30 11:58:21 server Long Header{Type: Handshake, DestConnectionID: 5545c9a9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:21 server Dropping Initial keys. 2025/04/30 11:58:21 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 568µs} 2025/04/30 11:58:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:21 Retiring connection ID 5023ead9984c501b in 5s. 2025/04/30 11:58:21 server Dropping Handshake keys. 2025/04/30 11:58:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:21 server -> Sending packet 2 (371 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a2dc256d, StatelessResetToken: 0xe519fe083c2ed177c6dd22c88bc42e5d} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e9d26198, StatelessResetToken: 0xb2b07e9b56be070b44a6f77b2f87f897} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36c1422e, StatelessResetToken: 0x72ef64f90b2bdc7dc8e571ce803595cc} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0cd1ddd5, StatelessResetToken: 0x5c74d1e4a4797a7de3f93439532220df} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee93db15, StatelessResetToken: 0x229ce79bf2abc681029eb9346284e7db} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:21 server -> &wire.NewTokenFrame{Token: 0x795cf65c0650d87cb38f43d7a7ba183bde5b2f2b3806688fdf380e9f2a35ad7a9ec3001eb5367ff7513bf659a4779ac8454d902a3c8f98d00e4af96217c73408a317b9f7962475c2e0719fbb63a4b5e7d8ad86e0bfdf} 2025/04/30 11:58:21 server -> Sending packet 3 (371 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e9d26198, StatelessResetToken: 0xb2b07e9b56be070b44a6f77b2f87f897} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0cd1ddd5, StatelessResetToken: 0x5c74d1e4a4797a7de3f93439532220df} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a2dc256d, StatelessResetToken: 0xe519fe083c2ed177c6dd22c88bc42e5d} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36c1422e, StatelessResetToken: 0x72ef64f90b2bdc7dc8e571ce803595cc} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee93db15, StatelessResetToken: 0x229ce79bf2abc681029eb9346284e7db} 2025/04/30 11:58:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:21 server -> &wire.NewTokenFrame{Token: 0x795cf65c0650d87cb38f43d7a7ba183bde5b2f2b3806688fdf380e9f2a35ad7a9ec3001eb5367ff7513bf659a4779ac8454d902a3c8f98d00e4af96217c73408a317b9f7962475c2e0719fbb63a4b5e7d8ad86e0bfdf} 2025/04/30 11:58:21 server <- Reading packet 1 (1352 bytes) for connection 5545c9a9, 1-RTT 2025/04/30 11:58:21 server Short Header{DestConnectionID: 5545c9a9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:21 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 280µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server <- &wire.PingFrame{} 2025/04/30 11:58:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:21 server -> Sending packet 4 (27 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 168.506µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server <- Reading packet 2 (1392 bytes) for connection 5545c9a9, 1-RTT 2025/04/30 11:58:21 server Short Header{DestConnectionID: 5545c9a9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:21 server <- &wire.PingFrame{} 2025/04/30 11:58:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:21 Received request: GET /dafogaxqcd 2025/04/30 11:58:21 server -> Sending packet 5 (1053 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 371.573µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:21 server <- Reading packet 3 (42 bytes) for connection 5545c9a9, 1-RTT 2025/04/30 11:58:21 server Short Header{DestConnectionID: 5545c9a9, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:21 server -> Sending packet 6 (1366 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.PingFrame{} 2025/04/30 11:58:21 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:21 server -> Sending packet 7 (28 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.543913ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server <- Reading packet 5 (32 bytes) for connection 5545c9a9, 1-RTT 2025/04/30 11:58:21 server Short Header{DestConnectionID: 5545c9a9, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:21 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 96µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server newly acked packets (1): [6] 2025/04/30 11:58:21 server updated RTT: 34.141ms (σ: 13.389ms) 2025/04/30 11:58:21 server ECN capability confirmed. 2025/04/30 11:58:21 server lost packet 3 (time threshold) 2025/04/30 11:58:21 server lost packet 5 (time threshold) 2025/04/30 11:58:21 server Canceling loss detection timer. 2025/04/30 11:58:21 server -> Sending packet 8 (1366 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36c1422e, StatelessResetToken: 0x72ef64f90b2bdc7dc8e571ce803595cc} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee93db15, StatelessResetToken: 0x229ce79bf2abc681029eb9346284e7db} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:21 server -> &wire.NewTokenFrame{Token: 0x795cf65c0650d87cb38f43d7a7ba183bde5b2f2b3806688fdf380e9f2a35ad7a9ec3001eb5367ff7513bf659a4779ac8454d902a3c8f98d00e4af96217c73408a317b9f7962475c2e0719fbb63a4b5e7d8ad86e0bfdf} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a2dc256d, StatelessResetToken: 0xe519fe083c2ed177c6dd22c88bc42e5d} 2025/04/30 11:58:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0cd1ddd5, StatelessResetToken: 0x5c74d1e4a4797a7de3f93439532220df} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e9d26198, StatelessResetToken: 0xb2b07e9b56be070b44a6f77b2f87f897} 2025/04/30 11:58:21 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 993, Offset + Data length: 993} 2025/04/30 11:58:21 server -> Sending packet 9 (54 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 993, Data length: 31, Offset + Data length: 1024} 2025/04/30 11:58:21 server <- Reading packet 6 (1444 bytes) for connection 5545c9a9, 1-RTT 2025/04/30 11:58:21 server Short Header{DestConnectionID: 5545c9a9, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:21 server <- &wire.PingFrame{} 2025/04/30 11:58:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:21 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:21 server -> Sending packet 10 (30 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 25.251229ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server <- Reading packet 7 (34 bytes) for connection 5545c9a9, 1-RTT 2025/04/30 11:58:21 server Short Header{DestConnectionID: 5545c9a9, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:21 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 72µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server newly acked packets (1): [9] 2025/04/30 11:58:21 server updated RTT: 33.89ms (σ: 10.542ms) 2025/04/30 11:58:21 server setting loss timer for packet 8 (1-RTT) to 38.12625ms (in 2025-04-30 11:58:21.890819787 +0000 UTC m=+26.259700523) 2025/04/30 11:58:21 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:58:21.890819787 +0000 UTC m=+26.259700523 2025/04/30 11:58:21 server lost packet 8 (time threshold) 2025/04/30 11:58:21 server Canceling loss detection timer. 2025/04/30 11:58:21 server -> Sending packet 11 (1366 bytes) for connection 5023ead9984c501b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:21 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:21 server -> &wire.NewTokenFrame{Token: 0x795cf65c0650d87cb38f43d7a7ba183bde5b2f2b3806688fdf380e9f2a35ad7a9ec3001eb5367ff7513bf659a4779ac8454d902a3c8f98d00e4af96217c73408a317b9f7962475c2e0719fbb63a4b5e7d8ad86e0bfdf} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0cd1ddd5, StatelessResetToken: 0x5c74d1e4a4797a7de3f93439532220df} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e9d26198, StatelessResetToken: 0xb2b07e9b56be070b44a6f77b2f87f897} 2025/04/30 11:58:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee93db15, StatelessResetToken: 0x229ce79bf2abc681029eb9346284e7db} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36c1422e, StatelessResetToken: 0x72ef64f90b2bdc7dc8e571ce803595cc} 2025/04/30 11:58:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a2dc256d, StatelessResetToken: 0xe519fe083c2ed177c6dd22c88bc42e5d} 2025/04/30 11:58:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:21 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 993, Offset + Data length: 993} 2025/04/30 11:58:21 server <- Reading packet 9 (32 bytes) for connection 5545c9a9, 1-RTT 2025/04/30 11:58:21 server Short Header{DestConnectionID: 5545c9a9, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:21 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 152µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server newly acked packets (1): [11] 2025/04/30 11:58:21 server updated RTT: 33.68ms (σ: 8.325ms) 2025/04/30 11:58:21 server Canceling loss detection timer. 2025/04/30 11:58:21 server <- Reading packet 10 (43 bytes) for connection 5545c9a9, 1-RTT 2025/04/30 11:58:21 server Short Header{DestConnectionID: 5545c9a9, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:21 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 7, Smallest: 6}}, DelayTime: 376µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:58:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:21 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:21 Replacing connection for connection IDs [e9d26198 5545c9a9 36c1422e a2dc256d ee93db15 0cd1ddd5] with a closed connection. 2025/04/30 11:58:21 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:21 server Connection 5023ead9984c501b closed. 2025/04/30 11:58:22 server <- Received Initial packet. 2025/04/30 11:58:22 Created qlog file: /logs/qlog/6827e8dbf45b5dc02c.sqlog 2025/04/30 11:58:22 server Changing connection ID to 8e3711e3. 2025/04/30 11:58:22 Adding connection IDs 6827e8dbf45b5dc02c and 8e3711e3 for a new connection. 2025/04/30 11:58:22 server <- Reading packet 2 (1252 bytes) for connection 6827e8dbf45b5dc02c, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: 6827e8dbf45b5dc02c, SrcConnectionID: (empty), Token: 0x795cf65c0650d87cb38f43d7a7ba183bde5b2f2b3806688fdf380e9f2a35ad7a9ec3001eb5367ff7513bf659a4779ac8454d902a3c8f98d00e4af96217c73408a317b9f7962475c2e0719fbb63a4b5e7d8ad86e0bfdf, PacketNumber: 2, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:58:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:58:22 server -> Sending packet 0 (40 bytes) for connection 6827e8dbf45b5dc02c, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8e3711e3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:22 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server Parsed a coalesced packet. Part 1: 705 bytes. Remaining: 547 bytes. 2025/04/30 11:58:22 server <- Reading packet 4 (705 bytes) for connection 8e3711e3, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: 8e3711e3, SrcConnectionID: (empty), Token: 0x795cf65c0650d87cb38f43d7a7ba183bde5b2f2b3806688fdf380e9f2a35ad7a9ec3001eb5367ff7513bf659a4779ac8454d902a3c8f98d00e4af96217c73408a317b9f7962475c2e0719fbb63a4b5e7d8ad86e0bfdf, PacketNumber: 4, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:58:22 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:58:22 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:22 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:22 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:22 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:22 Adding connection ID 632cb1d0. 2025/04/30 11:58:22 Adding connection ID e21bba49. 2025/04/30 11:58:22 Adding connection ID b5362010. 2025/04/30 11:58:22 Adding connection ID 5e3a0643. 2025/04/30 11:58:22 Adding connection ID a9e1f314. 2025/04/30 11:58:22 server coalesced packet has different destination connection ID: 00000000, expected 8e3711e3 2025/04/30 11:58:22 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6827e8dbf45b5dc02c 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8e3711e3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:58:22 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8e3711e3, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b5362010, StatelessResetToken: 0x9094c3563296ace24aa8b859a35edda2} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a9e1f314, StatelessResetToken: 0xb3b12cb4c01b3c29a876afc87e97388f} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 632cb1d0, StatelessResetToken: 0x8d54d8f0359a1545d1f58c1af6a84649} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5e3a0643, StatelessResetToken: 0x300a368ced88696c66a7397333631f1a} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e21bba49, StatelessResetToken: 0x88fe556ec1ac9cd78383330ef2616ba1} 2025/04/30 11:58:22 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:58:22 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:22 server -> Sending packet 2 (1280 bytes) for connection 6827e8dbf45b5dc02c, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8e3711e3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:22 server -> Sending packet 3 (1280 bytes) for connection 6827e8dbf45b5dc02c, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8e3711e3, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:22 Removing connection ID c65f0126f509b956d76ce434bc after it has been retired. 2025/04/30 11:58:22 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:58:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:22 server -> Sending packet 1 (194 bytes) for connection 6827e8dbf45b5dc02c, Handshake 2025/04/30 11:58:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8e3711e3, PacketNumber: 1, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:22 server -> Sending packet 2 (194 bytes) for connection 6827e8dbf45b5dc02c, Handshake 2025/04/30 11:58:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8e3711e3, PacketNumber: 2, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:22 Removing connection IDs [338a2b12 1e347ab9 80941205 052aa21b a1312fb2 e8a1d974] for a closed connection after it has been retired. 2025/04/30 11:58:22 server <- Reading packet 1 (74 bytes) for connection 8e3711e3, Handshake 2025/04/30 11:58:22 server Long Header{Type: Handshake, DestConnectionID: 8e3711e3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:58:22 server Dropping Initial keys. 2025/04/30 11:58:22 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 80µs} 2025/04/30 11:58:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:22 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:22 Retiring connection ID 6827e8dbf45b5dc02c in 5s. 2025/04/30 11:58:22 server Dropping Handshake keys. 2025/04/30 11:58:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:22 server -> Sending packet 2 (371 bytes) for connection 6827e8dbf45b5dc02c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 632cb1d0, StatelessResetToken: 0x8d54d8f0359a1545d1f58c1af6a84649} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a9e1f314, StatelessResetToken: 0xb3b12cb4c01b3c29a876afc87e97388f} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b5362010, StatelessResetToken: 0x9094c3563296ace24aa8b859a35edda2} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e21bba49, StatelessResetToken: 0x88fe556ec1ac9cd78383330ef2616ba1} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5e3a0643, StatelessResetToken: 0x300a368ced88696c66a7397333631f1a} 2025/04/30 11:58:22 server -> &wire.NewTokenFrame{Token: 0xc58d3a669d45d4dd90fb7c4b56fe1118315910a55fbfeef5d5eb7965beb2b4b832c04313ccd7f70e5e58896003d058970232934a7053901491a735a6a0fbfe88fc81ba1f4c1bd4caa4bb35177926acdaae5fb9254017} 2025/04/30 11:58:22 server -> Sending packet 3 (371 bytes) for connection 6827e8dbf45b5dc02c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b5362010, StatelessResetToken: 0x9094c3563296ace24aa8b859a35edda2} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 632cb1d0, StatelessResetToken: 0x8d54d8f0359a1545d1f58c1af6a84649} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5e3a0643, StatelessResetToken: 0x300a368ced88696c66a7397333631f1a} 2025/04/30 11:58:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e21bba49, StatelessResetToken: 0x88fe556ec1ac9cd78383330ef2616ba1} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a9e1f314, StatelessResetToken: 0xb3b12cb4c01b3c29a876afc87e97388f} 2025/04/30 11:58:22 server -> &wire.NewTokenFrame{Token: 0xc58d3a669d45d4dd90fb7c4b56fe1118315910a55fbfeef5d5eb7965beb2b4b832c04313ccd7f70e5e58896003d058970232934a7053901491a735a6a0fbfe88fc81ba1f4c1bd4caa4bb35177926acdaae5fb9254017} 2025/04/30 11:58:22 server <- Reading packet 0 (42 bytes) for connection 8e3711e3, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 8e3711e3, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:22 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:22 server <- Reading packet 1 (28 bytes) for connection 8e3711e3, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 8e3711e3, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.528ms} 2025/04/30 11:58:22 server -> Sending packet 4 (28 bytes) for connection 6827e8dbf45b5dc02c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 51.195151ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:22 Received request: GET /anowzwoyeb 2025/04/30 11:58:22 server -> Sending packet 5 (1045 bytes) for connection 6827e8dbf45b5dc02c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:22 server <- Reading packet 2 (1352 bytes) for connection 8e3711e3, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 8e3711e3, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 328µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server <- &wire.PingFrame{} 2025/04/30 11:58:22 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:22 server <- Reading packet 3 (1392 bytes) for connection 8e3711e3, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 8e3711e3, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.PingFrame{} 2025/04/30 11:58:22 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:58:22 server <- Reading packet 4 (34 bytes) for connection 8e3711e3, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 8e3711e3, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server newly acked packets (2): [3 5] 2025/04/30 11:58:22 server updated RTT: 33.228672ms (σ: 16.614336ms) 2025/04/30 11:58:22 server ECN capability confirmed. 2025/04/30 11:58:22 server Canceling loss detection timer. 2025/04/30 11:58:22 server -> Sending packet 6 (30 bytes) for connection 6827e8dbf45b5dc02c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 130.565µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:22 server -> Sending packet 8 (22 bytes) for connection 6827e8dbf45b5dc02c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:22 server -> Sending packet 9 (22 bytes) for connection 6827e8dbf45b5dc02c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:22 server <- Reading packet 7 (48 bytes) for connection 8e3711e3, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 8e3711e3, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 152.896ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:22 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:22 Replacing connection for connection IDs [5e3a0643 a9e1f314 8e3711e3 632cb1d0 e21bba49 b5362010] with a closed connection. 2025/04/30 11:58:22 server Connection 6827e8dbf45b5dc02c closed. 2025/04/30 11:58:22 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:22 server <- Received Initial packet. 2025/04/30 11:58:22 Created qlog file: /logs/qlog/f16b1bde9cc68b88ffe633a3ee.sqlog 2025/04/30 11:58:22 server Changing connection ID to 2dbacc4e. 2025/04/30 11:58:22 Adding connection IDs f16b1bde9cc68b88ffe633a3ee and 2dbacc4e for a new connection. 2025/04/30 11:58:22 server <- Reading packet 0 (1252 bytes) for connection f16b1bde9cc68b88ffe633a3ee, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: f16b1bde9cc68b88ffe633a3ee, SrcConnectionID: (empty), Token: 0xc58d3a669d45d4dd90fb7c4b56fe1118315910a55fbfeef5d5eb7965beb2b4b832c04313ccd7f70e5e58896003d058970232934a7053901491a735a6a0fbfe88fc81ba1f4c1bd4caa4bb35177926acdaae5fb9254017, PacketNumber: 0, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:58:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:22 server -> Sending packet 0 (40 bytes) for connection f16b1bde9cc68b88ffe633a3ee, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2dbacc4e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:22 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server Parsed a coalesced packet. Part 1: 718 bytes. Remaining: 534 bytes. 2025/04/30 11:58:22 server <- Reading packet 1 (718 bytes) for connection f16b1bde9cc68b88ffe633a3ee, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: f16b1bde9cc68b88ffe633a3ee, SrcConnectionID: (empty), Token: 0xc58d3a669d45d4dd90fb7c4b56fe1118315910a55fbfeef5d5eb7965beb2b4b832c04313ccd7f70e5e58896003d058970232934a7053901491a735a6a0fbfe88fc81ba1f4c1bd4caa4bb35177926acdaae5fb9254017, PacketNumber: 1, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:22 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:22 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:22 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:22 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:22 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:22 Adding connection ID 37079bd7. 2025/04/30 11:58:22 Adding connection ID 02fa725f. 2025/04/30 11:58:22 Adding connection ID b03edf7d. 2025/04/30 11:58:22 Adding connection ID bb7c7e40. 2025/04/30 11:58:22 Adding connection ID 4a3c20f6. 2025/04/30 11:58:22 server coalesced packet has different destination connection ID: 00000000, expected f16b1bde9cc68b88ffe633a3ee 2025/04/30 11:58:22 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f16b1bde9cc68b88ffe633a3ee 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2dbacc4e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 928, Version: v1} 2025/04/30 11:58:22 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2dbacc4e, PacketNumber: 0, PacketNumberLen: 2, Length: 186, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 164, Offset + Data length: 164} 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4a3c20f6, StatelessResetToken: 0xf111d25977db0bf4838031dcf0a3a680} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bb7c7e40, StatelessResetToken: 0x85047067d38dbbe8d4152423d5c6b1dc} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b03edf7d, StatelessResetToken: 0xfe69a55c7e5203c11680c1ecc61887ae} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 02fa725f, StatelessResetToken: 0x55137a1573079efc01da1214a11dbe7e} 2025/04/30 11:58:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 37079bd7, StatelessResetToken: 0xabc667cd37b457778f26fb2aabae36e2} 2025/04/30 11:58:22 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:58:22 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:22 server -> Sending packet 2 (1280 bytes) for connection f16b1bde9cc68b88ffe633a3ee, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2dbacc4e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:22 server -> Sending packet 3 (1280 bytes) for connection f16b1bde9cc68b88ffe633a3ee, Initial 2025/04/30 11:58:22 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2dbacc4e, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:22 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:58:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:22 server -> Sending packet 1 (199 bytes) for connection f16b1bde9cc68b88ffe633a3ee, Handshake 2025/04/30 11:58:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2dbacc4e, PacketNumber: 1, PacketNumberLen: 2, Length: 186, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 164, Offset + Data length: 164} 2025/04/30 11:58:22 server -> Sending packet 2 (199 bytes) for connection f16b1bde9cc68b88ffe633a3ee, Handshake 2025/04/30 11:58:22 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2dbacc4e, PacketNumber: 2, PacketNumberLen: 2, Length: 186, Version: v1} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 164, Offset + Data length: 164} 2025/04/30 11:58:22 server <- Reading packet 1 (76 bytes) for connection 2dbacc4e, Handshake 2025/04/30 11:58:22 server Long Header{Type: Handshake, DestConnectionID: 2dbacc4e, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 11:58:22 server Dropping Initial keys. 2025/04/30 11:58:22 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs} 2025/04/30 11:58:22 server newly acked packets (1): [2] 2025/04/30 11:58:22 server updated RTT: 31.466936ms (σ: 15.733468ms) 2025/04/30 11:58:22 server Canceling loss detection timer. 2025/04/30 11:58:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:22 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:22 Retiring connection ID f16b1bde9cc68b88ffe633a3ee in 5s. 2025/04/30 11:58:22 server Dropping Handshake keys. 2025/04/30 11:58:22 server -> Sending packet 1 (251 bytes) for connection f16b1bde9cc68b88ffe633a3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:22 server -> &wire.NewTokenFrame{Token: 0xb93b716bd8489733cd3aefb67c8b6676ba7524261efc536b8cd99c2f118e76aa1295a299cae8337d2e59f75f4132045f4c94113cd97b42ecfeaaad9e4ee9419966ce90c4c3d36b458f3e9272b53e1ef22f3ef24f3e39} 2025/04/30 11:58:22 server <- Reading packet 0 (42 bytes) for connection 2dbacc4e, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 2dbacc4e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:22 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:22 server <- Reading packet 1 (28 bytes) for connection 2dbacc4e, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 2dbacc4e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.416ms} 2025/04/30 11:58:22 server newly acked packets (1): [0] 2025/04/30 11:58:22 server updated RTT: 31.577ms (σ: 12.021ms) 2025/04/30 11:58:22 server -> Sending packet 2 (28 bytes) for connection f16b1bde9cc68b88ffe633a3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 51.067456ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:22 Received request: GET /vfvhhvhmzb 2025/04/30 11:58:22 server -> Sending packet 3 (1045 bytes) for connection f16b1bde9cc68b88ffe633a3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:22 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:22 Removing connection ID d1c812a6d99b6fffdefb88b6c8 after it has been retired. 2025/04/30 11:58:22 server <- Reading packet 2 (1352 bytes) for connection 2dbacc4e, 1-RTT 2025/04/30 11:58:22 server Short Header{DestConnectionID: 2dbacc4e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:22 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 272µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:22 server newly acked packets (1): [1] 2025/04/30 11:58:22 server updated RTT: 31.655ms (σ: 9.173ms) 2025/04/30 11:58:22 server ECN capability confirmed. 