2025/04/30 11:54:14 Increased receive buffer size to 14336 kiB 2025/04/30 11:54:14 Increased send buffer size to 14336 kiB 2025/04/30 11:54:14 Setting DF for IPv4 and IPv6. 2025/04/30 11:54:14 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:54:14 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:54:14 server Listening for udp connections on [::]:