2025/04/30 11:58:22 server <- &wire.PingFrame{} 2025/04/30 11:58:22 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:23 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:23 server -> Sending packet 4 (28 bytes) for connection f16b1bde9cc68b88ffe633a3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.38437ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:23 server -> Sending packet 6 (1045 bytes) for connection f16b1bde9cc68b88ffe633a3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:23 server -> Sending packet 7 (1045 bytes) for connection f16b1bde9cc68b88ffe633a3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:23 server <- Reading packet 3 (1392 bytes) for connection 2dbacc4e, 1-RTT 2025/04/30 11:58:23 server Short Header{DestConnectionID: 2dbacc4e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:23 server <- &wire.PingFrame{} 2025/04/30 11:58:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:23 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:23 server -> Sending packet 8 (28 bytes) for connection f16b1bde9cc68b88ffe633a3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 25.298126ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server <- Reading packet 4 (34 bytes) for connection 2dbacc4e, 1-RTT 2025/04/30 11:58:23 server Short Header{DestConnectionID: 2dbacc4e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:23 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 72µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server newly acked packets (1): [7] 2025/04/30 11:58:23 server updated RTT: 31.761ms (σ: 7.093ms) 2025/04/30 11:58:23 server Canceling loss detection timer. 2025/04/30 11:58:23 server -> Sending packet 9 (22 bytes) for connection f16b1bde9cc68b88ffe633a3ee, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:23 server <- Reading packet 7 (46 bytes) for connection 2dbacc4e, 1-RTT 2025/04/30 11:58:23 server Short Header{DestConnectionID: 2dbacc4e, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:23 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 30.92ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:23 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:23 Replacing connection for connection IDs [b03edf7d bb7c7e40 4a3c20f6 2dbacc4e 37079bd7 02fa725f] with a closed connection. 2025/04/30 11:58:23 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:23 server Connection f16b1bde9cc68b88ffe633a3ee closed. 2025/04/30 11:58:23 Removing connection IDs [2335b9a8 d652ff08 4d4ad77d 884a96e5 1e1d467a f0f75262] for a closed connection after it has been retired. 2025/04/30 11:58:23 server <- Received Initial packet. 2025/04/30 11:58:23 Created qlog file: /logs/qlog/a4a67699e5eef044.sqlog 2025/04/30 11:58:23 server Changing connection ID to 3aa96719. 2025/04/30 11:58:23 Adding connection IDs a4a67699e5eef044 and 3aa96719 for a new connection. 2025/04/30 11:58:23 server <- Reading packet 0 (1252 bytes) for connection a4a67699e5eef044, Initial 2025/04/30 11:58:23 server Long Header{Type: Initial, DestConnectionID: a4a67699e5eef044, SrcConnectionID: (empty), Token: 0xb93b716bd8489733cd3aefb67c8b6676ba7524261efc536b8cd99c2f118e76aa1295a299cae8337d2e59f75f4132045f4c94113cd97b42ecfeaaad9e4ee9419966ce90c4c3d36b458f3e9272b53e1ef22f3ef24f3e39, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:23 server -> Sending packet 0 (40 bytes) for connection a4a67699e5eef044, Initial 2025/04/30 11:58:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa96719, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:23 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:23 Tracking 51 connection IDs and 0 reset tokens. 2025/04/30 11:58:23 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:23 server <- Reading packet 3 (708 bytes) for connection a4a67699e5eef044, Initial 2025/04/30 11:58:23 server Long Header{Type: Initial, DestConnectionID: a4a67699e5eef044, SrcConnectionID: (empty), Token: 0xb93b716bd8489733cd3aefb67c8b6676ba7524261efc536b8cd99c2f118e76aa1295a299cae8337d2e59f75f4132045f4c94113cd97b42ecfeaaad9e4ee9419966ce90c4c3d36b458f3e9272b53e1ef22f3ef24f3e39, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:23 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:23 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:23 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:23 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:23 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:23 Adding connection ID 505fc64c. 2025/04/30 11:58:23 Adding connection ID b8adc08d. 2025/04/30 11:58:23 Adding connection ID 088d5ba3. 2025/04/30 11:58:23 Adding connection ID 40b24e75. 2025/04/30 11:58:23 Adding connection ID a7023eb2. 2025/04/30 11:58:23 server coalesced packet has different destination connection ID: 00000000, expected a4a67699e5eef044 2025/04/30 11:58:23 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a4a67699e5eef044 2025/04/30 11:58:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa96719, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 940, Version: v1} 2025/04/30 11:58:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:23 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3aa96719, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 088d5ba3, StatelessResetToken: 0xddb76d347670f45e9d3fd7d1c0c0566e} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 505fc64c, StatelessResetToken: 0x425ae9a010bc20ceef79d5ef2fde96e7} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8adc08d, StatelessResetToken: 0xf4e5ceac61ba28ac7d21a8084c38721b} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a7023eb2, StatelessResetToken: 0xe7573217ac21fe2437cfcd9c4318d590} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40b24e75, StatelessResetToken: 0x1a69c24e740f0f5b701fbe971b5fcea2} 2025/04/30 11:58:23 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:23 server -> Sending packet 2 (1280 bytes) for connection a4a67699e5eef044, Initial 2025/04/30 11:58:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa96719, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:23 server -> Sending packet 3 (1280 bytes) for connection a4a67699e5eef044, Initial 2025/04/30 11:58:23 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3aa96719, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:23 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:23 server -> Sending packet 1 (187 bytes) for connection a4a67699e5eef044, Handshake 2025/04/30 11:58:23 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3aa96719, PacketNumber: 1, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:23 server -> Sending packet 2 (187 bytes) for connection a4a67699e5eef044, Handshake 2025/04/30 11:58:23 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3aa96719, PacketNumber: 2, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:23 server Parsed a coalesced packet. Part 1: 123 bytes. Remaining: 1129 bytes. 2025/04/30 11:58:23 server <- Reading packet 4 (123 bytes) for connection 3aa96719, Initial 2025/04/30 11:58:23 server Long Header{Type: Initial, DestConnectionID: 3aa96719, SrcConnectionID: (empty), Token: 0xb93b716bd8489733cd3aefb67c8b6676ba7524261efc536b8cd99c2f118e76aa1295a299cae8337d2e59f75f4132045f4c94113cd97b42ecfeaaad9e4ee9419966ce90c4c3d36b458f3e9272b53e1ef22f3ef24f3e39, PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:58:23 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 456µs} 2025/04/30 11:58:23 server newly acked packets (1): [3] 2025/04/30 11:58:23 server updated RTT: 34.280421ms (σ: 17.14021ms) 2025/04/30 11:58:23 server coalesced packet has different destination connection ID: 00000000, expected 3aa96719 2025/04/30 11:58:23 server <- Reading packet 0 (74 bytes) for connection 3aa96719, Handshake 2025/04/30 11:58:23 server Long Header{Type: Handshake, DestConnectionID: 3aa96719, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:58:23 server Dropping Initial keys. 2025/04/30 11:58:23 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 496µs} 2025/04/30 11:58:23 server newly acked packets (1): [2] 2025/04/30 11:58:23 server updated RTT: 33.957ms (σ: 13.499ms) 2025/04/30 11:58:23 server Canceling loss detection timer. 2025/04/30 11:58:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:23 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:23 Retiring connection ID a4a67699e5eef044 in 5s. 2025/04/30 11:58:23 server Dropping Handshake keys. 2025/04/30 11:58:23 server -> Sending packet 1 (251 bytes) for connection a4a67699e5eef044, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:23 server -> &wire.NewTokenFrame{Token: 0x24f30aa26882977fb4bcc2264bd34c37771983c6b55cedc04f0188fb7a1d3ac78238d26501d2b2536b6d64cd77d075415c17ad567f258d6ed20d3d1df82f3257f3999b7ae4407c3e1d7e425eb8e87df8cbd9932ab0c2} 2025/04/30 11:58:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:23 Removing connection ID 468ce4cfe113f1ff16957a after it has been retired. 2025/04/30 11:58:23 server <- Reading packet 1 (1352 bytes) for connection 3aa96719, 1-RTT 2025/04/30 11:58:23 server Short Header{DestConnectionID: 3aa96719, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:23 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 280µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server newly acked packets (1): [1] 2025/04/30 11:58:23 server updated RTT: 33.743ms (σ: 10.551ms) 2025/04/30 11:58:23 server ECN capability confirmed. 2025/04/30 11:58:23 server lost packet 0 (time threshold) 2025/04/30 11:58:23 server Canceling loss detection timer. 2025/04/30 11:58:23 server <- &wire.PingFrame{} 2025/04/30 11:58:23 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:23 server -> Sending packet 2 (147 bytes) for connection a4a67699e5eef044, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 208.089µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8adc08d, StatelessResetToken: 0xf4e5ceac61ba28ac7d21a8084c38721b} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 088d5ba3, StatelessResetToken: 0xddb76d347670f45e9d3fd7d1c0c0566e} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 505fc64c, StatelessResetToken: 0x425ae9a010bc20ceef79d5ef2fde96e7} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a7023eb2, StatelessResetToken: 0xe7573217ac21fe2437cfcd9c4318d590} 2025/04/30 11:58:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 40b24e75, StatelessResetToken: 0x1a69c24e740f0f5b701fbe971b5fcea2} 2025/04/30 11:58:23 Removing connection IDs [9463714d 5f0a32c0 a49894a5 101d0a55 d20d85be 3fef7d11] for a closed connection after it has been retired. 2025/04/30 11:58:23 server <- Reading packet 2 (1392 bytes) for connection 3aa96719, 1-RTT 2025/04/30 11:58:23 server Short Header{DestConnectionID: 3aa96719, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:23 server <- &wire.PingFrame{} 2025/04/30 11:58:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:23 server <- Reading packet 3 (31 bytes) for connection 3aa96719, 1-RTT 2025/04/30 11:58:23 server Short Header{DestConnectionID: 3aa96719, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:23 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 21.376ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server newly acked packets (1): [2] 2025/04/30 11:58:23 server updated RTT: 33.575ms (σ: 8.248ms) 2025/04/30 11:58:23 server Canceling loss detection timer. 2025/04/30 11:58:23 server Ignoring all packets below 2. 2025/04/30 11:58:23 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:23 server -> Sending packet 3 (28 bytes) for connection a4a67699e5eef044, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 5.232052ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server <- Reading packet 4 (1444 bytes) for connection 3aa96719, 1-RTT 2025/04/30 11:58:23 server Short Header{DestConnectionID: 3aa96719, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:23 server <- &wire.PingFrame{} 2025/04/30 11:58:23 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:23 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:23 Received request: GET /hzwcluihtg 2025/04/30 11:58:23 server -> Sending packet 4 (1053 bytes) for connection a4a67699e5eef044, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:23 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:23 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 343.272µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:23 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 11:58:23 server <- Reading packet 6 (42 bytes) for connection 3aa96719, 1-RTT 2025/04/30 11:58:23 server Short Header{DestConnectionID: 3aa96719, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:23 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 688µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:23 server newly acked packets (1): [4] 2025/04/30 11:58:23 server updated RTT: 33.421ms (σ: 6.492ms) 2025/04/30 11:58:23 server Canceling loss detection timer. 2025/04/30 11:58:23 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:23 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:23 Replacing connection for connection IDs [505fc64c b8adc08d 088d5ba3 40b24e75 a7023eb2 3aa96719] with a closed connection. 2025/04/30 11:58:23 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:23 server Connection a4a67699e5eef044 closed. 2025/04/30 11:58:24 Removing connection ID 2b98c9e9235471c9 after it has been retired. 2025/04/30 11:58:24 Removing connection IDs [ca39891e 5db4bfa7 08bf3c4a 408c3235 f55efa12 6f5e6bb7] for a closed connection after it has been retired. 2025/04/30 11:58:24 Removing connection ID b2fa1ce0dc27ee28 after it has been retired. 2025/04/30 11:58:25 Removing connection IDs [84bbe854 08dbeaab b021f239 abcaccaf f1dd7807 9d10f742] for a closed connection after it has been retired. 2025/04/30 11:58:25 Tracking 35 connection IDs and 0 reset tokens. 2025/04/30 11:58:25 Removing connection ID bce98593b5348abfdc937fb927 after it has been retired. 2025/04/30 11:58:25 Removing connection IDs [dad0d2c1 25c463b1 21a8f293 4871f1bf 74711a80 bef0896e] for a closed connection after it has been retired. 2025/04/30 11:58:25 server <- Received Initial packet. 2025/04/30 11:58:25 Created qlog file: /logs/qlog/327a47467049b7bc.sqlog 2025/04/30 11:58:25 server Changing connection ID to 919b762d. 2025/04/30 11:58:25 Adding connection IDs 327a47467049b7bc and 919b762d for a new connection. 2025/04/30 11:58:25 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:25 server <- Reading packet 1 (708 bytes) for connection 327a47467049b7bc, Initial 2025/04/30 11:58:25 server Long Header{Type: Initial, DestConnectionID: 327a47467049b7bc, SrcConnectionID: (empty), Token: 0x24f30aa26882977fb4bcc2264bd34c37771983c6b55cedc04f0188fb7a1d3ac78238d26501d2b2536b6d64cd77d075415c17ad567f258d6ed20d3d1df82f3257f3999b7ae4407c3e1d7e425eb8e87df8cbd9932ab0c2, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:25 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:25 server coalesced packet has different destination connection ID: 00000000, expected 327a47467049b7bc 2025/04/30 11:58:25 server -> Sending packet 0 (40 bytes) for connection 327a47467049b7bc, Initial 2025/04/30 11:58:25 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 919b762d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:25 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:25 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:58:25 server <- Reading packet 2 (1248 bytes) for connection 919b762d, Initial 2025/04/30 11:58:25 server Long Header{Type: Initial, DestConnectionID: 919b762d, SrcConnectionID: (empty), Token: 0x24f30aa26882977fb4bcc2264bd34c37771983c6b55cedc04f0188fb7a1d3ac78238d26501d2b2536b6d64cd77d075415c17ad567f258d6ed20d3d1df82f3257f3999b7ae4407c3e1d7e425eb8e87df8cbd9932ab0c2, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:26 Adding connection ID 0961897f. 2025/04/30 11:58:26 Adding connection ID ee3f1d98. 2025/04/30 11:58:26 Adding connection ID e51874a3. 2025/04/30 11:58:26 Adding connection ID b6d9d139. 2025/04/30 11:58:26 Adding connection ID c16cf627. 2025/04/30 11:58:26 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:58:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 327a47467049b7bc 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 919b762d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 934, Version: v1} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 919b762d, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c16cf627, StatelessResetToken: 0xad2aade78cbfdfefa07d609148df6b8a} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0961897f, StatelessResetToken: 0xa841e3bfda0a8275f686ad63579193c6} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b6d9d139, StatelessResetToken: 0xb20950b01b8c09a941a0a79b7532246b} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e51874a3, StatelessResetToken: 0xedf62befa7933943c59cf7cb1315d393} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ee3f1d98, StatelessResetToken: 0xde70b1e041f0cdffdbb151cc5d01fd96} 2025/04/30 11:58:26 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:26 server <- Reading packet 3 (124 bytes) for connection 919b762d, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: 919b762d, SrcConnectionID: (empty), Token: 0x24f30aa26882977fb4bcc2264bd34c37771983c6b55cedc04f0188fb7a1d3ac78238d26501d2b2536b6d64cd77d075415c17ad567f258d6ed20d3d1df82f3257f3999b7ae4407c3e1d7e425eb8e87df8cbd9932ab0c2, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.024ms} 2025/04/30 11:58:26 server newly acked packets (1): [1] 2025/04/30 11:58:26 server updated RTT: 32.942665ms (σ: 16.471332ms) 2025/04/30 11:58:26 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:26 server <- Reading packet 0 (75 bytes) for connection 919b762d, Handshake 2025/04/30 11:58:26 server Long Header{Type: Handshake, DestConnectionID: 919b762d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:26 server Dropping Initial keys. 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.024ms} 2025/04/30 11:58:26 server newly acked packets (1): [0] 2025/04/30 11:58:26 server updated RTT: 32.942ms (σ: 12.353ms) 2025/04/30 11:58:26 server Canceling loss detection timer. 2025/04/30 11:58:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:26 Retiring connection ID 327a47467049b7bc in 5s. 2025/04/30 11:58:26 server Dropping Handshake keys. 2025/04/30 11:58:26 server -> Sending packet 1 (251 bytes) for connection 327a47467049b7bc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewTokenFrame{Token: 0x44b113b74685d099dd2ec996f14034695d1796a2328d8e16bd9b9b13b9e5a999cf1e88c5740421f0de8ffe57bc78439e8c91861149a190578b5a92f54e84db533d8b120630e8bc38f53c4c733208bc568363c1a53f3b} 2025/04/30 11:58:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:26 server <- Reading packet 0 (42 bytes) for connection 919b762d, 1-RTT 2025/04/30 11:58:26 server Short Header{DestConnectionID: 919b762d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:26 server -> Sending packet 2 (27 bytes) for connection 327a47467049b7bc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 259.075µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:26 Received request: GET /lnniznobge 2025/04/30 11:58:26 server -> Sending packet 3 (1045 bytes) for connection 327a47467049b7bc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:26 server <- Reading packet 2 (1352 bytes) for connection 919b762d, 1-RTT 2025/04/30 11:58:26 server Short Header{DestConnectionID: 919b762d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:26 server <- &wire.PingFrame{} 2025/04/30 11:58:26 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:26 server <- Reading packet 4 (43 bytes) for connection 919b762d, 1-RTT 2025/04/30 11:58:26 server Short Header{DestConnectionID: 919b762d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 176µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server newly acked packets (3): [0 1 3] 2025/04/30 11:58:26 server updated RTT: 32.834ms (σ: 9.48ms) 2025/04/30 11:58:26 server ECN capability confirmed. 2025/04/30 11:58:26 server Canceling loss detection timer. 2025/04/30 11:58:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:26 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:26 Replacing connection for connection IDs [919b762d 0961897f ee3f1d98 e51874a3 b6d9d139 c16cf627] with a closed connection. 2025/04/30 11:58:26 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:26 server Connection 327a47467049b7bc closed. 2025/04/30 11:58:26 server <- Received Initial packet. 2025/04/30 11:58:26 Created qlog file: /logs/qlog/e3131b3424b967a6.sqlog 2025/04/30 11:58:26 server Changing connection ID to 4d0733e2. 2025/04/30 11:58:26 Adding connection IDs e3131b3424b967a6 and 4d0733e2 for a new connection. 2025/04/30 11:58:26 server <- Reading packet 0 (1252 bytes) for connection e3131b3424b967a6, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: e3131b3424b967a6, SrcConnectionID: (empty), Token: 0x44b113b74685d099dd2ec996f14034695d1796a2328d8e16bd9b9b13b9e5a999cf1e88c5740421f0de8ffe57bc78439e8c91861149a190578b5a92f54e84db533d8b120630e8bc38f53c4c733208bc568363c1a53f3b, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:26 server -> Sending packet 0 (40 bytes) for connection e3131b3424b967a6, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:26 server <- Reading packet 1 (708 bytes) for connection e3131b3424b967a6, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: e3131b3424b967a6, SrcConnectionID: (empty), Token: 0x44b113b74685d099dd2ec996f14034695d1796a2328d8e16bd9b9b13b9e5a999cf1e88c5740421f0de8ffe57bc78439e8c91861149a190578b5a92f54e84db533d8b120630e8bc38f53c4c733208bc568363c1a53f3b, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:26 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:26 Adding connection ID 5f0bc0c8. 2025/04/30 11:58:26 Adding connection ID b4eae9a9. 2025/04/30 11:58:26 Adding connection ID 9332085a. 2025/04/30 11:58:26 Adding connection ID adcad340. 2025/04/30 11:58:26 Adding connection ID c7727ceb. 2025/04/30 11:58:26 server coalesced packet has different destination connection ID: 00000000, expected e3131b3424b967a6 2025/04/30 11:58:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e3131b3424b967a6 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 944, Version: v1} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9332085a, StatelessResetToken: 0xe1bcaeda330261cffd9943538658750e} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: adcad340, StatelessResetToken: 0xac9250b6dfd1d19ece4de4fbc8efb8d9} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0bc0c8, StatelessResetToken: 0x27f9db9499913248e6b35bd2bb4d70dd} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c7727ceb, StatelessResetToken: 0x0818f168c4a3ad8869e9572d187c8b86} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b4eae9a9, StatelessResetToken: 0xc71fa0631c2cd27b2a04c9d180fb700f} 2025/04/30 11:58:26 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:26 server -> Sending packet 2 (1280 bytes) for connection e3131b3424b967a6, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:26 server -> Sending packet 3 (1280 bytes) for connection e3131b3424b967a6, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:26 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 1128 bytes. 2025/04/30 11:58:26 server <- Reading packet 2 (124 bytes) for connection 4d0733e2, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: 4d0733e2, SrcConnectionID: (empty), Token: 0x44b113b74685d099dd2ec996f14034695d1796a2328d8e16bd9b9b13b9e5a999cf1e88c5740421f0de8ffe57bc78439e8c91861149a190578b5a92f54e84db533d8b120630e8bc38f53c4c733208bc568363c1a53f3b, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 592µs} 2025/04/30 11:58:26 server coalesced packet has different destination connection ID: 00000000, expected 4d0733e2 2025/04/30 11:58:26 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:26 server -> Sending packet 1 (183 bytes) for connection e3131b3424b967a6, Handshake 2025/04/30 11:58:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, PacketNumber: 1, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 11:58:26 server -> Sending packet 2 (183 bytes) for connection e3131b3424b967a6, Handshake 2025/04/30 11:58:26 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, PacketNumber: 2, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 11:58:26 server <- Reading packet 3 (1252 bytes) for connection 4d0733e2, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: 4d0733e2, SrcConnectionID: (empty), Token: 0x44b113b74685d099dd2ec996f14034695d1796a2328d8e16bd9b9b13b9e5a999cf1e88c5740421f0de8ffe57bc78439e8c91861149a190578b5a92f54e84db533d8b120630e8bc38f53c4c733208bc568363c1a53f3b, PacketNumber: 3, PacketNumberLen: 1, Length: 1151, Version: v1} 2025/04/30 11:58:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 1130, Offset + Data length: 1130} 2025/04/30 11:58:26 server -> Sending packet 4 (40 bytes) for connection e3131b3424b967a6, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server Parsed a coalesced packet. Part 1: 700 bytes. Remaining: 552 bytes. 2025/04/30 11:58:26 server <- Reading packet 4 (700 bytes) for connection 4d0733e2, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: 4d0733e2, SrcConnectionID: (empty), Token: 0x44b113b74685d099dd2ec996f14034695d1796a2328d8e16bd9b9b13b9e5a999cf1e88c5740421f0de8ffe57bc78439e8c91861149a190578b5a92f54e84db533d8b120630e8bc38f53c4c733208bc568363c1a53f3b, PacketNumber: 4, PacketNumberLen: 1, Length: 599, Version: v1} 2025/04/30 11:58:26 server <- &wire.CryptoFrame{Offset: 1130, Data length: 577, Offset + Data length: 1707} 2025/04/30 11:58:26 server coalesced packet has different destination connection ID: 00000000, expected 4d0733e2 2025/04/30 11:58:26 server -> Sending packet 5 (40 bytes) for connection e3131b3424b967a6, Initial 2025/04/30 11:58:26 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d0733e2, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server <- Reading packet 0 (74 bytes) for connection 4d0733e2, Handshake 2025/04/30 11:58:26 server Long Header{Type: Handshake, DestConnectionID: 4d0733e2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:58:26 server Dropping Initial keys. 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 488µs} 2025/04/30 11:58:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:26 Retiring connection ID e3131b3424b967a6 in 5s. 2025/04/30 11:58:26 server Dropping Handshake keys. 2025/04/30 11:58:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:26 server -> Sending packet 2 (371 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c7727ceb, StatelessResetToken: 0x0818f168c4a3ad8869e9572d187c8b86} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: adcad340, StatelessResetToken: 0xac9250b6dfd1d19ece4de4fbc8efb8d9} 2025/04/30 11:58:26 server -> &wire.NewTokenFrame{Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb} 2025/04/30 11:58:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b4eae9a9, StatelessResetToken: 0xc71fa0631c2cd27b2a04c9d180fb700f} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0bc0c8, StatelessResetToken: 0x27f9db9499913248e6b35bd2bb4d70dd} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9332085a, StatelessResetToken: 0xe1bcaeda330261cffd9943538658750e} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:26 server -> Sending packet 3 (371 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: adcad340, StatelessResetToken: 0xac9250b6dfd1d19ece4de4fbc8efb8d9} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0bc0c8, StatelessResetToken: 0x27f9db9499913248e6b35bd2bb4d70dd} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c7727ceb, StatelessResetToken: 0x0818f168c4a3ad8869e9572d187c8b86} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b4eae9a9, StatelessResetToken: 0xc71fa0631c2cd27b2a04c9d180fb700f} 2025/04/30 11:58:26 server -> &wire.NewTokenFrame{Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9332085a, StatelessResetToken: 0xe1bcaeda330261cffd9943538658750e} 2025/04/30 11:58:26 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:58:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:58:26 server -> Sending packet 5 (371 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b4eae9a9, StatelessResetToken: 0xc71fa0631c2cd27b2a04c9d180fb700f} 2025/04/30 11:58:26 server -> &wire.NewTokenFrame{Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: adcad340, StatelessResetToken: 0xac9250b6dfd1d19ece4de4fbc8efb8d9} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0bc0c8, StatelessResetToken: 0x27f9db9499913248e6b35bd2bb4d70dd} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c7727ceb, StatelessResetToken: 0x0818f168c4a3ad8869e9572d187c8b86} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9332085a, StatelessResetToken: 0xe1bcaeda330261cffd9943538658750e} 2025/04/30 11:58:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:26 server -> Sending packet 6 (371 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c7727ceb, StatelessResetToken: 0x0818f168c4a3ad8869e9572d187c8b86} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9332085a, StatelessResetToken: 0xe1bcaeda330261cffd9943538658750e} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b4eae9a9, StatelessResetToken: 0xc71fa0631c2cd27b2a04c9d180fb700f} 2025/04/30 11:58:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:26 server -> &wire.NewTokenFrame{Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0bc0c8, StatelessResetToken: 0x27f9db9499913248e6b35bd2bb4d70dd} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: adcad340, StatelessResetToken: 0xac9250b6dfd1d19ece4de4fbc8efb8d9} 2025/04/30 11:58:26 Removing connection ID 5023ead9984c501b after it has been retired. 2025/04/30 11:58:26 server <- Reading packet 2 (1392 bytes) for connection 4d0733e2, 1-RTT 2025/04/30 11:58:26 server Short Header{DestConnectionID: 4d0733e2, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 176µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server <- &wire.PingFrame{} 2025/04/30 11:58:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:26 server -> Sending packet 7 (27 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 102.02µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:58:26 server -> Sending packet 9 (371 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewTokenFrame{Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0bc0c8, StatelessResetToken: 0x27f9db9499913248e6b35bd2bb4d70dd} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: adcad340, StatelessResetToken: 0xac9250b6dfd1d19ece4de4fbc8efb8d9} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b4eae9a9, StatelessResetToken: 0xc71fa0631c2cd27b2a04c9d180fb700f} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9332085a, StatelessResetToken: 0xe1bcaeda330261cffd9943538658750e} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c7727ceb, StatelessResetToken: 0x0818f168c4a3ad8869e9572d187c8b86} 2025/04/30 11:58:26 server -> Sending packet 10 (371 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.NewTokenFrame{Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9332085a, StatelessResetToken: 0xe1bcaeda330261cffd9943538658750e} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: adcad340, StatelessResetToken: 0xac9250b6dfd1d19ece4de4fbc8efb8d9} 2025/04/30 11:58:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b4eae9a9, StatelessResetToken: 0xc71fa0631c2cd27b2a04c9d180fb700f} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c7727ceb, StatelessResetToken: 0x0818f168c4a3ad8869e9572d187c8b86} 2025/04/30 11:58:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0bc0c8, StatelessResetToken: 0x27f9db9499913248e6b35bd2bb4d70dd} 2025/04/30 11:58:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:26 server -> Sending packet 11 (1366 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.PingFrame{} 2025/04/30 11:58:26 server <- Reading packet 3 (1444 bytes) for connection 4d0733e2, 1-RTT 2025/04/30 11:58:26 server Short Header{DestConnectionID: 4d0733e2, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 120µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server <- &wire.PingFrame{} 2025/04/30 11:58:26 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:26 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 11:58:26 server <- Reading packet 5 (34 bytes) for connection 4d0733e2, 1-RTT 2025/04/30 11:58:26 server Short Header{DestConnectionID: 4d0733e2, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 32µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server newly acked packets (2): [10 11] 2025/04/30 11:58:26 server updated RTT: 33.730564ms (σ: 16.865282ms) 2025/04/30 11:58:26 server ECN capability confirmed. 2025/04/30 11:58:26 server Canceling loss detection timer. 2025/04/30 11:58:26 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:26 server -> Sending packet 12 (30 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 24.207416ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server <- Reading packet 6 (42 bytes) for connection 4d0733e2, 1-RTT 2025/04/30 11:58:26 server Short Header{DestConnectionID: 4d0733e2, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:26 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:26 Received request: GET /mvtpqyamcv 2025/04/30 11:58:26 server -> Sending packet 13 (1055 bytes) for connection e3131b3424b967a6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:26 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:26 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 315.533µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:26 Removing connection IDs [e9d26198 5545c9a9 36c1422e a2dc256d ee93db15 0cd1ddd5] for a closed connection after it has been retired. 2025/04/30 11:58:26 server <- Reading packet 7 (41 bytes) for connection 4d0733e2, 1-RTT 2025/04/30 11:58:26 server Short Header{DestConnectionID: 4d0733e2, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:26 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 9, DelayTime: 240µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 11:58:26 server newly acked packets (1): [13] 2025/04/30 11:58:26 server updated RTT: 33.514ms (σ: 13.08ms) 2025/04/30 11:58:26 server Canceling loss detection timer. 2025/04/30 11:58:26 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:26 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:26 Replacing connection for connection IDs [5f0bc0c8 b4eae9a9 9332085a adcad340 c7727ceb 4d0733e2] with a closed connection. 2025/04/30 11:58:26 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:26 server Connection e3131b3424b967a6 closed. 2025/04/30 11:58:27 Removing connection ID 6827e8dbf45b5dc02c after it has been retired. 2025/04/30 11:58:27 Tracking 34 connection IDs and 0 reset tokens. 2025/04/30 11:58:27 Removing connection IDs [5e3a0643 a9e1f314 8e3711e3 632cb1d0 e21bba49 b5362010] for a closed connection after it has been retired. 2025/04/30 11:58:27 server <- Received Initial packet. 2025/04/30 11:58:27 Created qlog file: /logs/qlog/dba4a7fda716926bff.sqlog 2025/04/30 11:58:27 server Changing connection ID to 3040a768. 2025/04/30 11:58:27 Adding connection IDs dba4a7fda716926bff and 3040a768 for a new connection. 2025/04/30 11:58:27 server <- Reading packet 0 (1252 bytes) for connection dba4a7fda716926bff, Initial 2025/04/30 11:58:27 server Long Header{Type: Initial, DestConnectionID: dba4a7fda716926bff, SrcConnectionID: (empty), Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb, PacketNumber: 0, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:58:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:58:27 server -> Sending packet 0 (40 bytes) for connection dba4a7fda716926bff, Initial 2025/04/30 11:58:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3040a768, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:27 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:58:27 server <- Reading packet 1 (710 bytes) for connection dba4a7fda716926bff, Initial 2025/04/30 11:58:27 server Long Header{Type: Initial, DestConnectionID: dba4a7fda716926bff, SrcConnectionID: (empty), Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb, PacketNumber: 1, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:58:27 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:58:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:27 Adding connection ID 817d7155. 2025/04/30 11:58:27 Adding connection ID a66974df. 2025/04/30 11:58:27 Adding connection ID ea49c7a8. 2025/04/30 11:58:27 Adding connection ID e717f240. 2025/04/30 11:58:27 Adding connection ID 8f2976d4. 2025/04/30 11:58:27 server coalesced packet has different destination connection ID: 00000000, expected dba4a7fda716926bff 2025/04/30 11:58:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection dba4a7fda716926bff 2025/04/30 11:58:27 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3040a768, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 940, Version: v1} 2025/04/30 11:58:27 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:27 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3040a768, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:27 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ea49c7a8, StatelessResetToken: 0xf35b2f29c520a84495dbcaedd1926a4a} 2025/04/30 11:58:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a66974df, StatelessResetToken: 0xff950f4b25a40c394fb2c778ee0f834a} 2025/04/30 11:58:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e717f240, StatelessResetToken: 0xd494115131a9679452784bf36f9f8d7f} 2025/04/30 11:58:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 8f2976d4, StatelessResetToken: 0x2261df2cea577a7651022e3ceb6ef311} 2025/04/30 11:58:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 817d7155, StatelessResetToken: 0x6a75fea20348599f84a16a180268fb7d} 2025/04/30 11:58:27 Removing connection ID f16b1bde9cc68b88ffe633a3ee after it has been retired. 2025/04/30 11:58:27 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:27 server <- Reading packet 2 (124 bytes) for connection 3040a768, Initial 2025/04/30 11:58:27 server Long Header{Type: Initial, DestConnectionID: 3040a768, SrcConnectionID: (empty), Token: 0x1e365fed72c6e416a5881513c6c37a950b01a979d7b9580f294651d160c50787480f294d86a172e95a6f984c7a3637f1a528a34bc575aa07bce4b8cd7c1de0dc18c52e5a673811dfe298ca6fa337d054f2163b3b18eb, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:27 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 872µs} 2025/04/30 11:58:27 server newly acked packets (1): [1] 2025/04/30 11:58:27 server updated RTT: 32.951444ms (σ: 16.475722ms) 2025/04/30 11:58:27 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:27 server <- Reading packet 0 (75 bytes) for connection 3040a768, Handshake 2025/04/30 11:58:27 server Long Header{Type: Handshake, DestConnectionID: 3040a768, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:27 server Dropping Initial keys. 2025/04/30 11:58:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 872µs} 2025/04/30 11:58:27 server newly acked packets (1): [0] 2025/04/30 11:58:27 server updated RTT: 32.951ms (σ: 12.356ms) 2025/04/30 11:58:27 server Canceling loss detection timer. 2025/04/30 11:58:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:27 Retiring connection ID dba4a7fda716926bff in 5s. 2025/04/30 11:58:27 server Dropping Handshake keys. 2025/04/30 11:58:27 server <- Reading packet 0 (42 bytes) for connection 3040a768, 1-RTT 2025/04/30 11:58:27 server Short Header{DestConnectionID: 3040a768, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:27 Received request: GET /wdbsxtekct 2025/04/30 11:58:27 server -> Sending packet 1 (259 bytes) for connection dba4a7fda716926bff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:27 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 389.869µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:27 server -> &wire.NewTokenFrame{Token: 0x6873c6100acb86d064ff7a01a3fe3c649d2bf4fa5a16c7c087cb1f6b65ac496d45dda5c7bfeb5068d565fab59246491bf7edf29bc08822aed466eec6dd07777c2aff54261b8f1ce8503f48b3874f9a7a98ab3bab1384} 2025/04/30 11:58:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:27 server -> Sending packet 2 (1045 bytes) for connection dba4a7fda716926bff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:27 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:28 server <- Reading packet 2 (1352 bytes) for connection 3040a768, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: 3040a768, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.PingFrame{} 2025/04/30 11:58:28 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:28 server -> Sending packet 3 (29 bytes) for connection dba4a7fda716926bff, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 122.98µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server <- Reading packet 3 (30 bytes) for connection 3040a768, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: 3040a768, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server newly acked packets (3): [0 1 2] 2025/04/30 11:58:28 server updated RTT: 32.9ms (σ: 9.367ms) 2025/04/30 11:58:28 server ECN capability confirmed. 2025/04/30 11:58:28 server Canceling loss detection timer. 2025/04/30 11:58:28 server Ignoring all packets below 1. 2025/04/30 11:58:28 server <- Reading packet 4 (41 bytes) for connection 3040a768, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: 3040a768, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 264µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:28 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:28 Replacing connection for connection IDs [3040a768 817d7155 a66974df ea49c7a8 e717f240 8f2976d4] with a closed connection. 2025/04/30 11:58:28 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:28 server Connection dba4a7fda716926bff closed. 2025/04/30 11:58:28 Removing connection IDs [b03edf7d bb7c7e40 4a3c20f6 2dbacc4e 37079bd7 02fa725f] for a closed connection after it has been retired. 2025/04/30 11:58:28 server <- Received Initial packet. 2025/04/30 11:58:28 Created qlog file: /logs/qlog/2be1df5dd7ae86a6ae4faddf60.sqlog 2025/04/30 11:58:28 server Changing connection ID to 05d0d171. 2025/04/30 11:58:28 Adding connection IDs 2be1df5dd7ae86a6ae4faddf60 and 05d0d171 for a new connection. 2025/04/30 11:58:28 server <- Reading packet 0 (1252 bytes) for connection 2be1df5dd7ae86a6ae4faddf60, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: 2be1df5dd7ae86a6ae4faddf60, SrcConnectionID: (empty), Token: 0x6873c6100acb86d064ff7a01a3fe3c649d2bf4fa5a16c7c087cb1f6b65ac496d45dda5c7bfeb5068d565fab59246491bf7edf29bc08822aed466eec6dd07777c2aff54261b8f1ce8503f48b3874f9a7a98ab3bab1384, PacketNumber: 0, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:58:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:28 server -> Sending packet 0 (40 bytes) for connection 2be1df5dd7ae86a6ae4faddf60, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 05d0d171, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server Parsed a coalesced packet. Part 1: 718 bytes. Remaining: 534 bytes. 2025/04/30 11:58:28 server <- Reading packet 1 (718 bytes) for connection 2be1df5dd7ae86a6ae4faddf60, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: 2be1df5dd7ae86a6ae4faddf60, SrcConnectionID: (empty), Token: 0x6873c6100acb86d064ff7a01a3fe3c649d2bf4fa5a16c7c087cb1f6b65ac496d45dda5c7bfeb5068d565fab59246491bf7edf29bc08822aed466eec6dd07777c2aff54261b8f1ce8503f48b3874f9a7a98ab3bab1384, PacketNumber: 1, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:28 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:28 Adding connection ID 037b0b29. 2025/04/30 11:58:28 Adding connection ID 54e201f5. 2025/04/30 11:58:28 Adding connection ID d3079c96. 2025/04/30 11:58:28 Adding connection ID ddfd6a34. 2025/04/30 11:58:28 Adding connection ID 6e491393. 2025/04/30 11:58:28 server coalesced packet has different destination connection ID: 00000000, expected 2be1df5dd7ae86a6ae4faddf60 2025/04/30 11:58:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2be1df5dd7ae86a6ae4faddf60 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 05d0d171, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 932, Version: v1} 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 05d0d171, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 11:58:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 037b0b29, StatelessResetToken: 0x9dd49685588ea7b3e23364cf7dd4afbf} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 54e201f5, StatelessResetToken: 0x3da7e58981f4ecec912d153bbc7f951e} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3079c96, StatelessResetToken: 0x8233fcc6c6962ea51224333b4021278e} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 6e491393, StatelessResetToken: 0x737907b230791c7956208f8bbf69a48d} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ddfd6a34, StatelessResetToken: 0xc551cb63a4578897ca59a15cb9037469} 2025/04/30 11:58:28 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:28 server <- Reading packet 2 (124 bytes) for connection 05d0d171, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: 05d0d171, SrcConnectionID: (empty), Token: 0x6873c6100acb86d064ff7a01a3fe3c649d2bf4fa5a16c7c087cb1f6b65ac496d45dda5c7bfeb5068d565fab59246491bf7edf29bc08822aed466eec6dd07777c2aff54261b8f1ce8503f48b3874f9a7a98ab3bab1384, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 832µs} 2025/04/30 11:58:28 server newly acked packets (1): [1] 2025/04/30 11:58:28 server updated RTT: 32.788829ms (σ: 16.394414ms) 2025/04/30 11:58:28 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:28 server <- Reading packet 0 (75 bytes) for connection 05d0d171, Handshake 2025/04/30 11:58:28 server Long Header{Type: Handshake, DestConnectionID: 05d0d171, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:28 server Dropping Initial keys. 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 832µs} 2025/04/30 11:58:28 server newly acked packets (1): [0] 2025/04/30 11:58:28 server updated RTT: 32.788ms (σ: 12.295ms) 2025/04/30 11:58:28 server Canceling loss detection timer. 2025/04/30 11:58:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:28 Retiring connection ID 2be1df5dd7ae86a6ae4faddf60 in 5s. 2025/04/30 11:58:28 server Dropping Handshake keys. 2025/04/30 11:58:28 server <- Reading packet 0 (42 bytes) for connection 05d0d171, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: 05d0d171, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:28 server -> Sending packet 1 (259 bytes) for connection 2be1df5dd7ae86a6ae4faddf60, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 Received request: GET /fskmyigtsm 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 422.311µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:28 server -> &wire.NewTokenFrame{Token: 0x26d24f0d35d299ff9377860e23255baa16b8d096e764cea2decd368c8b86c95e1f716434fa34619009b590b465095b489f080258dfe97706d2b1d23e7276c796003c95e755b89126d58fa71ef19f896a0f2ddc712077} 2025/04/30 11:58:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:28 server -> Sending packet 2 (1045 bytes) for connection 2be1df5dd7ae86a6ae4faddf60, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:28 server <- Reading packet 3 (30 bytes) for connection 05d0d171, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: 05d0d171, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server newly acked packets (3): [0 1 2] 2025/04/30 11:58:28 server updated RTT: 32.75ms (σ: 9.297ms) 2025/04/30 11:58:28 server ECN capability confirmed. 2025/04/30 11:58:28 server Canceling loss detection timer. 2025/04/30 11:58:28 server Ignoring all packets below 1. 2025/04/30 11:58:28 server -> Sending packet 3 (22 bytes) for connection 2be1df5dd7ae86a6ae4faddf60, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:28 server <- Reading packet 5 (42 bytes) for connection 05d0d171, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: 05d0d171, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 31.44ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:28 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:28 Replacing connection for connection IDs [54e201f5 d3079c96 ddfd6a34 6e491393 05d0d171 037b0b29] with a closed connection. 2025/04/30 11:58:28 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:28 server Connection 2be1df5dd7ae86a6ae4faddf60 closed. 2025/04/30 11:58:28 server <- Received Initial packet. 2025/04/30 11:58:28 Created qlog file: /logs/qlog/ae4fdc0111aaad0117aed15b79.sqlog 2025/04/30 11:58:28 server Changing connection ID to b88c1e73. 2025/04/30 11:58:28 Adding connection IDs ae4fdc0111aaad0117aed15b79 and b88c1e73 for a new connection. 2025/04/30 11:58:28 server <- Reading packet 2 (1252 bytes) for connection ae4fdc0111aaad0117aed15b79, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: ae4fdc0111aaad0117aed15b79, SrcConnectionID: (empty), Token: 0x26d24f0d35d299ff9377860e23255baa16b8d096e764cea2decd368c8b86c95e1f716434fa34619009b590b465095b489f080258dfe97706d2b1d23e7276c796003c95e755b89126d58fa71ef19f896a0f2ddc712077, PacketNumber: 2, PacketNumberLen: 1, Length: 1142, Version: v1} 2025/04/30 11:58:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 1121, Offset + Data length: 1121} 2025/04/30 11:58:28 server -> Sending packet 0 (40 bytes) for connection ae4fdc0111aaad0117aed15b79, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b88c1e73, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server Parsed a coalesced packet. Part 1: 718 bytes. Remaining: 534 bytes. 2025/04/30 11:58:28 server <- Reading packet 3 (718 bytes) for connection ae4fdc0111aaad0117aed15b79, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: ae4fdc0111aaad0117aed15b79, SrcConnectionID: (empty), Token: 0x26d24f0d35d299ff9377860e23255baa16b8d096e764cea2decd368c8b86c95e1f716434fa34619009b590b465095b489f080258dfe97706d2b1d23e7276c796003c95e755b89126d58fa71ef19f896a0f2ddc712077, PacketNumber: 3, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:28 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:28 Adding connection ID b3bc60bc. 2025/04/30 11:58:28 Adding connection ID e53be444. 2025/04/30 11:58:28 Adding connection ID 4ff07ccb. 2025/04/30 11:58:28 Adding connection ID 5e740354. 2025/04/30 11:58:28 Adding connection ID f6898212. 2025/04/30 11:58:28 server coalesced packet has different destination connection ID: 00000000, expected ae4fdc0111aaad0117aed15b79 2025/04/30 11:58:28 Removing connection ID a4a67699e5eef044 after it has been retired. 2025/04/30 11:58:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ae4fdc0111aaad0117aed15b79 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b88c1e73, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 939, Version: v1} 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:28 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b88c1e73, PacketNumber: 0, PacketNumberLen: 2, Length: 175, Version: v1} 2025/04/30 11:58:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f6898212, StatelessResetToken: 0xc465337a4736d8a1c68b23ca8209411c} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b3bc60bc, StatelessResetToken: 0x816ae54fd113ebcae55f313de8d0ee40} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e53be444, StatelessResetToken: 0xc234aca5368db49c0fd41cba94d9f58c} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4ff07ccb, StatelessResetToken: 0x718e3ca6fdceefacc40cd1742fac3f66} 2025/04/30 11:58:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5e740354, StatelessResetToken: 0x3da399d3b35f26f2478fbb4cf4fbf5dd} 2025/04/30 11:58:28 server Parsed a coalesced packet. Part 1: 709 bytes. Remaining: 543 bytes. 2025/04/30 11:58:28 server <- Reading packet 4 (709 bytes) for connection b88c1e73, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: b88c1e73, SrcConnectionID: (empty), Token: 0x26d24f0d35d299ff9377860e23255baa16b8d096e764cea2decd368c8b86c95e1f716434fa34619009b590b465095b489f080258dfe97706d2b1d23e7276c796003c95e755b89126d58fa71ef19f896a0f2ddc712077, PacketNumber: 4, PacketNumberLen: 1, Length: 608, Version: v1} 2025/04/30 11:58:28 server <- &wire.CryptoFrame{Offset: 1121, Data length: 586, Offset + Data length: 1707} 2025/04/30 11:58:28 server coalesced packet has different destination connection ID: 00000000, expected b88c1e73 2025/04/30 11:58:28 server -> Sending packet 2 (40 bytes) for connection ae4fdc0111aaad0117aed15b79, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b88c1e73, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:28 server <- Reading packet 5 (124 bytes) for connection b88c1e73, Initial 2025/04/30 11:58:28 server Long Header{Type: Initial, DestConnectionID: b88c1e73, SrcConnectionID: (empty), Token: 0x26d24f0d35d299ff9377860e23255baa16b8d096e764cea2decd368c8b86c95e1f716434fa34619009b590b465095b489f080258dfe97706d2b1d23e7276c796003c95e755b89126d58fa71ef19f896a0f2ddc712077, PacketNumber: 5, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 832µs} 2025/04/30 11:58:28 server newly acked packets (1): [1] 2025/04/30 11:58:28 server updated RTT: 32.672104ms (σ: 16.336052ms) 2025/04/30 11:58:28 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:28 server <- Reading packet 0 (75 bytes) for connection b88c1e73, Handshake 2025/04/30 11:58:28 server Long Header{Type: Handshake, DestConnectionID: b88c1e73, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:28 server Dropping Initial keys. 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 832µs} 2025/04/30 11:58:28 server newly acked packets (1): [0] 2025/04/30 11:58:28 server updated RTT: 32.672ms (σ: 12.252ms) 2025/04/30 11:58:28 server Canceling loss detection timer. 2025/04/30 11:58:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:28 Retiring connection ID ae4fdc0111aaad0117aed15b79 in 5s. 2025/04/30 11:58:28 server Dropping Handshake keys. 2025/04/30 11:58:28 server -> Sending packet 1 (251 bytes) for connection ae4fdc0111aaad0117aed15b79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.NewTokenFrame{Token: 0xf26435f9f5d6415286605dd5f8b305be155fe225993ff76dd3528f50e4ab7fdf8a596ad2fbb7b87843a67554fd83cfc1aa905c2898c0ed98817f572b0086fce537bd54bfed4444b6e08d5b39f4a2ac646fb960a9dfb1} 2025/04/30 11:58:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:28 server <- Reading packet 0 (42 bytes) for connection b88c1e73, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: b88c1e73, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:28 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:28 server -> Sending packet 2 (27 bytes) for connection ae4fdc0111aaad0117aed15b79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 149.077µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:28 Received request: GET /typljjzbiv 2025/04/30 11:58:28 server -> Sending packet 3 (1045 bytes) for connection ae4fdc0111aaad0117aed15b79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:28 server <- Reading packet 1 (28 bytes) for connection b88c1e73, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: b88c1e73, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.32ms} 2025/04/30 11:58:28 server newly acked packets (1): [0] 2025/04/30 11:58:28 server updated RTT: 32.721ms (σ: 9.287ms) 2025/04/30 11:58:28 server <- Reading packet 2 (1352 bytes) for connection b88c1e73, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: b88c1e73, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.PingFrame{} 2025/04/30 11:58:28 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:28 server <- Reading packet 3 (30 bytes) for connection b88c1e73, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: b88c1e73, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 64µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server newly acked packets (2): [1 3] 2025/04/30 11:58:28 server updated RTT: 32.661ms (σ: 7.084ms) 2025/04/30 11:58:28 server ECN capability confirmed. 2025/04/30 11:58:28 server Canceling loss detection timer. 2025/04/30 11:58:28 server -> Sending packet 4 (30 bytes) for connection ae4fdc0111aaad0117aed15b79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 83.794µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:28 server -> Sending packet 6 (22 bytes) for connection ae4fdc0111aaad0117aed15b79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:28 server -> Sending packet 7 (22 bytes) for connection ae4fdc0111aaad0117aed15b79, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:28 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:28 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:28 Removing connection IDs [505fc64c b8adc08d 088d5ba3 40b24e75 a7023eb2 3aa96719] for a closed connection after it has been retired. 2025/04/30 11:58:28 server <- Reading packet 6 (42 bytes) for connection b88c1e73, 1-RTT 2025/04/30 11:58:28 server Short Header{DestConnectionID: b88c1e73, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 113.08ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:28 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:28 Replacing connection for connection IDs [5e740354 f6898212 b88c1e73 b3bc60bc e53be444 4ff07ccb] with a closed connection. 2025/04/30 11:58:28 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:28 server Connection ae4fdc0111aaad0117aed15b79 closed. 2025/04/30 11:58:29 server <- Received Initial packet. 2025/04/30 11:58:29 Created qlog file: /logs/qlog/cac70583a9e09f363a27f4108d139e22.sqlog 2025/04/30 11:58:29 server Changing connection ID to 6238c83d. 2025/04/30 11:58:29 Adding connection IDs cac70583a9e09f363a27f4108d139e22 and 6238c83d for a new connection. 2025/04/30 11:58:29 server <- Reading packet 0 (1252 bytes) for connection cac70583a9e09f363a27f4108d139e22, Initial 2025/04/30 11:58:29 server Long Header{Type: Initial, DestConnectionID: cac70583a9e09f363a27f4108d139e22, SrcConnectionID: (empty), Token: 0xf26435f9f5d6415286605dd5f8b305be155fe225993ff76dd3528f50e4ab7fdf8a596ad2fbb7b87843a67554fd83cfc1aa905c2898c0ed98817f572b0086fce537bd54bfed4444b6e08d5b39f4a2ac646fb960a9dfb1, PacketNumber: 0, PacketNumberLen: 1, Length: 1139, Version: v1} 2025/04/30 11:58:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 1118, Offset + Data length: 1118} 2025/04/30 11:58:29 server -> Sending packet 0 (40 bytes) for connection cac70583a9e09f363a27f4108d139e22, Initial 2025/04/30 11:58:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6238c83d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:29 server Parsed a coalesced packet. Part 1: 712 bytes. Remaining: 540 bytes. 2025/04/30 11:58:29 server <- Reading packet 3 (712 bytes) for connection 6238c83d, Initial 2025/04/30 11:58:29 server Long Header{Type: Initial, DestConnectionID: 6238c83d, SrcConnectionID: (empty), Token: 0xf26435f9f5d6415286605dd5f8b305be155fe225993ff76dd3528f50e4ab7fdf8a596ad2fbb7b87843a67554fd83cfc1aa905c2898c0ed98817f572b0086fce537bd54bfed4444b6e08d5b39f4a2ac646fb960a9dfb1, PacketNumber: 3, PacketNumberLen: 1, Length: 611, Version: v1} 2025/04/30 11:58:29 server <- &wire.CryptoFrame{Offset: 1118, Data length: 589, Offset + Data length: 1707} 2025/04/30 11:58:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:29 Adding connection ID 8be7601b. 2025/04/30 11:58:29 Adding connection ID 8e8142e2. 2025/04/30 11:58:29 Adding connection ID 4f2c5db0. 2025/04/30 11:58:29 Adding connection ID a8b56bfc. 2025/04/30 11:58:29 Adding connection ID b97a7486. 2025/04/30 11:58:29 server coalesced packet has different destination connection ID: 00000000, expected 6238c83d 2025/04/30 11:58:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cac70583a9e09f363a27f4108d139e22 2025/04/30 11:58:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6238c83d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 931, Version: v1} 2025/04/30 11:58:29 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6238c83d, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be7601b, StatelessResetToken: 0x2470841505573a5cab329a404dd318e3} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a8b56bfc, StatelessResetToken: 0x164d3161e3569d1f2399d3ae37dc90b5} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b97a7486, StatelessResetToken: 0x0421e097c46d1356d9ffd1ee5a852a11} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4f2c5db0, StatelessResetToken: 0x5bc40c50c3de5f0cd989ecfbc18e1ffd} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e8142e2, StatelessResetToken: 0x824d24edc88c9c4adf7906de7abb235d} 2025/04/30 11:58:29 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:29 server -> Sending packet 2 (1280 bytes) for connection cac70583a9e09f363a27f4108d139e22, Initial 2025/04/30 11:58:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6238c83d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:29 server -> Sending packet 3 (1280 bytes) for connection cac70583a9e09f363a27f4108d139e22, Initial 2025/04/30 11:58:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6238c83d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:29 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:58:29 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:29 server -> Sending packet 1 (196 bytes) for connection cac70583a9e09f363a27f4108d139e22, Handshake 2025/04/30 11:58:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6238c83d, PacketNumber: 1, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:58:29 server -> Sending packet 2 (196 bytes) for connection cac70583a9e09f363a27f4108d139e22, Handshake 2025/04/30 11:58:29 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6238c83d, PacketNumber: 2, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 11:58:29 server <- Reading packet 1 (74 bytes) for connection 6238c83d, Handshake 2025/04/30 11:58:29 server Long Header{Type: Handshake, DestConnectionID: 6238c83d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:58:29 server Dropping Initial keys. 2025/04/30 11:58:29 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 96µs} 2025/04/30 11:58:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:29 Retiring connection ID cac70583a9e09f363a27f4108d139e22 in 5s. 2025/04/30 11:58:29 server Dropping Handshake keys. 2025/04/30 11:58:29 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:58:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:29 server -> Sending packet 2 (371 bytes) for connection cac70583a9e09f363a27f4108d139e22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4f2c5db0, StatelessResetToken: 0x5bc40c50c3de5f0cd989ecfbc18e1ffd} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b97a7486, StatelessResetToken: 0x0421e097c46d1356d9ffd1ee5a852a11} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be7601b, StatelessResetToken: 0x2470841505573a5cab329a404dd318e3} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a8b56bfc, StatelessResetToken: 0x164d3161e3569d1f2399d3ae37dc90b5} 2025/04/30 11:58:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:29 server -> &wire.NewTokenFrame{Token: 0xa381047dc476fcf849ee8d5b685cdf82d8c02e1096853ada878ded2bd29ae9c4c05cd24783485ce3d1052e8c977e94489fb0d696dde31772cf7d7f3538ccc5ad24d8fa407a5b4db1a7c6ee71c7a9f790191d84cc0e26} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e8142e2, StatelessResetToken: 0x824d24edc88c9c4adf7906de7abb235d} 2025/04/30 11:58:29 server -> Sending packet 3 (371 bytes) for connection cac70583a9e09f363a27f4108d139e22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e8142e2, StatelessResetToken: 0x824d24edc88c9c4adf7906de7abb235d} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be7601b, StatelessResetToken: 0x2470841505573a5cab329a404dd318e3} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4f2c5db0, StatelessResetToken: 0x5bc40c50c3de5f0cd989ecfbc18e1ffd} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a8b56bfc, StatelessResetToken: 0x164d3161e3569d1f2399d3ae37dc90b5} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b97a7486, StatelessResetToken: 0x0421e097c46d1356d9ffd1ee5a852a11} 2025/04/30 11:58:29 server -> &wire.NewTokenFrame{Token: 0xa381047dc476fcf849ee8d5b685cdf82d8c02e1096853ada878ded2bd29ae9c4c05cd24783485ce3d1052e8c977e94489fb0d696dde31772cf7d7f3538ccc5ad24d8fa407a5b4db1a7c6ee71c7a9f790191d84cc0e26} 2025/04/30 11:58:29 server <- Reading packet 1 (28 bytes) for connection 6238c83d, 1-RTT 2025/04/30 11:58:29 server Short Header{DestConnectionID: 6238c83d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.552ms} 2025/04/30 11:58:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:58:29 server -> Sending packet 5 (371 bytes) for connection cac70583a9e09f363a27f4108d139e22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a8b56bfc, StatelessResetToken: 0x164d3161e3569d1f2399d3ae37dc90b5} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be7601b, StatelessResetToken: 0x2470841505573a5cab329a404dd318e3} 2025/04/30 11:58:29 server -> &wire.NewTokenFrame{Token: 0xa381047dc476fcf849ee8d5b685cdf82d8c02e1096853ada878ded2bd29ae9c4c05cd24783485ce3d1052e8c977e94489fb0d696dde31772cf7d7f3538ccc5ad24d8fa407a5b4db1a7c6ee71c7a9f790191d84cc0e26} 2025/04/30 11:58:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4f2c5db0, StatelessResetToken: 0x5bc40c50c3de5f0cd989ecfbc18e1ffd} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e8142e2, StatelessResetToken: 0x824d24edc88c9c4adf7906de7abb235d} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b97a7486, StatelessResetToken: 0x0421e097c46d1356d9ffd1ee5a852a11} 2025/04/30 11:58:29 server -> Sending packet 6 (371 bytes) for connection cac70583a9e09f363a27f4108d139e22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b97a7486, StatelessResetToken: 0x0421e097c46d1356d9ffd1ee5a852a11} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be7601b, StatelessResetToken: 0x2470841505573a5cab329a404dd318e3} 2025/04/30 11:58:29 server -> &wire.NewTokenFrame{Token: 0xa381047dc476fcf849ee8d5b685cdf82d8c02e1096853ada878ded2bd29ae9c4c05cd24783485ce3d1052e8c977e94489fb0d696dde31772cf7d7f3538ccc5ad24d8fa407a5b4db1a7c6ee71c7a9f790191d84cc0e26} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e8142e2, StatelessResetToken: 0x824d24edc88c9c4adf7906de7abb235d} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a8b56bfc, StatelessResetToken: 0x164d3161e3569d1f2399d3ae37dc90b5} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4f2c5db0, StatelessResetToken: 0x5bc40c50c3de5f0cd989ecfbc18e1ffd} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:29 Tracking 42 connection IDs and 0 reset tokens. 2025/04/30 11:58:29 server <- Reading packet 3 (1352 bytes) for connection 6238c83d, 1-RTT 2025/04/30 11:58:29 server Short Header{DestConnectionID: 6238c83d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:29 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 280µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:29 server <- &wire.PingFrame{} 2025/04/30 11:58:29 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:29 server -> Sending packet 7 (29 bytes) for connection cac70583a9e09f363a27f4108d139e22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 135.033µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:29 server <- Reading packet 4 (1392 bytes) for connection 6238c83d, 1-RTT 2025/04/30 11:58:29 server Short Header{DestConnectionID: 6238c83d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:29 server <- &wire.PingFrame{} 2025/04/30 11:58:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:29 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:29 server -> Sending packet 8 (1366 bytes) for connection cac70583a9e09f363a27f4108d139e22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.PingFrame{} 2025/04/30 11:58:29 Received request: GET /npnvybyjnz 2025/04/30 11:58:29 server -> Sending packet 9 (1055 bytes) for connection cac70583a9e09f363a27f4108d139e22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 339.35µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:29 server <- Reading packet 5 (1444 bytes) for connection 6238c83d, 1-RTT 2025/04/30 11:58:29 server Short Header{DestConnectionID: 6238c83d, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:29 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 120µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:29 server newly acked packets (1): [9] 2025/04/30 11:58:29 server updated RTT: 33.70457ms (σ: 16.852285ms) 2025/04/30 11:58:29 server ECN capability confirmed. 2025/04/30 11:58:29 server lost packet 6 (time threshold) 2025/04/30 11:58:29 server setting loss timer for packet 8 (1-RTT) to 37.917641ms (in 2025-04-30 11:58:29.720991937 +0000 UTC m=+34.089872664) 2025/04/30 11:58:29 server Canceling loss detection timer. 2025/04/30 11:58:29 server <- &wire.PingFrame{} 2025/04/30 11:58:29 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:29 server Ignoring all packets below 5. 2025/04/30 11:58:29 server -> Sending packet 10 (382 bytes) for connection cac70583a9e09f363a27f4108d139e22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:29 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:29 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 178.004µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:29 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8e8142e2, StatelessResetToken: 0x824d24edc88c9c4adf7906de7abb235d} 2025/04/30 11:58:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be7601b, StatelessResetToken: 0x2470841505573a5cab329a404dd318e3} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4f2c5db0, StatelessResetToken: 0x5bc40c50c3de5f0cd989ecfbc18e1ffd} 2025/04/30 11:58:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:29 server -> &wire.NewTokenFrame{Token: 0xa381047dc476fcf849ee8d5b685cdf82d8c02e1096853ada878ded2bd29ae9c4c05cd24783485ce3d1052e8c977e94489fb0d696dde31772cf7d7f3538ccc5ad24d8fa407a5b4db1a7c6ee71c7a9f790191d84cc0e26} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b97a7486, StatelessResetToken: 0x0421e097c46d1356d9ffd1ee5a852a11} 2025/04/30 11:58:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a8b56bfc, StatelessResetToken: 0x164d3161e3569d1f2399d3ae37dc90b5} 2025/04/30 11:58:29 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:58:29.720991937 +0000 UTC m=+34.089872664 2025/04/30 11:58:29 server lost packet 8 (time threshold) 2025/04/30 11:58:29 server <- Reading packet 7 (44 bytes) for connection 6238c83d, 1-RTT 2025/04/30 11:58:29 server Short Header{DestConnectionID: 6238c83d, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:29 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 32.528ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:29 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:29 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:29 Replacing connection for connection IDs [6238c83d 8be7601b 8e8142e2 4f2c5db0 a8b56bfc b97a7486] with a closed connection. 2025/04/30 11:58:29 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:29 server Connection cac70583a9e09f363a27f4108d139e22 closed. 2025/04/30 11:58:29 server <- Received Initial packet. 2025/04/30 11:58:29 Created qlog file: /logs/qlog/ffca19da35357a19b2.sqlog 2025/04/30 11:58:29 server Changing connection ID to 779371e6. 2025/04/30 11:58:29 Adding connection IDs ffca19da35357a19b2 and 779371e6 for a new connection. 2025/04/30 11:58:29 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:58:29 server <- Reading packet 1 (710 bytes) for connection ffca19da35357a19b2, Initial 2025/04/30 11:58:29 server Long Header{Type: Initial, DestConnectionID: ffca19da35357a19b2, SrcConnectionID: (empty), Token: 0xa381047dc476fcf849ee8d5b685cdf82d8c02e1096853ada878ded2bd29ae9c4c05cd24783485ce3d1052e8c977e94489fb0d696dde31772cf7d7f3538ccc5ad24d8fa407a5b4db1a7c6ee71c7a9f790191d84cc0e26, PacketNumber: 1, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:58:29 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:58:29 server coalesced packet has different destination connection ID: 00000000, expected ffca19da35357a19b2 2025/04/30 11:58:29 server -> Sending packet 0 (40 bytes) for connection ffca19da35357a19b2, Initial 2025/04/30 11:58:29 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 779371e6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:29 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:30 server Parsed a coalesced packet. Part 1: 1247 bytes. Remaining: 5 bytes. 2025/04/30 11:58:30 server <- Reading packet 2 (1247 bytes) for connection 779371e6, Initial 2025/04/30 11:58:30 server Long Header{Type: Initial, DestConnectionID: 779371e6, SrcConnectionID: (empty), Token: 0xa381047dc476fcf849ee8d5b685cdf82d8c02e1096853ada878ded2bd29ae9c4c05cd24783485ce3d1052e8c977e94489fb0d696dde31772cf7d7f3538ccc5ad24d8fa407a5b4db1a7c6ee71c7a9f790191d84cc0e26, PacketNumber: 2, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:58:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:58:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:30 Adding connection ID 01145850. 2025/04/30 11:58:30 Adding connection ID 110bb787. 2025/04/30 11:58:30 Adding connection ID fd7e6463. 2025/04/30 11:58:30 Adding connection ID 6a33d456. 2025/04/30 11:58:30 Adding connection ID 53db4178. 2025/04/30 11:58:30 server coalesced packet has different destination connection ID: 00000000, expected 779371e6 2025/04/30 11:58:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ffca19da35357a19b2 2025/04/30 11:58:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 779371e6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 938, Version: v1} 2025/04/30 11:58:30 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 779371e6, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:30 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fd7e6463, StatelessResetToken: 0x147640119413b7497f0e07988c57658f} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 110bb787, StatelessResetToken: 0x0a8d223513cf0c9eb33a75e2d8221110} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 53db4178, StatelessResetToken: 0xf9c23e3780b265b1ae895bd4553d31b0} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01145850, StatelessResetToken: 0x3ccf0dc72ba23c3e8897e7be05bd27ee} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6a33d456, StatelessResetToken: 0x76eee92396a64282ae88faad95e6ef14} 2025/04/30 11:58:30 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:30 server -> Sending packet 2 (1280 bytes) for connection ffca19da35357a19b2, Initial 2025/04/30 11:58:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 779371e6, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:30 server -> Sending packet 3 (1280 bytes) for connection ffca19da35357a19b2, Initial 2025/04/30 11:58:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 779371e6, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:30 server Parsed a coalesced packet. Part 1: 126 bytes. Remaining: 1126 bytes. 2025/04/30 11:58:30 server <- Reading packet 3 (126 bytes) for connection 779371e6, Initial 2025/04/30 11:58:30 server Long Header{Type: Initial, DestConnectionID: 779371e6, SrcConnectionID: (empty), Token: 0xa381047dc476fcf849ee8d5b685cdf82d8c02e1096853ada878ded2bd29ae9c4c05cd24783485ce3d1052e8c977e94489fb0d696dde31772cf7d7f3538ccc5ad24d8fa407a5b4db1a7c6ee71c7a9f790191d84cc0e26, PacketNumber: 3, PacketNumberLen: 1, Length: 25, Version: v1} 2025/04/30 11:58:30 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 528µs} 2025/04/30 11:58:30 server coalesced packet has different destination connection ID: 00000000, expected 779371e6 2025/04/30 11:58:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:30 server -> Sending packet 1 (189 bytes) for connection ffca19da35357a19b2, Handshake 2025/04/30 11:58:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 779371e6, PacketNumber: 1, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:30 server -> Sending packet 2 (189 bytes) for connection ffca19da35357a19b2, Handshake 2025/04/30 11:58:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 779371e6, PacketNumber: 2, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:30 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:58:30 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:58:30 server -> Sending packet 4 (1280 bytes) for connection ffca19da35357a19b2, Initial 2025/04/30 11:58:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 779371e6, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:30 server -> Sending packet 5 (1280 bytes) for connection ffca19da35357a19b2, Initial 2025/04/30 11:58:30 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 779371e6, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 11:58:30 server -> Sending packet 3 (189 bytes) for connection ffca19da35357a19b2, Handshake 2025/04/30 11:58:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 779371e6, PacketNumber: 3, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:30 server -> Sending packet 4 (189 bytes) for connection ffca19da35357a19b2, Handshake 2025/04/30 11:58:30 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 779371e6, PacketNumber: 4, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:30 server <- Reading packet 2 (76 bytes) for connection 779371e6, Handshake 2025/04/30 11:58:30 server Long Header{Type: Handshake, DestConnectionID: 779371e6, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 11:58:30 server Dropping Initial keys. 2025/04/30 11:58:30 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 80µs} 2025/04/30 11:58:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:30 Retiring connection ID ffca19da35357a19b2 in 5s. 2025/04/30 11:58:30 server Dropping Handshake keys. 2025/04/30 11:58:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:30 server -> Sending packet 2 (371 bytes) for connection ffca19da35357a19b2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:30 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 110bb787, StatelessResetToken: 0x0a8d223513cf0c9eb33a75e2d8221110} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 53db4178, StatelessResetToken: 0xf9c23e3780b265b1ae895bd4553d31b0} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6a33d456, StatelessResetToken: 0x76eee92396a64282ae88faad95e6ef14} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01145850, StatelessResetToken: 0x3ccf0dc72ba23c3e8897e7be05bd27ee} 2025/04/30 11:58:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fd7e6463, StatelessResetToken: 0x147640119413b7497f0e07988c57658f} 2025/04/30 11:58:30 server -> &wire.NewTokenFrame{Token: 0x27b0734fea0573b737b81ebd896f1ee553fd37ee1953bcea99b81579cab1cb277ab1caaf7145394994c5611805e08658c8cb62f73f6bd4e32005d06bda13952ce82d171d72c9a6efdd8649642c44debe9f1e69666540} 2025/04/30 11:58:30 server -> Sending packet 3 (371 bytes) for connection ffca19da35357a19b2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:30 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 110bb787, StatelessResetToken: 0x0a8d223513cf0c9eb33a75e2d8221110} 2025/04/30 11:58:30 server -> &wire.NewTokenFrame{Token: 0x27b0734fea0573b737b81ebd896f1ee553fd37ee1953bcea99b81579cab1cb277ab1caaf7145394994c5611805e08658c8cb62f73f6bd4e32005d06bda13952ce82d171d72c9a6efdd8649642c44debe9f1e69666540} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01145850, StatelessResetToken: 0x3ccf0dc72ba23c3e8897e7be05bd27ee} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6a33d456, StatelessResetToken: 0x76eee92396a64282ae88faad95e6ef14} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fd7e6463, StatelessResetToken: 0x147640119413b7497f0e07988c57658f} 2025/04/30 11:58:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 53db4178, StatelessResetToken: 0xf9c23e3780b265b1ae895bd4553d31b0} 2025/04/30 11:58:30 server <- Reading packet 0 (42 bytes) for connection 779371e6, 1-RTT 2025/04/30 11:58:30 server Short Header{DestConnectionID: 779371e6, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:30 server -> Sending packet 4 (30 bytes) for connection ffca19da35357a19b2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:30 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 269.581624ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:30 Received request: GET /glijtpbnwq 2025/04/30 11:58:30 server -> Sending packet 5 (1045 bytes) for connection ffca19da35357a19b2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:30 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:30 server <- Reading packet 4 (1392 bytes) for connection 779371e6, 1-RTT 2025/04/30 11:58:30 server Short Header{DestConnectionID: 779371e6, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:30 server <- &wire.PingFrame{} 2025/04/30 11:58:30 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:30 server <- Reading packet 5 (30 bytes) for connection 779371e6, 1-RTT 2025/04/30 11:58:30 server Short Header{DestConnectionID: 779371e6, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:30 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 40µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:30 server newly acked packets (2): [3 5] 2025/04/30 11:58:30 server updated RTT: 33.452597ms (σ: 16.726298ms) 2025/04/30 11:58:30 server ECN capability confirmed. 2025/04/30 11:58:30 server Canceling loss detection timer. 2025/04/30 11:58:30 server -> Sending packet 6 (32 bytes) for connection ffca19da35357a19b2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:30 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:30 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 195.067µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:30 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:30 server <- Reading packet 6 (41 bytes) for connection 779371e6, 1-RTT 2025/04/30 11:58:30 server Short Header{DestConnectionID: 779371e6, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:30 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 384µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:30 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:30 Replacing connection for connection IDs [779371e6 01145850 110bb787 fd7e6463 6a33d456 53db4178] with a closed connection. 2025/04/30 11:58:30 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:30 server Connection ffca19da35357a19b2 closed. 2025/04/30 11:58:31 Removing connection ID 327a47467049b7bc after it has been retired. 2025/04/30 11:58:31 Removing connection IDs [919b762d 0961897f ee3f1d98 e51874a3 b6d9d139 c16cf627] for a closed connection after it has been retired. 2025/04/30 11:58:31 Removing connection ID e3131b3424b967a6 after it has been retired. 2025/04/30 11:58:31 Tracking 41 connection IDs and 0 reset tokens. 2025/04/30 11:58:31 server <- Received Initial packet. 2025/04/30 11:58:31 Created qlog file: /logs/qlog/70f0c68b220327dc.sqlog 2025/04/30 11:58:31 server Changing connection ID to c7c1638e. 2025/04/30 11:58:31 Adding connection IDs 70f0c68b220327dc and c7c1638e for a new connection. 2025/04/30 11:58:31 server <- Reading packet 0 (1252 bytes) for connection 70f0c68b220327dc, Initial 2025/04/30 11:58:31 server Long Header{Type: Initial, DestConnectionID: 70f0c68b220327dc, SrcConnectionID: (empty), Token: 0x27b0734fea0573b737b81ebd896f1ee553fd37ee1953bcea99b81579cab1cb277ab1caaf7145394994c5611805e08658c8cb62f73f6bd4e32005d06bda13952ce82d171d72c9a6efdd8649642c44debe9f1e69666540, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:31 server -> Sending packet 0 (40 bytes) for connection 70f0c68b220327dc, Initial 2025/04/30 11:58:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c7c1638e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:31 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:31 server <- Reading packet 1 (708 bytes) for connection 70f0c68b220327dc, Initial 2025/04/30 11:58:31 server Long Header{Type: Initial, DestConnectionID: 70f0c68b220327dc, SrcConnectionID: (empty), Token: 0x27b0734fea0573b737b81ebd896f1ee553fd37ee1953bcea99b81579cab1cb277ab1caaf7145394994c5611805e08658c8cb62f73f6bd4e32005d06bda13952ce82d171d72c9a6efdd8649642c44debe9f1e69666540, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:31 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:31 Adding connection ID 7d843973. 2025/04/30 11:58:31 Adding connection ID ebc1a981. 2025/04/30 11:58:31 Adding connection ID 08f13bcf. 2025/04/30 11:58:31 Adding connection ID 30ef7f51. 2025/04/30 11:58:31 Adding connection ID 700f77a5. 2025/04/30 11:58:31 server coalesced packet has different destination connection ID: 00000000, expected 70f0c68b220327dc 2025/04/30 11:58:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 70f0c68b220327dc 2025/04/30 11:58:31 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c7c1638e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 941, Version: v1} 2025/04/30 11:58:31 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:31 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c7c1638e, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 11:58:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 11:58:31 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7d843973, StatelessResetToken: 0xfd0a0533131acf61793e97049142006e} 2025/04/30 11:58:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 30ef7f51, StatelessResetToken: 0x9c77b4410920de3bf4c95ea1ade6ed83} 2025/04/30 11:58:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 700f77a5, StatelessResetToken: 0xa5be4f03c8cd70451239bc2021941e39} 2025/04/30 11:58:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ebc1a981, StatelessResetToken: 0x552093dc85a1011357a660e33aeabd64} 2025/04/30 11:58:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08f13bcf, StatelessResetToken: 0xed64c206fb1a3004450349700a389ed4} 2025/04/30 11:58:31 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:31 server <- Reading packet 2 (124 bytes) for connection c7c1638e, Initial 2025/04/30 11:58:31 server Long Header{Type: Initial, DestConnectionID: c7c1638e, SrcConnectionID: (empty), Token: 0x27b0734fea0573b737b81ebd896f1ee553fd37ee1953bcea99b81579cab1cb277ab1caaf7145394994c5611805e08658c8cb62f73f6bd4e32005d06bda13952ce82d171d72c9a6efdd8649642c44debe9f1e69666540, PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:31 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 824µs} 2025/04/30 11:58:31 server newly acked packets (1): [1] 2025/04/30 11:58:31 server updated RTT: 32.780762ms (σ: 16.390381ms) 2025/04/30 11:58:31 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:31 server <- Reading packet 0 (75 bytes) for connection c7c1638e, Handshake 2025/04/30 11:58:31 server Long Header{Type: Handshake, DestConnectionID: c7c1638e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:31 server Dropping Initial keys. 2025/04/30 11:58:31 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 824µs} 2025/04/30 11:58:31 server newly acked packets (1): [0] 2025/04/30 11:58:31 server updated RTT: 32.78ms (σ: 12.292ms) 2025/04/30 11:58:31 server Canceling loss detection timer. 2025/04/30 11:58:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:31 Retiring connection ID 70f0c68b220327dc in 5s. 2025/04/30 11:58:31 server Dropping Handshake keys. 2025/04/30 11:58:31 server <- Reading packet 0 (42 bytes) for connection c7c1638e, 1-RTT 2025/04/30 11:58:31 server Short Header{DestConnectionID: c7c1638e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:31 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:31 server -> Sending packet 1 (259 bytes) for connection 70f0c68b220327dc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:31 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 343.012µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:31 Received request: GET /snmuniyqnt 2025/04/30 11:58:31 server -> &wire.NewTokenFrame{Token: 0x8e8af55239181203d21f8099d4dadb3b91a6704f01dce1ee6aa0d5c7d1340e5536da61782fe247c29aa0d0de11df5f16c0fd9f4dfd7a5774759d05b8deae2d5437b0ecffc4b303bc134f6abbaf8e50f95c27d74497ae} 2025/04/30 11:58:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:31 server -> Sending packet 2 (1045 bytes) for connection 70f0c68b220327dc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:31 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:31 server <- Reading packet 1 (28 bytes) for connection c7c1638e, 1-RTT 2025/04/30 11:58:31 server Short Header{DestConnectionID: c7c1638e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:31 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.312ms} 2025/04/30 11:58:31 server newly acked packets (1): [0] 2025/04/30 11:58:31 server updated RTT: 32.804ms (σ: 9.267ms) 2025/04/30 11:58:31 server <- Reading packet 2 (1352 bytes) for connection c7c1638e, 1-RTT 2025/04/30 11:58:31 server Short Header{DestConnectionID: c7c1638e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:31 server <- &wire.PingFrame{} 2025/04/30 11:58:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:31 server Sending ACK because the ACK timer expired. 2025/04/30 11:58:31 server -> Sending packet 3 (28 bytes) for connection 70f0c68b220327dc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:31 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:31 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.258066ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:31 server -> Sending packet 5 (251 bytes) for connection 70f0c68b220327dc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:31 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:31 server -> &wire.NewTokenFrame{Token: 0x8e8af55239181203d21f8099d4dadb3b91a6704f01dce1ee6aa0d5c7d1340e5536da61782fe247c29aa0d0de11df5f16c0fd9f4dfd7a5774759d05b8deae2d5437b0ecffc4b303bc134f6abbaf8e50f95c27d74497ae} 2025/04/30 11:58:31 server Skipping packet number 4 2025/04/30 11:58:31 server -> Sending packet 6 (1045 bytes) for connection 70f0c68b220327dc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:31 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:31 server <- Reading packet 4 (32 bytes) for connection c7c1638e, 1-RTT 2025/04/30 11:58:31 server Short Header{DestConnectionID: c7c1638e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:31 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:31 server newly acked packets (1): [6] 2025/04/30 11:58:31 server updated RTT: 32.709ms (σ: 7.14ms) 2025/04/30 11:58:31 server ECN capability confirmed. 2025/04/30 11:58:31 server setting loss timer for packet 5 (1-RTT) to 36.797625ms (in 2025-04-30 11:58:31.820119774 +0000 UTC m=+36.189000500) 2025/04/30 11:58:31 server -> Sending packet 7 (22 bytes) for connection 70f0c68b220327dc, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:31 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:31 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:31 server <- Reading packet 5 (43 bytes) for connection c7c1638e, 1-RTT 2025/04/30 11:58:31 server Short Header{DestConnectionID: c7c1638e, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:31 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 296µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:31 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:31 Replacing connection for connection IDs [30ef7f51 700f77a5 c7c1638e 7d843973 ebc1a981 08f13bcf] with a closed connection. 2025/04/30 11:58:31 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:31 server Connection 70f0c68b220327dc closed. 2025/04/30 11:58:31 Removing connection IDs [5f0bc0c8 b4eae9a9 9332085a adcad340 c7727ceb 4d0733e2] for a closed connection after it has been retired. 2025/04/30 11:58:32 server <- Received Initial packet. 2025/04/30 11:58:32 Created qlog file: /logs/qlog/97edd1dd5ab8a17b.sqlog 2025/04/30 11:58:32 server Changing connection ID to b66b8e30. 2025/04/30 11:58:32 Adding connection IDs 97edd1dd5ab8a17b and b66b8e30 for a new connection. 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:32 server <- Reading packet 1 (708 bytes) for connection 97edd1dd5ab8a17b, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: 97edd1dd5ab8a17b, SrcConnectionID: (empty), Token: 0x8e8af55239181203d21f8099d4dadb3b91a6704f01dce1ee6aa0d5c7d1340e5536da61782fe247c29aa0d0de11df5f16c0fd9f4dfd7a5774759d05b8deae2d5437b0ecffc4b303bc134f6abbaf8e50f95c27d74497ae, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:32 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:32 server coalesced packet has different destination connection ID: 00000000, expected 97edd1dd5ab8a17b 2025/04/30 11:58:32 server -> Sending packet 0 (40 bytes) for connection 97edd1dd5ab8a17b, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b66b8e30, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:32 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 1248 bytes. Remaining: 4 bytes. 2025/04/30 11:58:32 server <- Reading packet 2 (1248 bytes) for connection b66b8e30, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: b66b8e30, SrcConnectionID: (empty), Token: 0x8e8af55239181203d21f8099d4dadb3b91a6704f01dce1ee6aa0d5c7d1340e5536da61782fe247c29aa0d0de11df5f16c0fd9f4dfd7a5774759d05b8deae2d5437b0ecffc4b303bc134f6abbaf8e50f95c27d74497ae, PacketNumber: 2, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:32 Adding connection ID f104f36e. 2025/04/30 11:58:32 Adding connection ID d938e29a. 2025/04/30 11:58:32 Adding connection ID 75ddfc1e. 2025/04/30 11:58:32 Adding connection ID 70e78cb5. 2025/04/30 11:58:32 Adding connection ID 84d5adbd. 2025/04/30 11:58:32 server error parsing packet, couldn't parse connection ID: EOF 2025/04/30 11:58:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 97edd1dd5ab8a17b 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b66b8e30, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 938, Version: v1} 2025/04/30 11:58:32 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:32 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b66b8e30, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:32 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 84d5adbd, StatelessResetToken: 0xfb8a0ca4b68f0c7476ee403885bcd794} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d938e29a, StatelessResetToken: 0xfcb502006c81bf511b2ad644a1e5d1a7} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70e78cb5, StatelessResetToken: 0xae580bd7d0d237bcde3ef3e5e4d4ecbd} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f104f36e, StatelessResetToken: 0xb15117d32aa93e5400ae0306c21b5c51} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 75ddfc1e, StatelessResetToken: 0x66c5b273ba8e8b9d6893cf33cfacbf0c} 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:32 server <- Reading packet 3 (124 bytes) for connection b66b8e30, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: b66b8e30, SrcConnectionID: (empty), Token: 0x8e8af55239181203d21f8099d4dadb3b91a6704f01dce1ee6aa0d5c7d1340e5536da61782fe247c29aa0d0de11df5f16c0fd9f4dfd7a5774759d05b8deae2d5437b0ecffc4b303bc134f6abbaf8e50f95c27d74497ae, PacketNumber: 3, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:32 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 872µs} 2025/04/30 11:58:32 server newly acked packets (1): [1] 2025/04/30 11:58:32 server updated RTT: 32.959017ms (σ: 16.479508ms) 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:32 server <- Reading packet 0 (75 bytes) for connection b66b8e30, Handshake 2025/04/30 11:58:32 server Long Header{Type: Handshake, DestConnectionID: b66b8e30, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:32 server Dropping Initial keys. 2025/04/30 11:58:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 872µs} 2025/04/30 11:58:32 server newly acked packets (1): [0] 2025/04/30 11:58:32 server updated RTT: 32.959ms (σ: 12.359ms) 2025/04/30 11:58:32 server Canceling loss detection timer. 2025/04/30 11:58:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:32 Retiring connection ID 97edd1dd5ab8a17b in 5s. 2025/04/30 11:58:32 server Dropping Handshake keys. 2025/04/30 11:58:32 server -> Sending packet 1 (251 bytes) for connection 97edd1dd5ab8a17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:32 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:32 server -> &wire.NewTokenFrame{Token: 0x4442ab11ac73cc610c1310c2f0faa9e07ee7bdef801c887555896f930160e06b0c80db369b0b57ff3bb8d143b4df940569940c696fdbf8db0adfa8f89424dfa703c3d22b9925d7c73a7ba2365a732f949193cf312e11} 2025/04/30 11:58:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 42 bytes. 2025/04/30 11:58:32 server Dropping %!s(logging.PacketType=1) packet (75 bytes) because we already dropped the keys. 2025/04/30 11:58:32 server <- Reading packet 2 (42 bytes) for connection b66b8e30, 1-RTT 2025/04/30 11:58:32 server Short Header{DestConnectionID: b66b8e30, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:32 server -> Sending packet 2 (27 bytes) for connection 97edd1dd5ab8a17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:32 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:32 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 161.462µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:32 Received request: GET /tvevrloszv 2025/04/30 11:58:32 server -> Sending packet 3 (1045 bytes) for connection 97edd1dd5ab8a17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:32 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:32 server <- Reading packet 3 (32 bytes) for connection b66b8e30, 1-RTT 2025/04/30 11:58:32 server Short Header{DestConnectionID: b66b8e30, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:32 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server newly acked packets (2): [0 3] 2025/04/30 11:58:32 server updated RTT: 32.794ms (σ: 9.599ms) 2025/04/30 11:58:32 server ECN capability confirmed. 2025/04/30 11:58:32 server lost packet 1 (time threshold) 2025/04/30 11:58:32 server Canceling loss detection timer. 2025/04/30 11:58:32 server -> Sending packet 4 (254 bytes) for connection 97edd1dd5ab8a17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:32 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:32 server -> &wire.NewTokenFrame{Token: 0x4442ab11ac73cc610c1310c2f0faa9e07ee7bdef801c887555896f930160e06b0c80db369b0b57ff3bb8d143b4df940569940c696fdbf8db0adfa8f89424dfa703c3d22b9925d7c73a7ba2365a732f949193cf312e11} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 43 bytes. 2025/04/30 11:58:32 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 11:58:32 server <- Reading packet 4 (43 bytes) for connection b66b8e30, 1-RTT 2025/04/30 11:58:32 server Short Header{DestConnectionID: b66b8e30, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:32 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 272µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:32 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:32 Replacing connection for connection IDs [84d5adbd b66b8e30 f104f36e d938e29a 75ddfc1e 70e78cb5] with a closed connection. 2025/04/30 11:58:32 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:32 server Connection 97edd1dd5ab8a17b closed. 2025/04/30 11:58:32 server <- Received Initial packet. 2025/04/30 11:58:32 Created qlog file: /logs/qlog/27ba16c7322ac863.sqlog 2025/04/30 11:58:32 server Changing connection ID to 0e2ef84d. 2025/04/30 11:58:32 Adding connection IDs 27ba16c7322ac863 and 0e2ef84d for a new connection. 2025/04/30 11:58:32 server <- Reading packet 0 (1252 bytes) for connection 27ba16c7322ac863, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: 27ba16c7322ac863, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:58:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:58:32 server -> Sending packet 0 (40 bytes) for connection 27ba16c7322ac863, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:58:32 server <- Reading packet 1 (366 bytes) for connection 27ba16c7322ac863, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: 27ba16c7322ac863, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:58:32 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:58:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:32 Adding connection ID e75a770a. 2025/04/30 11:58:32 Adding connection ID 4923807e. 2025/04/30 11:58:32 Adding connection ID 9df1c96f. 2025/04/30 11:58:32 Adding connection ID d7dda16b. 2025/04/30 11:58:32 Adding connection ID 71052671. 2025/04/30 11:58:32 server coalesced packet has different destination connection ID: 00000000, expected 27ba16c7322ac863 2025/04/30 11:58:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 27ba16c7322ac863 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 384, Version: v1} 2025/04/30 11:58:32 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:32 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:58:32 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e75a770a, StatelessResetToken: 0xa2be363d9041e896f2c82809ee32bf9b} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9df1c96f, StatelessResetToken: 0xad31b6ae5e0a9a4b5bf6de91815c73a0} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d7dda16b, StatelessResetToken: 0xa1e10cf72fe93823e0b52b40791e8a9d} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 71052671, StatelessResetToken: 0x763e16ca13c9fbdd326c862baed1ed77} 2025/04/30 11:58:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4923807e, StatelessResetToken: 0xd7ca333edecdc3742a4856a5e5407a40} 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 362 bytes. Remaining: 890 bytes. 2025/04/30 11:58:32 server <- Reading packet 2 (362 bytes) for connection 0e2ef84d, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: 0e2ef84d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:58:32 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:58:32 server coalesced packet has different destination connection ID: 00000000, expected 0e2ef84d 2025/04/30 11:58:32 server -> Sending packet 2 (40 bytes) for connection 27ba16c7322ac863, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:32 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:32 server -> Sending packet 3 (1280 bytes) for connection 27ba16c7322ac863, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:32 server -> Sending packet 4 (1280 bytes) for connection 27ba16c7322ac863, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 39 bytes. Remaining: 1213 bytes. 2025/04/30 11:58:32 server <- Reading packet 3 (39 bytes) for connection 0e2ef84d, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: 0e2ef84d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 25, Version: v1} 2025/04/30 11:58:32 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 552µs} 2025/04/30 11:58:32 server coalesced packet has different destination connection ID: 00000000, expected 0e2ef84d 2025/04/30 11:58:32 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:32 server -> Sending packet 1 (743 bytes) for connection 27ba16c7322ac863, Handshake 2025/04/30 11:58:32 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:58:32 server -> Sending packet 2 (743 bytes) for connection 27ba16c7322ac863, Handshake 2025/04/30 11:58:32 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:58:32 Removing connection ID dba4a7fda716926bff after it has been retired. 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 372 bytes. Remaining: 880 bytes. 2025/04/30 11:58:32 server <- Reading packet 5 (372 bytes) for connection 0e2ef84d, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: 0e2ef84d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 358, Version: v1} 2025/04/30 11:58:32 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 196.488ms} 2025/04/30 11:58:32 server newly acked packets (1): [4] 2025/04/30 11:58:32 server updated RTT: 230.554954ms (σ: 115.277477ms) 2025/04/30 11:58:32 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:58:32 server coalesced packet has different destination connection ID: 00000000, expected 0e2ef84d 2025/04/30 11:58:32 server -> Sending packet 5 (42 bytes) for connection 27ba16c7322ac863, Initial 2025/04/30 11:58:32 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0e2ef84d, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:32 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server <- Reading packet 0 (36 bytes) for connection 0e2ef84d, Handshake 2025/04/30 11:58:32 server Long Header{Type: Handshake, DestConnectionID: 0e2ef84d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:32 server Dropping Initial keys. 2025/04/30 11:58:32 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 784µs} 2025/04/30 11:58:32 server <- Reading packet 1 (35 bytes) for connection 0e2ef84d, Handshake 2025/04/30 11:58:32 server Long Header{Type: Handshake, DestConnectionID: 0e2ef84d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:58:32 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 16µs} 2025/04/30 11:58:32 server newly acked packets (1): [2] 2025/04/30 11:58:32 server updated RTT: 205.796ms (σ: 135.972ms) 2025/04/30 11:58:32 server Canceling loss detection timer. 2025/04/30 11:58:32 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:58:32 server <- Reading packet 2 (69 bytes) for connection 0e2ef84d, Handshake 2025/04/30 11:58:32 server Long Header{Type: Handshake, DestConnectionID: 0e2ef84d, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:58:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:32 Retiring connection ID 27ba16c7322ac863 in 5s. 2025/04/30 11:58:32 server Dropping Handshake keys. 2025/04/30 11:58:32 server <- Reading packet 0 (42 bytes) for connection 0e2ef84d, 1-RTT 2025/04/30 11:58:32 server Short Header{DestConnectionID: 0e2ef84d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:32 server -> Sending packet 1 (259 bytes) for connection 27ba16c7322ac863, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:32 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:32 Received request: GET /tepfpsrfcr 2025/04/30 11:58:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 212.388µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:32 server -> &wire.NewTokenFrame{Token: 0x06299ec4135cbfffda38059c3f548fe3f2b3129e4115bebed8ecea9513bceb72190076c8d686ac6a50f1deef242b64e00d4fabe2fd52ec2a0b7d2985731bc9e4ca78ba63d10563aeca6508f2f2bdf00151a377277f7a} 2025/04/30 11:58:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:32 server -> Sending packet 2 (1045 bytes) for connection 27ba16c7322ac863, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:32 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:33 Removing connection IDs [3040a768 817d7155 a66974df ea49c7a8 e717f240 8f2976d4] for a closed connection after it has been retired. 2025/04/30 11:58:33 server Parsed a coalesced packet. Part 1: 40 bytes. Remaining: 41 bytes. 2025/04/30 11:58:33 server Dropping %!s(logging.PacketType=1) packet (40 bytes) because we already dropped the keys. 2025/04/30 11:58:33 server <- Reading packet 2 (41 bytes) for connection 0e2ef84d, 1-RTT 2025/04/30 11:58:33 server Short Header{DestConnectionID: 0e2ef84d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:33 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 256µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:33 server newly acked packets (1): [2] 2025/04/30 11:58:33 server updated RTT: 184.104ms (σ: 145.362ms) 2025/04/30 11:58:33 server ECN capability confirmed. 2025/04/30 11:58:33 server lost packet 0 (time threshold) 2025/04/30 11:58:33 server setting loss timer for packet 1 (1-RTT) to 207.117ms (in 2025-04-30 11:58:33.194839629 +0000 UTC m=+37.563720355) 2025/04/30 11:58:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:33 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:33 Replacing connection for connection IDs [71052671 0e2ef84d e75a770a 4923807e 9df1c96f d7dda16b] with a closed connection. 2025/04/30 11:58:33 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:33 server Connection 27ba16c7322ac863 closed. 2025/04/30 11:58:33 server <- Received Initial packet. 2025/04/30 11:58:33 Created qlog file: /logs/qlog/2da02d3240668476.sqlog 2025/04/30 11:58:33 server Changing connection ID to 4b590e7a. 2025/04/30 11:58:33 Adding connection IDs 2da02d3240668476 and 4b590e7a for a new connection. 2025/04/30 11:58:33 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:58:33 server <- Reading packet 1 (366 bytes) for connection 2da02d3240668476, Initial 2025/04/30 11:58:33 server Long Header{Type: Initial, DestConnectionID: 2da02d3240668476, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:58:33 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:58:33 server coalesced packet has different destination connection ID: 00000000, expected 2da02d3240668476 2025/04/30 11:58:33 server -> Sending packet 0 (40 bytes) for connection 2da02d3240668476, Initial 2025/04/30 11:58:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b590e7a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:33 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:33 Removing connection ID 2be1df5dd7ae86a6ae4faddf60 after it has been retired. 2025/04/30 11:58:33 Removing connection IDs [54e201f5 d3079c96 ddfd6a34 6e491393 05d0d171 037b0b29] for a closed connection after it has been retired. 2025/04/30 11:58:33 server <- Reading packet 2 (1252 bytes) for connection 2da02d3240668476, Initial 2025/04/30 11:58:33 server Long Header{Type: Initial, DestConnectionID: 2da02d3240668476, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:58:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:58:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:33 Adding connection ID 309886d2. 2025/04/30 11:58:33 Adding connection ID 9223469f. 2025/04/30 11:58:33 Adding connection ID 2ad9bb95. 2025/04/30 11:58:33 Adding connection ID e613bec3. 2025/04/30 11:58:33 Adding connection ID 60561f25. 2025/04/30 11:58:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2da02d3240668476 2025/04/30 11:58:33 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b590e7a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 382, Version: v1} 2025/04/30 11:58:33 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:58:33 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b590e7a, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:58:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:58:33 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e613bec3, StatelessResetToken: 0x3feb21dd2fcd3114958cbfa4a8f586f3} 2025/04/30 11:58:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 309886d2, StatelessResetToken: 0xafd3c1188bec9885816b2985372101d1} 2025/04/30 11:58:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9223469f, StatelessResetToken: 0xd1d93bae73d3d99c67b6e68938c927f4} 2025/04/30 11:58:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2ad9bb95, StatelessResetToken: 0x40d5b4a611e93e2a1ab66e3e46bb0fbe} 2025/04/30 11:58:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 60561f25, StatelessResetToken: 0x32164ee7b58af7579cf6e256ad028188} 2025/04/30 11:58:33 Tracking 49 connection IDs and 0 reset tokens. 2025/04/30 11:58:33 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 36 bytes. 2025/04/30 11:58:33 server <- Reading packet 4 (37 bytes) for connection 4b590e7a, Initial 2025/04/30 11:58:33 server Long Header{Type: Initial, DestConnectionID: 4b590e7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:33 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.304ms} 2025/04/30 11:58:33 server newly acked packets (1): [1] 2025/04/30 11:58:33 server updated RTT: 33.332339ms (σ: 16.666169ms) 2025/04/30 11:58:33 server Parsed a coalesced packet. Part 2: 36 bytes. Remaining: 0 bytes. 2025/04/30 11:58:33 server <- Reading packet 0 (36 bytes) for connection 4b590e7a, Handshake 2025/04/30 11:58:33 server Long Header{Type: Handshake, DestConnectionID: 4b590e7a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:33 server Dropping Initial keys. 2025/04/30 11:58:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.304ms} 2025/04/30 11:58:33 server newly acked packets (1): [0] 2025/04/30 11:58:33 server updated RTT: 33.332ms (σ: 12.499ms) 2025/04/30 11:58:33 server Canceling loss detection timer. 2025/04/30 11:58:33 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:58:33 server <- Reading packet 1 (69 bytes) for connection 4b590e7a, Handshake 2025/04/30 11:58:33 server Long Header{Type: Handshake, DestConnectionID: 4b590e7a, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:58:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:33 Retiring connection ID 2da02d3240668476 in 5s. 2025/04/30 11:58:33 server Dropping Handshake keys. 2025/04/30 11:58:33 server <- Reading packet 0 (42 bytes) for connection 4b590e7a, 1-RTT 2025/04/30 11:58:33 server Short Header{DestConnectionID: 4b590e7a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:33 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:33 server -> Sending packet 1 (259 bytes) for connection 2da02d3240668476, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:33 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 207.299µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:33 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:33 Received request: GET /gpwnztuhwb 2025/04/30 11:58:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:33 server -> &wire.NewTokenFrame{Token: 0xfe19bbe17a195544dc1047192d9f1777ca2beb7449dac79d2ce9707d6bb6aad9dcf75793bf635326eda961fd3000f352ae3c2950157c7432100bd4d3140c341e5e700c262b1cfd986b58d2fec53021f4a83df834ab83} 2025/04/30 11:58:33 server -> Sending packet 2 (1045 bytes) for connection 2da02d3240668476, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:33 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:33 server <- Reading packet 1 (28 bytes) for connection 4b590e7a, 1-RTT 2025/04/30 11:58:33 server Short Header{DestConnectionID: 4b590e7a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.096ms} 2025/04/30 11:58:33 server newly acked packets (1): [0] 2025/04/30 11:58:33 server updated RTT: 35.803ms (σ: 14.318ms) 2025/04/30 11:58:33 server <- Reading packet 2 (1352 bytes) for connection 4b590e7a, 1-RTT 2025/04/30 11:58:33 server Short Header{DestConnectionID: 4b590e7a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:33 server <- &wire.PingFrame{} 2025/04/30 11:58:33 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:33 server <- Reading packet 3 (30 bytes) for connection 4b590e7a, 1-RTT 2025/04/30 11:58:33 server Short Header{DestConnectionID: 4b590e7a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:33 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:33 server newly acked packets (2): [1 2] 2025/04/30 11:58:33 server updated RTT: 35.381ms (σ: 11.58ms) 2025/04/30 11:58:33 server ECN capability confirmed. 2025/04/30 11:58:33 server Canceling loss detection timer. 2025/04/30 11:58:33 server Ignoring all packets below 1. 2025/04/30 11:58:33 server -> Sending packet 3 (30 bytes) for connection 2da02d3240668476, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:33 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:33 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 245.301µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:33 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:33 server <- Reading packet 4 (41 bytes) for connection 4b590e7a, 1-RTT 2025/04/30 11:58:33 server Short Header{DestConnectionID: 4b590e7a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:33 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 224µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:33 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:33 Replacing connection for connection IDs [60561f25 4b590e7a 309886d2 9223469f 2ad9bb95 e613bec3] with a closed connection. 2025/04/30 11:58:33 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:33 server Connection 2da02d3240668476 closed. 2025/04/30 11:58:33 Removing connection ID ae4fdc0111aaad0117aed15b79 after it has been retired. 2025/04/30 11:58:33 Removing connection IDs [5e740354 f6898212 b88c1e73 b3bc60bc e53be444 4ff07ccb] for a closed connection after it has been retired. 2025/04/30 11:58:34 server <- Received Initial packet. 2025/04/30 11:58:34 Created qlog file: /logs/qlog/20202e802d737a17.sqlog 2025/04/30 11:58:34 server Changing connection ID to 57b29eeb. 2025/04/30 11:58:34 Adding connection IDs 20202e802d737a17 and 57b29eeb for a new connection. 2025/04/30 11:58:34 server <- Reading packet 0 (1252 bytes) for connection 20202e802d737a17, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: 20202e802d737a17, SrcConnectionID: (empty), Token: 0xfe19bbe17a195544dc1047192d9f1777ca2beb7449dac79d2ce9707d6bb6aad9dcf75793bf635326eda961fd3000f352ae3c2950157c7432100bd4d3140c341e5e700c262b1cfd986b58d2fec53021f4a83df834ab83, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:34 server -> Sending packet 0 (40 bytes) for connection 20202e802d737a17, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57b29eeb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:34 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:34 server <- Reading packet 1 (708 bytes) for connection 20202e802d737a17, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: 20202e802d737a17, SrcConnectionID: (empty), Token: 0xfe19bbe17a195544dc1047192d9f1777ca2beb7449dac79d2ce9707d6bb6aad9dcf75793bf635326eda961fd3000f352ae3c2950157c7432100bd4d3140c341e5e700c262b1cfd986b58d2fec53021f4a83df834ab83, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:34 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:34 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:34 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:34 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:34 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:34 Adding connection ID 9c4f4bdb. 2025/04/30 11:58:34 Adding connection ID 31b0b784. 2025/04/30 11:58:34 Adding connection ID be45db67. 2025/04/30 11:58:34 Adding connection ID 030af8d1. 2025/04/30 11:58:34 Adding connection ID af75a472. 2025/04/30 11:58:34 server coalesced packet has different destination connection ID: 00000000, expected 20202e802d737a17 2025/04/30 11:58:34 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 20202e802d737a17 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57b29eeb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 938, Version: v1} 2025/04/30 11:58:34 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:34 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57b29eeb, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 31b0b784, StatelessResetToken: 0x2cc9c608a6a62e3b2898c45e965189b3} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af75a472, StatelessResetToken: 0xa7c776171f633c12e090c09e5a2ae15e} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: be45db67, StatelessResetToken: 0x4006929b7d50efc0924cf9c5b3f52468} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 030af8d1, StatelessResetToken: 0x6b4d73f66ebe14fce1c3684ee9a6b144} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c4f4bdb, StatelessResetToken: 0xae26bec015edb575c1eb5d9e73d652c0} 2025/04/30 11:58:34 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:58:34 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:34 server -> Sending packet 2 (1280 bytes) for connection 20202e802d737a17, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57b29eeb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:34 server -> Sending packet 3 (1280 bytes) for connection 20202e802d737a17, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57b29eeb, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:34 server Queueing packet (28 bytes) for later decryption 2025/04/30 11:58:34 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:34 server -> Sending packet 1 (189 bytes) for connection 20202e802d737a17, Handshake 2025/04/30 11:58:34 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57b29eeb, PacketNumber: 1, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:34 server -> Sending packet 2 (189 bytes) for connection 20202e802d737a17, Handshake 2025/04/30 11:58:34 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57b29eeb, PacketNumber: 2, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 11:58:34 server <- Reading packet 1 (74 bytes) for connection 57b29eeb, Handshake 2025/04/30 11:58:34 server Long Header{Type: Handshake, DestConnectionID: 57b29eeb, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:58:34 server Dropping Initial keys. 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs} 2025/04/30 11:58:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:34 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:34 Retiring connection ID 20202e802d737a17 in 5s. 2025/04/30 11:58:34 server Dropping Handshake keys. 2025/04/30 11:58:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:34 server -> Sending packet 2 (371 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.NewTokenFrame{Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81} 2025/04/30 11:58:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 31b0b784, StatelessResetToken: 0x2cc9c608a6a62e3b2898c45e965189b3} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c4f4bdb, StatelessResetToken: 0xae26bec015edb575c1eb5d9e73d652c0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af75a472, StatelessResetToken: 0xa7c776171f633c12e090c09e5a2ae15e} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: be45db67, StatelessResetToken: 0x4006929b7d50efc0924cf9c5b3f52468} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 030af8d1, StatelessResetToken: 0x6b4d73f66ebe14fce1c3684ee9a6b144} 2025/04/30 11:58:34 server -> Sending packet 3 (371 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 030af8d1, StatelessResetToken: 0x6b4d73f66ebe14fce1c3684ee9a6b144} 2025/04/30 11:58:34 server -> &wire.NewTokenFrame{Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af75a472, StatelessResetToken: 0xa7c776171f633c12e090c09e5a2ae15e} 2025/04/30 11:58:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c4f4bdb, StatelessResetToken: 0xae26bec015edb575c1eb5d9e73d652c0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: be45db67, StatelessResetToken: 0x4006929b7d50efc0924cf9c5b3f52468} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 31b0b784, StatelessResetToken: 0x2cc9c608a6a62e3b2898c45e965189b3} 2025/04/30 11:58:34 server <- Reading packet 0 (42 bytes) for connection 57b29eeb, 1-RTT 2025/04/30 11:58:34 server Short Header{DestConnectionID: 57b29eeb, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:34 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:34 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:34 server <- Reading packet 1 (28 bytes) for connection 57b29eeb, 1-RTT 2025/04/30 11:58:34 server Short Header{DestConnectionID: 57b29eeb, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.416ms} 2025/04/30 11:58:34 server -> Sending packet 4 (28 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 Received request: GET /sbcmtugshz 2025/04/30 11:58:34 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 47.91868ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server -> Sending packet 5 (1045 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:58:34 server -> Sending packet 7 (371 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 31b0b784, StatelessResetToken: 0x2cc9c608a6a62e3b2898c45e965189b3} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 030af8d1, StatelessResetToken: 0x6b4d73f66ebe14fce1c3684ee9a6b144} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c4f4bdb, StatelessResetToken: 0xae26bec015edb575c1eb5d9e73d652c0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: be45db67, StatelessResetToken: 0x4006929b7d50efc0924cf9c5b3f52468} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:34 server -> &wire.NewTokenFrame{Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af75a472, StatelessResetToken: 0xa7c776171f633c12e090c09e5a2ae15e} 2025/04/30 11:58:34 server Skipping packet number 6 2025/04/30 11:58:34 server -> Sending packet 8 (1045 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:34 server <- Reading packet 3 (32 bytes) for connection 57b29eeb, 1-RTT 2025/04/30 11:58:34 server Short Header{DestConnectionID: 57b29eeb, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}}, DelayTime: 72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server newly acked packets (1): [8] 2025/04/30 11:58:34 server updated RTT: 32.328381ms (σ: 16.16419ms) 2025/04/30 11:58:34 server ECN capability confirmed. 2025/04/30 11:58:34 server setting loss timer for packet 7 (1-RTT) to 36.369428ms (in 2025-04-30 11:58:34.274941207 +0000 UTC m=+38.643821933) 2025/04/30 11:58:34 server -> Sending packet 9 (22 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:34 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:58:34.274941207 +0000 UTC m=+38.643821933 2025/04/30 11:58:34 server lost packet 7 (time threshold) 2025/04/30 11:58:34 server -> Sending packet 10 (371 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 31b0b784, StatelessResetToken: 0x2cc9c608a6a62e3b2898c45e965189b3} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 030af8d1, StatelessResetToken: 0x6b4d73f66ebe14fce1c3684ee9a6b144} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af75a472, StatelessResetToken: 0xa7c776171f633c12e090c09e5a2ae15e} 2025/04/30 11:58:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:34 server -> &wire.NewTokenFrame{Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c4f4bdb, StatelessResetToken: 0xae26bec015edb575c1eb5d9e73d652c0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: be45db67, StatelessResetToken: 0x4006929b7d50efc0924cf9c5b3f52468} 2025/04/30 11:58:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:34 server -> Sending packet 12 (22 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:34 server Skipping packet number 11 2025/04/30 11:58:34 server -> Sending packet 13 (371 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9c4f4bdb, StatelessResetToken: 0xae26bec015edb575c1eb5d9e73d652c0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: be45db67, StatelessResetToken: 0x4006929b7d50efc0924cf9c5b3f52468} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af75a472, StatelessResetToken: 0xa7c776171f633c12e090c09e5a2ae15e} 2025/04/30 11:58:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 030af8d1, StatelessResetToken: 0x6b4d73f66ebe14fce1c3684ee9a6b144} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 31b0b784, StatelessResetToken: 0x2cc9c608a6a62e3b2898c45e965189b3} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:34 server -> &wire.NewTokenFrame{Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81} 2025/04/30 11:58:34 server -> Sending packet 14 (1366 bytes) for connection 20202e802d737a17, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.PingFrame{} 2025/04/30 11:58:34 server <- Reading packet 7 (46 bytes) for connection 57b29eeb, 1-RTT 2025/04/30 11:58:34 server Short Header{DestConnectionID: 57b29eeb, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}}, DelayTime: 153.136ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:34 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:34 Replacing connection for connection IDs [57b29eeb 9c4f4bdb 31b0b784 be45db67 030af8d1 af75a472] with a closed connection. 2025/04/30 11:58:34 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:34 server Connection 20202e802d737a17 closed. 2025/04/30 11:58:34 Removing connection ID cac70583a9e09f363a27f4108d139e22 after it has been retired. 2025/04/30 11:58:34 server <- Received Initial packet. 2025/04/30 11:58:34 Created qlog file: /logs/qlog/3437ce830ed168ae2f.sqlog 2025/04/30 11:58:34 server Changing connection ID to 93ce33b0. 2025/04/30 11:58:34 Adding connection IDs 3437ce830ed168ae2f and 93ce33b0 for a new connection. 2025/04/30 11:58:34 server Parsed a coalesced packet. Part 1: 710 bytes. Remaining: 542 bytes. 2025/04/30 11:58:34 server <- Reading packet 1 (710 bytes) for connection 3437ce830ed168ae2f, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: 3437ce830ed168ae2f, SrcConnectionID: (empty), Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81, PacketNumber: 1, PacketNumberLen: 1, Length: 604, Version: v1} 2025/04/30 11:58:34 server <- &wire.CryptoFrame{Offset: 1125, Data length: 582, Offset + Data length: 1707} 2025/04/30 11:58:34 server coalesced packet has different destination connection ID: 00000000, expected 3437ce830ed168ae2f 2025/04/30 11:58:34 server -> Sending packet 0 (40 bytes) for connection 3437ce830ed168ae2f, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:34 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:34 Removing connection IDs [6238c83d 8be7601b 8e8142e2 4f2c5db0 a8b56bfc b97a7486] for a closed connection after it has been retired. 2025/04/30 11:58:34 server Parsed a coalesced packet. Part 1: 1247 bytes. Remaining: 5 bytes. 2025/04/30 11:58:34 server <- Reading packet 2 (1247 bytes) for connection 93ce33b0, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: 93ce33b0, SrcConnectionID: (empty), Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81, PacketNumber: 2, PacketNumberLen: 1, Length: 1146, Version: v1} 2025/04/30 11:58:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 1125, Offset + Data length: 1125} 2025/04/30 11:58:34 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:34 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:34 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:34 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:34 Adding connection ID 2ce1596a. 2025/04/30 11:58:34 Adding connection ID 7022cc01. 2025/04/30 11:58:34 Adding connection ID ac094c65. 2025/04/30 11:58:34 Adding connection ID b4b40767. 2025/04/30 11:58:34 Adding connection ID f1435ea4. 2025/04/30 11:58:34 server coalesced packet has different destination connection ID: 00000000, expected 93ce33b0 2025/04/30 11:58:34 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3437ce830ed168ae2f 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 942, Version: v1} 2025/04/30 11:58:34 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:34 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, PacketNumber: 0, PacketNumberLen: 2, Length: 172, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2ce1596a, StatelessResetToken: 0xe70e5cb8525f32ac540d38633eaa563f} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f1435ea4, StatelessResetToken: 0x01e101714179ec51164ef7db6cf30997} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b4b40767, StatelessResetToken: 0x31384bb5eb87f394a3b0446c49d916be} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7022cc01, StatelessResetToken: 0xdbb7dcf87e15f0755eb08c6a9e34d3ec} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac094c65, StatelessResetToken: 0x6af93669bc7c7e3682b4c63c660baaf2} 2025/04/30 11:58:34 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:34 server -> Sending packet 2 (1280 bytes) for connection 3437ce830ed168ae2f, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:34 server -> Sending packet 3 (1280 bytes) for connection 3437ce830ed168ae2f, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:34 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:34 server -> Sending packet 1 (185 bytes) for connection 3437ce830ed168ae2f, Handshake 2025/04/30 11:58:34 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, PacketNumber: 1, PacketNumberLen: 2, Length: 172, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/04/30 11:58:34 server -> Sending packet 2 (185 bytes) for connection 3437ce830ed168ae2f, Handshake 2025/04/30 11:58:34 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, PacketNumber: 2, PacketNumberLen: 2, Length: 172, Version: v1} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/04/30 11:58:34 server Parsed a coalesced packet. Part 1: 126 bytes. Remaining: 1126 bytes. 2025/04/30 11:58:34 server <- Reading packet 3 (126 bytes) for connection 93ce33b0, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: 93ce33b0, SrcConnectionID: (empty), Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81, PacketNumber: 3, PacketNumberLen: 1, Length: 25, Version: v1} 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 536µs} 2025/04/30 11:58:34 server coalesced packet has different destination connection ID: 00000000, expected 93ce33b0 2025/04/30 11:58:34 server <- Reading packet 4 (1252 bytes) for connection 93ce33b0, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: 93ce33b0, SrcConnectionID: (empty), Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81, PacketNumber: 4, PacketNumberLen: 1, Length: 1151, Version: v1} 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs} 2025/04/30 11:58:34 server newly acked packets (1): [3] 2025/04/30 11:58:34 server updated RTT: 34.522137ms (σ: 17.261068ms) 2025/04/30 11:58:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 1123, Offset + Data length: 1123} 2025/04/30 11:58:34 server -> Sending packet 4 (40 bytes) for connection 3437ce830ed168ae2f, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:34 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 1128 bytes. 2025/04/30 11:58:34 server <- Reading packet 5 (124 bytes) for connection 93ce33b0, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: 93ce33b0, SrcConnectionID: (empty), Token: 0x367a6297c56bd82f5d32779a40bf56ef3955c3336ba96a1e3da8e49e2dfb962a71eed894820fbb72e3112e2920a8936754a01faa6e490eafc83f5e4b6f3aada21f4116119fe44e4a532b991003bd735f70594bca1b81, PacketNumber: 5, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:34 server <- &wire.CryptoFrame{Offset: 1123, Data length: 2, Offset + Data length: 1125} 2025/04/30 11:58:34 server coalesced packet has different destination connection ID: 00000000, expected 93ce33b0 2025/04/30 11:58:34 server -> Sending packet 5 (40 bytes) for connection 3437ce830ed168ae2f, Initial 2025/04/30 11:58:34 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 93ce33b0, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:34 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server <- Reading packet 0 (75 bytes) for connection 93ce33b0, Handshake 2025/04/30 11:58:34 server Long Header{Type: Handshake, DestConnectionID: 93ce33b0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:34 server Dropping Initial keys. 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 592µs} 2025/04/30 11:58:34 server newly acked packets (1): [2] 2025/04/30 11:58:34 server updated RTT: 34.217ms (σ: 13.555ms) 2025/04/30 11:58:34 server Canceling loss detection timer. 2025/04/30 11:58:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:34 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:34 Retiring connection ID 3437ce830ed168ae2f in 5s. 2025/04/30 11:58:34 server Dropping Handshake keys. 2025/04/30 11:58:34 server -> Sending packet 1 (251 bytes) for connection 3437ce830ed168ae2f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:34 server -> &wire.NewTokenFrame{Token: 0x9ec755c09f58b98c32593c2708245bae66b36cb17cfbbbffe70a4d2952099e8e7cf5099305cfe79a252f0b63dbd8c0a1e99e82616322a9bc2d3944545af14c5505ce2b477c5fd729a9dfb70d062ea9f5dc72a7760659} 2025/04/30 11:58:34 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:34 server <- Reading packet 1 (1352 bytes) for connection 93ce33b0, 1-RTT 2025/04/30 11:58:34 server Short Header{DestConnectionID: 93ce33b0, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 256µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server newly acked packets (1): [1] 2025/04/30 11:58:34 server updated RTT: 33.951ms (σ: 10.696ms) 2025/04/30 11:58:34 server ECN capability confirmed. 2025/04/30 11:58:34 server lost packet 0 (time threshold) 2025/04/30 11:58:34 server Canceling loss detection timer. 2025/04/30 11:58:34 server <- &wire.PingFrame{} 2025/04/30 11:58:34 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:34 server -> Sending packet 2 (147 bytes) for connection 3437ce830ed168ae2f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:34 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:34 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 159.729µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7022cc01, StatelessResetToken: 0xdbb7dcf87e15f0755eb08c6a9e34d3ec} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac094c65, StatelessResetToken: 0x6af93669bc7c7e3682b4c63c660baaf2} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2ce1596a, StatelessResetToken: 0xe70e5cb8525f32ac540d38633eaa563f} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b4b40767, StatelessResetToken: 0x31384bb5eb87f394a3b0446c49d916be} 2025/04/30 11:58:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f1435ea4, StatelessResetToken: 0x01e101714179ec51164ef7db6cf30997} 2025/04/30 11:58:34 server <- Reading packet 3 (31 bytes) for connection 93ce33b0, 1-RTT 2025/04/30 11:58:34 server Short Header{DestConnectionID: 93ce33b0, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:34 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 21.416ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:34 server newly acked packets (1): [2] 2025/04/30 11:58:34 server updated RTT: 33.766ms (σ: 8.39ms) 2025/04/30 11:58:34 server Canceling loss detection timer. 2025/04/30 11:58:34 server Ignoring all packets below 2. 2025/04/30 11:58:35 server <- Reading packet 4 (42 bytes) for connection 93ce33b0, 1-RTT 2025/04/30 11:58:35 server Short Header{DestConnectionID: 93ce33b0, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:35 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:35 server -> Sending packet 3 (1366 bytes) for connection 3437ce830ed168ae2f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.PingFrame{} 2025/04/30 11:58:35 Received request: GET /bcpkkjvcgb 2025/04/30 11:58:35 server -> Sending packet 4 (1053 bytes) for connection 3437ce830ed168ae2f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 370.804µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:35 server -> Sending packet 6 (1045 bytes) for connection 3437ce830ed168ae2f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:35 server -> Sending packet 7 (1045 bytes) for connection 3437ce830ed168ae2f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:35 server <- Reading packet 6 (32 bytes) for connection 93ce33b0, 1-RTT 2025/04/30 11:58:35 server Short Header{DestConnectionID: 93ce33b0, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:35 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 1}}, DelayTime: 72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server newly acked packets (1): [7] 2025/04/30 11:58:35 server updated RTT: 33.619ms (σ: 6.585ms) 2025/04/30 11:58:35 server lost packet 3 (time threshold) 2025/04/30 11:58:35 server Canceling loss detection timer. 2025/04/30 11:58:35 server -> Sending packet 8 (22 bytes) for connection 3437ce830ed168ae2f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:58:35 server <- Reading packet 7 (43 bytes) for connection 93ce33b0, 1-RTT 2025/04/30 11:58:35 server Short Header{DestConnectionID: 93ce33b0, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:35 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 1}}, DelayTime: 288µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:35 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:35 Replacing connection for connection IDs [93ce33b0 2ce1596a 7022cc01 ac094c65 b4b40767 f1435ea4] with a closed connection. 2025/04/30 11:58:35 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:35 server Connection 3437ce830ed168ae2f closed. 2025/04/30 11:58:35 Removing connection ID ffca19da35357a19b2 after it has been retired. 2025/04/30 11:58:35 Removing connection IDs [779371e6 01145850 110bb787 fd7e6463 6a33d456 53db4178] for a closed connection after it has been retired. 2025/04/30 11:58:35 server <- Received Initial packet. 2025/04/30 11:58:35 Created qlog file: /logs/qlog/be0ef231604744b0.sqlog 2025/04/30 11:58:35 server Changing connection ID to bae97c58. 2025/04/30 11:58:35 Adding connection IDs be0ef231604744b0 and bae97c58 for a new connection. 2025/04/30 11:58:35 server <- Reading packet 0 (1252 bytes) for connection be0ef231604744b0, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: be0ef231604744b0, SrcConnectionID: (empty), Token: 0x9ec755c09f58b98c32593c2708245bae66b36cb17cfbbbffe70a4d2952099e8e7cf5099305cfe79a252f0b63dbd8c0a1e99e82616322a9bc2d3944545af14c5505ce2b477c5fd729a9dfb70d062ea9f5dc72a7760659, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:35 server -> Sending packet 0 (40 bytes) for connection be0ef231604744b0, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bae97c58, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:58:35 server <- Reading packet 2 (704 bytes) for connection bae97c58, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: bae97c58, SrcConnectionID: (empty), Token: 0x9ec755c09f58b98c32593c2708245bae66b36cb17cfbbbffe70a4d2952099e8e7cf5099305cfe79a252f0b63dbd8c0a1e99e82616322a9bc2d3944545af14c5505ce2b477c5fd729a9dfb70d062ea9f5dc72a7760659, PacketNumber: 2, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:35 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:35 Adding connection ID 0b5eb016. 2025/04/30 11:58:35 Adding connection ID abb59e53. 2025/04/30 11:58:35 Adding connection ID 58579434. 2025/04/30 11:58:35 Adding connection ID c2ae70f1. 2025/04/30 11:58:35 Adding connection ID d2a15f46. 2025/04/30 11:58:35 server coalesced packet has different destination connection ID: 00000000, expected bae97c58 2025/04/30 11:58:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection be0ef231604744b0 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bae97c58, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:58:35 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bae97c58, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58579434, StatelessResetToken: 0x1fa0e6a9844330db764ce33ea4d2dd77} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d2a15f46, StatelessResetToken: 0xb248e53830aededace5a9a6178cba6b3} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0b5eb016, StatelessResetToken: 0x9fa144163c9ea304c4e8e4bb6ad71267} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c2ae70f1, StatelessResetToken: 0xe7e035cb12debf7876e921358f472aee} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: abb59e53, StatelessResetToken: 0x9725183a2b72469e83bece553b374c8d} 2025/04/30 11:58:35 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:35 server -> Sending packet 2 (1280 bytes) for connection be0ef231604744b0, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bae97c58, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:35 server -> Sending packet 3 (1280 bytes) for connection be0ef231604744b0, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bae97c58, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:35 Tracking 49 connection IDs and 0 reset tokens. 2025/04/30 11:58:35 server Parsed a coalesced packet. Part 1: 125 bytes. Remaining: 1127 bytes. 2025/04/30 11:58:35 server <- Reading packet 3 (125 bytes) for connection bae97c58, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: bae97c58, SrcConnectionID: (empty), Token: 0x9ec755c09f58b98c32593c2708245bae66b36cb17cfbbbffe70a4d2952099e8e7cf5099305cfe79a252f0b63dbd8c0a1e99e82616322a9bc2d3944545af14c5505ce2b477c5fd729a9dfb70d062ea9f5dc72a7760659, PacketNumber: 3, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 11:58:35 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 480µs} 2025/04/30 11:58:35 server coalesced packet has different destination connection ID: 00000000, expected bae97c58 2025/04/30 11:58:35 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:35 server -> Sending packet 1 (194 bytes) for connection be0ef231604744b0, Handshake 2025/04/30 11:58:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bae97c58, PacketNumber: 1, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:35 server -> Sending packet 2 (194 bytes) for connection be0ef231604744b0, Handshake 2025/04/30 11:58:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bae97c58, PacketNumber: 2, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:35 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:58:35 server -> Sending packet 4 (1280 bytes) for connection be0ef231604744b0, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bae97c58, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:35 server -> Sending packet 5 (1280 bytes) for connection be0ef231604744b0, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bae97c58, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:35 server Parsed a coalesced packet. Part 1: 711 bytes. Remaining: 541 bytes. 2025/04/30 11:58:35 server <- Reading packet 5 (711 bytes) for connection bae97c58, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: bae97c58, SrcConnectionID: (empty), Token: 0x9ec755c09f58b98c32593c2708245bae66b36cb17cfbbbffe70a4d2952099e8e7cf5099305cfe79a252f0b63dbd8c0a1e99e82616322a9bc2d3944545af14c5505ce2b477c5fd729a9dfb70d062ea9f5dc72a7760659, PacketNumber: 5, PacketNumberLen: 1, Length: 610, Version: v1} 2025/04/30 11:58:35 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs} 2025/04/30 11:58:35 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:35 server coalesced packet has different destination connection ID: 00000000, expected bae97c58 2025/04/30 11:58:35 server -> Sending packet 6 (44 bytes) for connection be0ef231604744b0, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bae97c58, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 11:58:35 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server Parsed a coalesced packet. Part 1: 711 bytes. Remaining: 541 bytes. 2025/04/30 11:58:35 server <- Reading packet 6 (711 bytes) for connection bae97c58, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: bae97c58, SrcConnectionID: (empty), Token: 0x9ec755c09f58b98c32593c2708245bae66b36cb17cfbbbffe70a4d2952099e8e7cf5099305cfe79a252f0b63dbd8c0a1e99e82616322a9bc2d3944545af14c5505ce2b477c5fd729a9dfb70d062ea9f5dc72a7760659, PacketNumber: 6, PacketNumberLen: 1, Length: 610, Version: v1} 2025/04/30 11:58:35 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 32µs} 2025/04/30 11:58:35 server newly acked packets (1): [5] 2025/04/30 11:58:35 server updated RTT: 34.122328ms (σ: 17.061164ms) 2025/04/30 11:58:35 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:35 server coalesced packet has different destination connection ID: 00000000, expected bae97c58 2025/04/30 11:58:35 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:58:35 server -> Sending packet 3 (194 bytes) for connection be0ef231604744b0, Handshake 2025/04/30 11:58:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bae97c58, PacketNumber: 3, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:35 server -> Sending packet 4 (194 bytes) for connection be0ef231604744b0, Handshake 2025/04/30 11:58:35 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bae97c58, PacketNumber: 4, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:35 server -> Sending packet 7 (44 bytes) for connection be0ef231604744b0, Initial 2025/04/30 11:58:35 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bae97c58, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 11:58:35 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server <- Reading packet 0 (74 bytes) for connection bae97c58, Handshake 2025/04/30 11:58:35 server Long Header{Type: Handshake, DestConnectionID: bae97c58, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:58:35 server Dropping Initial keys. 2025/04/30 11:58:35 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 464µs} 2025/04/30 11:58:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:35 Retiring connection ID be0ef231604744b0 in 5s. 2025/04/30 11:58:35 server Dropping Handshake keys. 2025/04/30 11:58:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:35 server -> Sending packet 2 (371 bytes) for connection be0ef231604744b0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d2a15f46, StatelessResetToken: 0xb248e53830aededace5a9a6178cba6b3} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0b5eb016, StatelessResetToken: 0x9fa144163c9ea304c4e8e4bb6ad71267} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58579434, StatelessResetToken: 0x1fa0e6a9844330db764ce33ea4d2dd77} 2025/04/30 11:58:35 server -> &wire.NewTokenFrame{Token: 0xe5d213374c7da89d306b90e472a15ea1d9e284402c97e7b76613c1a7c5e1559633fcb027c5181205887c4422b62c847510ca595ee4968261bfb0e37ac8f500fb799002ca213070665698a98d06392deecabd2b6d50b9} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c2ae70f1, StatelessResetToken: 0xe7e035cb12debf7876e921358f472aee} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: abb59e53, StatelessResetToken: 0x9725183a2b72469e83bece553b374c8d} 2025/04/30 11:58:35 server -> Sending packet 3 (371 bytes) for connection be0ef231604744b0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.NewTokenFrame{Token: 0xe5d213374c7da89d306b90e472a15ea1d9e284402c97e7b76613c1a7c5e1559633fcb027c5181205887c4422b62c847510ca595ee4968261bfb0e37ac8f500fb799002ca213070665698a98d06392deecabd2b6d50b9} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: abb59e53, StatelessResetToken: 0x9725183a2b72469e83bece553b374c8d} 2025/04/30 11:58:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d2a15f46, StatelessResetToken: 0xb248e53830aededace5a9a6178cba6b3} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0b5eb016, StatelessResetToken: 0x9fa144163c9ea304c4e8e4bb6ad71267} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58579434, StatelessResetToken: 0x1fa0e6a9844330db764ce33ea4d2dd77} 2025/04/30 11:58:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c2ae70f1, StatelessResetToken: 0xe7e035cb12debf7876e921358f472aee} 2025/04/30 11:58:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:35 server <- Reading packet 0 (42 bytes) for connection bae97c58, 1-RTT 2025/04/30 11:58:35 server Short Header{DestConnectionID: bae97c58, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:35 server -> Sending packet 4 (24 bytes) for connection be0ef231604744b0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 183.398µs} 2025/04/30 11:58:35 Received request: GET /sjednxhdsz 2025/04/30 11:58:35 server Skipping packet number 5 2025/04/30 11:58:35 server -> Sending packet 6 (1045 bytes) for connection be0ef231604744b0, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:35 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:35 server Skipping packet number 5 2025/04/30 11:58:35 server <- Reading packet 2 (32 bytes) for connection bae97c58, 1-RTT 2025/04/30 11:58:35 server Short Header{DestConnectionID: bae97c58, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:35 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server newly acked packets (2): [3 6] 2025/04/30 11:58:35 server updated RTT: 33.92ms (σ: 13.198ms) 2025/04/30 11:58:35 server ECN capability confirmed. 2025/04/30 11:58:35 server Canceling loss detection timer. 2025/04/30 11:58:35 server <- Reading packet 3 (43 bytes) for connection bae97c58, 1-RTT 2025/04/30 11:58:35 server Short Header{DestConnectionID: bae97c58, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:35 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 240µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:35 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:35 Replacing connection for connection IDs [d2a15f46 bae97c58 0b5eb016 abb59e53 58579434 c2ae70f1] with a closed connection. 2025/04/30 11:58:35 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:35 server Connection be0ef231604744b0 closed. 2025/04/30 11:58:36 server <- Received Initial packet. 2025/04/30 11:58:36 Created qlog file: /logs/qlog/c24a193453a898bb.sqlog 2025/04/30 11:58:36 server Changing connection ID to a1f9128e. 2025/04/30 11:58:36 Adding connection IDs c24a193453a898bb and a1f9128e for a new connection. 2025/04/30 11:58:36 server <- Reading packet 0 (1252 bytes) for connection c24a193453a898bb, Initial 2025/04/30 11:58:36 server Long Header{Type: Initial, DestConnectionID: c24a193453a898bb, SrcConnectionID: (empty), Token: 0xe5d213374c7da89d306b90e472a15ea1d9e284402c97e7b76613c1a7c5e1559633fcb027c5181205887c4422b62c847510ca595ee4968261bfb0e37ac8f500fb799002ca213070665698a98d06392deecabd2b6d50b9, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:36 server -> Sending packet 0 (40 bytes) for connection c24a193453a898bb, Initial 2025/04/30 11:58:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a1f9128e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:36 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:36 server Parsed a coalesced packet. Part 1: 704 bytes. Remaining: 548 bytes. 2025/04/30 11:58:36 server <- Reading packet 3 (704 bytes) for connection a1f9128e, Initial 2025/04/30 11:58:36 server Long Header{Type: Initial, DestConnectionID: a1f9128e, SrcConnectionID: (empty), Token: 0xe5d213374c7da89d306b90e472a15ea1d9e284402c97e7b76613c1a7c5e1559633fcb027c5181205887c4422b62c847510ca595ee4968261bfb0e37ac8f500fb799002ca213070665698a98d06392deecabd2b6d50b9, PacketNumber: 3, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:36 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:36 Adding connection ID 0a405cbe. 2025/04/30 11:58:36 Adding connection ID f22ca132. 2025/04/30 11:58:36 Adding connection ID 9080f027. 2025/04/30 11:58:36 Adding connection ID 9de98d17. 2025/04/30 11:58:36 Adding connection ID 09ceafcb. 2025/04/30 11:58:36 server coalesced packet has different destination connection ID: 00000000, expected a1f9128e 2025/04/30 11:58:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c24a193453a898bb 2025/04/30 11:58:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a1f9128e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 933, Version: v1} 2025/04/30 11:58:36 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a1f9128e, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:36 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f22ca132, StatelessResetToken: 0x5d87b2d724a235e058968e44e33c9c37} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a405cbe, StatelessResetToken: 0x50912f07a36d7f4fa2340efb5e145f9a} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 09ceafcb, StatelessResetToken: 0xc96f36f81c0e81d1bedcbdf11d145d22} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9de98d17, StatelessResetToken: 0x0f65560e212a0e46479efd4390cedfdd} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9080f027, StatelessResetToken: 0xa934e585b92a9e8e34b871b7e3cc127b} 2025/04/30 11:58:36 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:36 server -> Sending packet 2 (1280 bytes) for connection c24a193453a898bb, Initial 2025/04/30 11:58:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a1f9128e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:36 server -> Sending packet 3 (1280 bytes) for connection c24a193453a898bb, Initial 2025/04/30 11:58:36 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a1f9128e, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:36 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:36 server -> Sending packet 1 (194 bytes) for connection c24a193453a898bb, Handshake 2025/04/30 11:58:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a1f9128e, PacketNumber: 1, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:36 server -> Sending packet 2 (194 bytes) for connection c24a193453a898bb, Handshake 2025/04/30 11:58:36 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a1f9128e, PacketNumber: 2, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 11:58:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 11:58:36 server <- Reading packet 0 (74 bytes) for connection a1f9128e, Handshake 2025/04/30 11:58:36 server Long Header{Type: Handshake, DestConnectionID: a1f9128e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 11:58:36 server Dropping Initial keys. 2025/04/30 11:58:36 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 464µs} 2025/04/30 11:58:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:36 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:36 Retiring connection ID c24a193453a898bb in 5s. 2025/04/30 11:58:36 server Dropping Handshake keys. 2025/04/30 11:58:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:36 server -> Sending packet 2 (371 bytes) for connection c24a193453a898bb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:36 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f22ca132, StatelessResetToken: 0x5d87b2d724a235e058968e44e33c9c37} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9080f027, StatelessResetToken: 0xa934e585b92a9e8e34b871b7e3cc127b} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 09ceafcb, StatelessResetToken: 0xc96f36f81c0e81d1bedcbdf11d145d22} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a405cbe, StatelessResetToken: 0x50912f07a36d7f4fa2340efb5e145f9a} 2025/04/30 11:58:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:36 server -> &wire.NewTokenFrame{Token: 0x610e30335a46ca887c05d9e604753c1aedab85a54d54301c431a59b09db420de99754c4d4cdcd1f77f124ed55649b36b9a17d4ab5ff2f382f4a9dd4056693f4643e41227c113d37d8bf824d8cf7beb8c2b5bdca01b8b} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9de98d17, StatelessResetToken: 0x0f65560e212a0e46479efd4390cedfdd} 2025/04/30 11:58:36 server -> Sending packet 3 (371 bytes) for connection c24a193453a898bb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:36 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f22ca132, StatelessResetToken: 0x5d87b2d724a235e058968e44e33c9c37} 2025/04/30 11:58:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9080f027, StatelessResetToken: 0xa934e585b92a9e8e34b871b7e3cc127b} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0a405cbe, StatelessResetToken: 0x50912f07a36d7f4fa2340efb5e145f9a} 2025/04/30 11:58:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9de98d17, StatelessResetToken: 0x0f65560e212a0e46479efd4390cedfdd} 2025/04/30 11:58:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 09ceafcb, StatelessResetToken: 0xc96f36f81c0e81d1bedcbdf11d145d22} 2025/04/30 11:58:36 server -> &wire.NewTokenFrame{Token: 0x610e30335a46ca887c05d9e604753c1aedab85a54d54301c431a59b09db420de99754c4d4cdcd1f77f124ed55649b36b9a17d4ab5ff2f382f4a9dd4056693f4643e41227c113d37d8bf824d8cf7beb8c2b5bdca01b8b} 2025/04/30 11:58:36 server <- Reading packet 1 (1352 bytes) for connection a1f9128e, 1-RTT 2025/04/30 11:58:36 server Short Header{DestConnectionID: a1f9128e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:36 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 368µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:36 server <- &wire.PingFrame{} 2025/04/30 11:58:36 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:36 server -> Sending packet 4 (27 bytes) for connection c24a193453a898bb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:36 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:36 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 164.91µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:36 server <- Reading packet 3 (31 bytes) for connection a1f9128e, 1-RTT 2025/04/30 11:58:36 server Short Header{DestConnectionID: a1f9128e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:36 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 21.288ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:36 server newly acked packets (1): [3] 2025/04/30 11:58:36 server updated RTT: 52.969201ms (σ: 26.4846ms) 2025/04/30 11:58:36 server ECN capability confirmed. 2025/04/30 11:58:36 server Canceling loss detection timer. 2025/04/30 11:58:36 Removing connection ID 70f0c68b220327dc after it has been retired. 2025/04/30 11:58:36 server <- Reading packet 5 (42 bytes) for connection a1f9128e, 1-RTT 2025/04/30 11:58:36 server Short Header{DestConnectionID: a1f9128e, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:36 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:58:36 server <- Reading packet 6 (25 bytes) for connection a1f9128e, 1-RTT 2025/04/30 11:58:36 server Short Header{DestConnectionID: a1f9128e, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:36 server <- &wire.PingFrame{} 2025/04/30 11:58:36 Received request: GET /dptkwzfcgd 2025/04/30 11:58:36 server -> Sending packet 5 (31 bytes) for connection c24a193453a898bb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:36 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:36 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 228.538µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:36 server -> Sending packet 6 (1045 bytes) for connection c24a193453a898bb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:36 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:36 server <- Reading packet 7 (32 bytes) for connection a1f9128e, 1-RTT 2025/04/30 11:58:36 server Short Header{DestConnectionID: a1f9128e, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:36 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 104µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:36 server newly acked packets (1): [6] 2025/04/30 11:58:36 server updated RTT: 50.339ms (σ: 25.121ms) 2025/04/30 11:58:36 server Canceling loss detection timer. 2025/04/30 11:58:36 server <- Reading packet 8 (43 bytes) for connection a1f9128e, 1-RTT 2025/04/30 11:58:36 server Short Header{DestConnectionID: a1f9128e, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:36 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 296µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:36 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:36 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:36 Replacing connection for connection IDs [09ceafcb a1f9128e 0a405cbe f22ca132 9080f027 9de98d17] with a closed connection. 2025/04/30 11:58:36 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:36 server Connection c24a193453a898bb closed. 2025/04/30 11:58:36 Removing connection IDs [30ef7f51 700f77a5 c7c1638e 7d843973 ebc1a981 08f13bcf] for a closed connection after it has been retired. 2025/04/30 11:58:37 server <- Received Initial packet. 2025/04/30 11:58:37 Created qlog file: /logs/qlog/acc22131312519f9.sqlog 2025/04/30 11:58:37 server Changing connection ID to f0b5dcb8. 2025/04/30 11:58:37 Adding connection IDs acc22131312519f9 and f0b5dcb8 for a new connection. 2025/04/30 11:58:37 server <- Reading packet 0 (1252 bytes) for connection acc22131312519f9, Initial 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: acc22131312519f9, SrcConnectionID: (empty), Token: 0x610e30335a46ca887c05d9e604753c1aedab85a54d54301c431a59b09db420de99754c4d4cdcd1f77f124ed55649b36b9a17d4ab5ff2f382f4a9dd4056693f4643e41227c113d37d8bf824d8cf7beb8c2b5bdca01b8b, PacketNumber: 0, PacketNumberLen: 1, Length: 1147, Version: v1} 2025/04/30 11:58:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 1126, Offset + Data length: 1126} 2025/04/30 11:58:37 server -> Sending packet 0 (40 bytes) for connection acc22131312519f9, Initial 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0b5dcb8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server Parsed a coalesced packet. Part 1: 708 bytes. Remaining: 544 bytes. 2025/04/30 11:58:37 server <- Reading packet 1 (708 bytes) for connection acc22131312519f9, Initial 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: acc22131312519f9, SrcConnectionID: (empty), Token: 0x610e30335a46ca887c05d9e604753c1aedab85a54d54301c431a59b09db420de99754c4d4cdcd1f77f124ed55649b36b9a17d4ab5ff2f382f4a9dd4056693f4643e41227c113d37d8bf824d8cf7beb8c2b5bdca01b8b, PacketNumber: 1, PacketNumberLen: 1, Length: 603, Version: v1} 2025/04/30 11:58:37 server <- &wire.CryptoFrame{Offset: 1126, Data length: 581, Offset + Data length: 1707} 2025/04/30 11:58:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:37 Adding connection ID 03087f15. 2025/04/30 11:58:37 Adding connection ID 75d74045. 2025/04/30 11:58:37 Adding connection ID 1067c0b2. 2025/04/30 11:58:37 Adding connection ID 5b342f11. 2025/04/30 11:58:37 Adding connection ID 50eab394. 2025/04/30 11:58:37 server coalesced packet has different destination connection ID: 00000000, expected acc22131312519f9 2025/04/30 11:58:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection acc22131312519f9 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0b5dcb8, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 940, Version: v1} 2025/04/30 11:58:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0b5dcb8, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 50eab394, StatelessResetToken: 0x9482ce82d3d704ec1476f1887059a8b5} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d74045, StatelessResetToken: 0xab940a8dbd2fffa59bb330fd160e3f48} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03087f15, StatelessResetToken: 0xaf28edd0086691adaa2cec3ed9a19079} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b342f11, StatelessResetToken: 0x3edae38959e7bc5e1c26f27af413590d} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1067c0b2, StatelessResetToken: 0x01743b1330e14d4d0214a6a032cabe43} 2025/04/30 11:58:37 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:58:37 server -> Sending packet 2 (1280 bytes) for connection acc22131312519f9, Initial 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0b5dcb8, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:37 server -> Sending packet 3 (1280 bytes) for connection acc22131312519f9, Initial 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0b5dcb8, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:37 server Parsed a coalesced packet. Part 1: 123 bytes. Remaining: 1129 bytes. 2025/04/30 11:58:37 server <- Reading packet 2 (123 bytes) for connection f0b5dcb8, Initial 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: f0b5dcb8, SrcConnectionID: (empty), Token: 0x610e30335a46ca887c05d9e604753c1aedab85a54d54301c431a59b09db420de99754c4d4cdcd1f77f124ed55649b36b9a17d4ab5ff2f382f4a9dd4056693f4643e41227c113d37d8bf824d8cf7beb8c2b5bdca01b8b, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 11:58:37 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 504µs} 2025/04/30 11:58:37 server coalesced packet has different destination connection ID: 00000000, expected f0b5dcb8 2025/04/30 11:58:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:58:37 server -> Sending packet 1 (187 bytes) for connection acc22131312519f9, Handshake 2025/04/30 11:58:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0b5dcb8, PacketNumber: 1, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:37 server -> Sending packet 2 (187 bytes) for connection acc22131312519f9, Handshake 2025/04/30 11:58:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f0b5dcb8, PacketNumber: 2, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 11:58:37 server Parsed a coalesced packet. Part 1: 700 bytes. Remaining: 552 bytes. 2025/04/30 11:58:37 server <- Reading packet 4 (700 bytes) for connection f0b5dcb8, Initial 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: f0b5dcb8, SrcConnectionID: (empty), Token: 0x610e30335a46ca887c05d9e604753c1aedab85a54d54301c431a59b09db420de99754c4d4cdcd1f77f124ed55649b36b9a17d4ab5ff2f382f4a9dd4056693f4643e41227c113d37d8bf824d8cf7beb8c2b5bdca01b8b, PacketNumber: 4, PacketNumberLen: 1, Length: 599, Version: v1} 2025/04/30 11:58:37 server <- &wire.CryptoFrame{Offset: 1130, Data length: 577, Offset + Data length: 1707} 2025/04/30 11:58:37 server coalesced packet has different destination connection ID: 00000000, expected f0b5dcb8 2025/04/30 11:58:37 server -> Sending packet 4 (42 bytes) for connection acc22131312519f9, Initial 2025/04/30 11:58:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f0b5dcb8, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 11:58:37 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server <- Reading packet 0 (75 bytes) for connection f0b5dcb8, Handshake 2025/04/30 11:58:37 server Long Header{Type: Handshake, DestConnectionID: f0b5dcb8, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:37 server Dropping Initial keys. 2025/04/30 11:58:37 Removing connection ID 97edd1dd5ab8a17b after it has been retired. 2025/04/30 11:58:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 560µs} 2025/04/30 11:58:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:37 Retiring connection ID acc22131312519f9 in 5s. 2025/04/30 11:58:37 server Dropping Handshake keys. 2025/04/30 11:58:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:37 server -> Sending packet 2 (371 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.NewTokenFrame{Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 50eab394, StatelessResetToken: 0x9482ce82d3d704ec1476f1887059a8b5} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d74045, StatelessResetToken: 0xab940a8dbd2fffa59bb330fd160e3f48} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03087f15, StatelessResetToken: 0xaf28edd0086691adaa2cec3ed9a19079} 2025/04/30 11:58:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1067c0b2, StatelessResetToken: 0x01743b1330e14d4d0214a6a032cabe43} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b342f11, StatelessResetToken: 0x3edae38959e7bc5e1c26f27af413590d} 2025/04/30 11:58:37 server -> Sending packet 3 (371 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1067c0b2, StatelessResetToken: 0x01743b1330e14d4d0214a6a032cabe43} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b342f11, StatelessResetToken: 0x3edae38959e7bc5e1c26f27af413590d} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03087f15, StatelessResetToken: 0xaf28edd0086691adaa2cec3ed9a19079} 2025/04/30 11:58:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:37 server -> &wire.NewTokenFrame{Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 50eab394, StatelessResetToken: 0x9482ce82d3d704ec1476f1887059a8b5} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d74045, StatelessResetToken: 0xab940a8dbd2fffa59bb330fd160e3f48} 2025/04/30 11:58:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:58:37 server -> Sending packet 5 (371 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d74045, StatelessResetToken: 0xab940a8dbd2fffa59bb330fd160e3f48} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03087f15, StatelessResetToken: 0xaf28edd0086691adaa2cec3ed9a19079} 2025/04/30 11:58:37 server -> &wire.NewTokenFrame{Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 50eab394, StatelessResetToken: 0x9482ce82d3d704ec1476f1887059a8b5} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1067c0b2, StatelessResetToken: 0x01743b1330e14d4d0214a6a032cabe43} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b342f11, StatelessResetToken: 0x3edae38959e7bc5e1c26f27af413590d} 2025/04/30 11:58:37 server -> Sending packet 6 (371 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03087f15, StatelessResetToken: 0xaf28edd0086691adaa2cec3ed9a19079} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b342f11, StatelessResetToken: 0x3edae38959e7bc5e1c26f27af413590d} 2025/04/30 11:58:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 50eab394, StatelessResetToken: 0x9482ce82d3d704ec1476f1887059a8b5} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d74045, StatelessResetToken: 0xab940a8dbd2fffa59bb330fd160e3f48} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1067c0b2, StatelessResetToken: 0x01743b1330e14d4d0214a6a032cabe43} 2025/04/30 11:58:37 server -> &wire.NewTokenFrame{Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15} 2025/04/30 11:58:37 Removing connection IDs [84d5adbd b66b8e30 f104f36e d938e29a 75ddfc1e 70e78cb5] for a closed connection after it has been retired. 2025/04/30 11:58:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:58:37 server -> Sending packet 8 (371 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03087f15, StatelessResetToken: 0xaf28edd0086691adaa2cec3ed9a19079} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 50eab394, StatelessResetToken: 0x9482ce82d3d704ec1476f1887059a8b5} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1067c0b2, StatelessResetToken: 0x01743b1330e14d4d0214a6a032cabe43} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d74045, StatelessResetToken: 0xab940a8dbd2fffa59bb330fd160e3f48} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b342f11, StatelessResetToken: 0x3edae38959e7bc5e1c26f27af413590d} 2025/04/30 11:58:37 server -> &wire.NewTokenFrame{Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15} 2025/04/30 11:58:37 server -> Sending packet 9 (371 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b342f11, StatelessResetToken: 0x3edae38959e7bc5e1c26f27af413590d} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d74045, StatelessResetToken: 0xab940a8dbd2fffa59bb330fd160e3f48} 2025/04/30 11:58:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 50eab394, StatelessResetToken: 0x9482ce82d3d704ec1476f1887059a8b5} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1067c0b2, StatelessResetToken: 0x01743b1330e14d4d0214a6a032cabe43} 2025/04/30 11:58:37 server -> &wire.NewTokenFrame{Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03087f15, StatelessResetToken: 0xaf28edd0086691adaa2cec3ed9a19079} 2025/04/30 11:58:37 server -> Sending packet 10 (1366 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.PingFrame{} 2025/04/30 11:58:37 server <- Reading packet 2 (1392 bytes) for connection f0b5dcb8, 1-RTT 2025/04/30 11:58:37 server Short Header{DestConnectionID: f0b5dcb8, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:37 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 2, Smallest: 2}}, DelayTime: 128µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server <- &wire.PingFrame{} 2025/04/30 11:58:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:37 server <- Reading packet 3 (34 bytes) for connection f0b5dcb8, 1-RTT 2025/04/30 11:58:37 server Short Header{DestConnectionID: f0b5dcb8, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:37 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 2, Smallest: 2}}, DelayTime: 88µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server newly acked packets (1): [10] 2025/04/30 11:58:37 server updated RTT: 32.603974ms (σ: 16.301987ms) 2025/04/30 11:58:37 server ECN capability confirmed. 2025/04/30 11:58:37 server setting loss timer for packet 9 (1-RTT) to 36.67947ms (in 2025-04-30 11:58:37.551230407 +0000 UTC m=+41.920111133) 2025/04/30 11:58:37 server -> Sending packet 11 (27 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 214.622µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 11:58:37.551230407 +0000 UTC m=+41.920111133 2025/04/30 11:58:37 server lost packet 9 (time threshold) 2025/04/30 11:58:37 server Canceling loss detection timer. 2025/04/30 11:58:37 server -> Sending packet 12 (371 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 50eab394, StatelessResetToken: 0x9482ce82d3d704ec1476f1887059a8b5} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03087f15, StatelessResetToken: 0xaf28edd0086691adaa2cec3ed9a19079} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d74045, StatelessResetToken: 0xab940a8dbd2fffa59bb330fd160e3f48} 2025/04/30 11:58:37 server -> &wire.NewTokenFrame{Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15} 2025/04/30 11:58:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1067c0b2, StatelessResetToken: 0x01743b1330e14d4d0214a6a032cabe43} 2025/04/30 11:58:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5b342f11, StatelessResetToken: 0x3edae38959e7bc5e1c26f27af413590d} 2025/04/30 11:58:37 server <- Reading packet 4 (1444 bytes) for connection f0b5dcb8, 1-RTT 2025/04/30 11:58:37 server Short Header{DestConnectionID: f0b5dcb8, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:37 server <- &wire.PingFrame{} 2025/04/30 11:58:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:37 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:58:37 Received request: GET /codqxubcbo 2025/04/30 11:58:37 server -> Sending packet 13 (1053 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 296.362µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:37 server <- Reading packet 6 (31 bytes) for connection f0b5dcb8, 1-RTT 2025/04/30 11:58:37 server Short Header{DestConnectionID: f0b5dcb8, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:37 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 10, DelayTime: 21.304ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server newly acked packets (1): [12] 2025/04/30 11:58:37 server updated RTT: 35.067ms (σ: 17.154ms) 2025/04/30 11:58:37 Tracking 49 connection IDs and 0 reset tokens. 2025/04/30 11:58:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:58:37 server -> Sending packet 15 (1045 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:37 server -> Sending packet 16 (1045 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:37 server -> Sending packet 17 (1409 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.PingFrame{} 2025/04/30 11:58:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:58:37 server -> Sending packet 19 (1045 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:37 server -> Sending packet 20 (1045 bytes) for connection acc22131312519f9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:37 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:37 server <- Reading packet 9 (44 bytes) for connection f0b5dcb8, 1-RTT 2025/04/30 11:58:37 server Short Header{DestConnectionID: f0b5dcb8, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:37 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 10, DelayTime: 371.856ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:58:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:37 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:37 Replacing connection for connection IDs [75d74045 1067c0b2 5b342f11 50eab394 f0b5dcb8 03087f15] with a closed connection. 2025/04/30 11:58:37 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:37 server Connection acc22131312519f9 closed. 2025/04/30 11:58:37 Removing connection ID 27ba16c7322ac863 after it has been retired. 2025/04/30 11:58:38 Removing connection IDs [71052671 0e2ef84d e75a770a 4923807e 9df1c96f d7dda16b] for a closed connection after it has been retired. 2025/04/30 11:58:38 Removing connection ID 2da02d3240668476 after it has been retired. 2025/04/30 11:58:38 server <- Received Initial packet. 2025/04/30 11:58:38 Created qlog file: /logs/qlog/c596338713908b62ab3ddb0be2c404ea85.sqlog 2025/04/30 11:58:38 server Changing connection ID to 937ba007. 2025/04/30 11:58:38 Adding connection IDs c596338713908b62ab3ddb0be2c404ea85 and 937ba007 for a new connection. 2025/04/30 11:58:38 server Parsed a coalesced packet. Part 1: 726 bytes. Remaining: 526 bytes. 2025/04/30 11:58:38 server <- Reading packet 1 (726 bytes) for connection c596338713908b62ab3ddb0be2c404ea85, Initial 2025/04/30 11:58:38 server Long Header{Type: Initial, DestConnectionID: c596338713908b62ab3ddb0be2c404ea85, SrcConnectionID: (empty), Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15, PacketNumber: 1, PacketNumberLen: 1, Length: 612, Version: v1} 2025/04/30 11:58:38 server <- &wire.CryptoFrame{Offset: 1117, Data length: 590, Offset + Data length: 1707} 2025/04/30 11:58:38 server coalesced packet has different destination connection ID: 00000000, expected c596338713908b62ab3ddb0be2c404ea85 2025/04/30 11:58:38 server -> Sending packet 0 (40 bytes) for connection c596338713908b62ab3ddb0be2c404ea85, Initial 2025/04/30 11:58:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 937ba007, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:38 Removing connection IDs [60561f25 4b590e7a 309886d2 9223469f 2ad9bb95 e613bec3] for a closed connection after it has been retired. 2025/04/30 11:58:38 server <- Reading packet 2 (1252 bytes) for connection c596338713908b62ab3ddb0be2c404ea85, Initial 2025/04/30 11:58:38 server Long Header{Type: Initial, DestConnectionID: c596338713908b62ab3ddb0be2c404ea85, SrcConnectionID: (empty), Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15, PacketNumber: 2, PacketNumberLen: 1, Length: 1138, Version: v1} 2025/04/30 11:58:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 1117, Offset + Data length: 1117} 2025/04/30 11:58:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:58:38 Adding connection ID c1c4d537. 2025/04/30 11:58:38 Adding connection ID f9059e26. 2025/04/30 11:58:38 Adding connection ID 9ed17808. 2025/04/30 11:58:38 Adding connection ID 70e34a9c. 2025/04/30 11:58:38 Adding connection ID fae2b8c4. 2025/04/30 11:58:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c596338713908b62ab3ddb0be2c404ea85 2025/04/30 11:58:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 937ba007, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 924, Version: v1} 2025/04/30 11:58:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:58:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 96, Offset + Data length: 96} 2025/04/30 11:58:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 937ba007, PacketNumber: 0, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 11:58:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 168, Offset + Data length: 168} 2025/04/30 11:58:38 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9ed17808, StatelessResetToken: 0x1407c9b218338ad4b612caf93e751bd0} 2025/04/30 11:58:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c1c4d537, StatelessResetToken: 0x22dc7ed3e423a9fe845a355f7bad0a4b} 2025/04/30 11:58:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f9059e26, StatelessResetToken: 0x52023a88d64f6cafecb7f0246d76866e} 2025/04/30 11:58:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: fae2b8c4, StatelessResetToken: 0x9902c3cecf76913885b9cf21d0aa545e} 2025/04/30 11:58:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70e34a9c, StatelessResetToken: 0x160b5ceb764eb5fb8705f4306ba75f87} 2025/04/30 11:58:38 server Parsed a coalesced packet. Part 1: 726 bytes. Remaining: 526 bytes. 2025/04/30 11:58:38 server <- Reading packet 3 (726 bytes) for connection c596338713908b62ab3ddb0be2c404ea85, Initial 2025/04/30 11:58:38 server Long Header{Type: Initial, DestConnectionID: c596338713908b62ab3ddb0be2c404ea85, SrcConnectionID: (empty), Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15, PacketNumber: 3, PacketNumberLen: 1, Length: 612, Version: v1} 2025/04/30 11:58:38 server <- &wire.CryptoFrame{Offset: 1117, Data length: 590, Offset + Data length: 1707} 2025/04/30 11:58:38 server coalesced packet has different destination connection ID: 00000000, expected c596338713908b62ab3ddb0be2c404ea85 2025/04/30 11:58:38 server -> Sending packet 2 (40 bytes) for connection c596338713908b62ab3ddb0be2c404ea85, Initial 2025/04/30 11:58:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 937ba007, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:58:38 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:38 server Parsed a coalesced packet. Part 1: 124 bytes. Remaining: 75 bytes. 2025/04/30 11:58:38 server <- Reading packet 4 (124 bytes) for connection 937ba007, Initial 2025/04/30 11:58:38 server Long Header{Type: Initial, DestConnectionID: 937ba007, SrcConnectionID: (empty), Token: 0xb0876351361d7abd361dba83be2621da4114df8a7dc33518c4470221f68aac30b980ca659e0b40d3be16a3352011fd6a2097a70e28c8940bc39956ed9f2ef3e7ea7638f04b1a81b6e878de52565cb9968161be10db15, PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:58:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1ms} 2025/04/30 11:58:38 server newly acked packets (1): [1] 2025/04/30 11:58:38 server updated RTT: 33.007987ms (σ: 16.503993ms) 2025/04/30 11:58:38 server Parsed a coalesced packet. Part 2: 75 bytes. Remaining: 0 bytes. 2025/04/30 11:58:38 server <- Reading packet 0 (75 bytes) for connection 937ba007, Handshake 2025/04/30 11:58:38 server Long Header{Type: Handshake, DestConnectionID: 937ba007, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 11:58:38 server Dropping Initial keys. 2025/04/30 11:58:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1ms} 2025/04/30 11:58:38 server newly acked packets (1): [0] 2025/04/30 11:58:38 server updated RTT: 33.007ms (σ: 12.377ms) 2025/04/30 11:58:38 server Canceling loss detection timer. 2025/04/30 11:58:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:58:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:58:38 Retiring connection ID c596338713908b62ab3ddb0be2c404ea85 in 5s. 2025/04/30 11:58:38 server Dropping Handshake keys. 2025/04/30 11:58:38 server <- Reading packet 0 (42 bytes) for connection 937ba007, 1-RTT 2025/04/30 11:58:38 server Short Header{DestConnectionID: 937ba007, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:58:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:58:38 server -> Sending packet 1 (259 bytes) for connection c596338713908b62ab3ddb0be2c404ea85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:38 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:38 Received request: GET /sgcqlfybiw 2025/04/30 11:58:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 347.42µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:58:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:58:38 server -> &wire.NewTokenFrame{Token: 0x9646ea5a3fa95e5faecacf6b9e3cc3efb40d75d7cfa8ccb3e74c6ddc9eac7d2ca60d97cba2f2480e63912633f149fb2cb34a88f66da3696604535b6db3434c3d5022a3df9a005e955f58cd24a295aab2244b9f36a875} 2025/04/30 11:58:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:58:38 server -> Sending packet 2 (1045 bytes) for connection c596338713908b62ab3ddb0be2c404ea85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:38 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:38 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:58:39 server -> Sending packet 3 (23 bytes) for connection c596338713908b62ab3ddb0be2c404ea85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:58:39 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:58:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:58:39 server <- Reading packet 4 (41 bytes) for connection 937ba007, 1-RTT 2025/04/30 11:58:39 server Short Header{DestConnectionID: 937ba007, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:58:39 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 128µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:58:39 server newly acked packets (4): [0 1 2 3] 2025/04/30 11:58:39 server updated RTT: 32.914ms (σ: 9.468ms) 2025/04/30 11:58:39 server ECN capability confirmed. 2025/04/30 11:58:39 server Canceling loss detection timer. 2025/04/30 11:58:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:58:39 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:39 Replacing connection for connection IDs [937ba007 c1c4d537 f9059e26 9ed17808 70e34a9c fae2b8c4] with a closed connection. 2025/04/30 11:58:39 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:58:39 server Connection c596338713908b62ab3ddb0be2c404ea85 closed. 2025/04/30 11:58:39 Removing connection ID 20202e802d737a17 after it has been retired. 2025/04/30 11:58:39 Removing connection IDs [57b29eeb 9c4f4bdb 31b0b784 be45db67 030af8d1 af75a472] for a closed connection after it has been retired. 2025/04/30 11:58:39 Tracking 35 connection IDs and 0 reset tokens. 2025/04/30 11:58:39 Removing connection ID 3437ce830ed168ae2f after it has been retired. 2025/04/30 11:58:40 Removing connection IDs [93ce33b0 2ce1596a 7022cc01 ac094c65 b4b40767 f1435ea4] for a closed connection after it has been retired. 2025/04/30 11:58:40 Removing connection ID be0ef231604744b0 after it has been retired. 2025/04/30 11:58:40 Removing connection IDs [d2a15f46 bae97c58 0b5eb016 abb59e53 58579434 c2ae70f1] for a closed connection after it has been retired. 2025/04/30 11:58:41 Removing connection ID c24a193453a898bb after it has been retired. 2025/04/30 11:58:41 Tracking 20 connection IDs and 0 reset tokens. 2025/04/30 11:58:41 Removing connection IDs [09ceafcb a1f9128e 0a405cbe f22ca132 9080f027 9de98d17] for a closed connection after it has been retired. 2025/04/30 11:58:42 Removing connection ID acc22131312519f9 after it has been retired. 2025/04/30 11:58:42 Removing connection IDs [75d74045 1067c0b2 5b342f11 50eab394 f0b5dcb8 03087f15] for a closed connection after it has been retired. 2025/04/30 11:58:43 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 11:58:44 Removing connection ID c596338713908b62ab3ddb0be2c404ea85 after it has been retired. 2025/04/30 11:58:44 Removing connection IDs [937ba007 c1c4d537 f9059e26 9ed17808 70e34a9c fae2b8c4] for a closed connection after it has been retired. 2025/04/30 11:58:45 Tracking 0 connection IDs and 0 reset tokens.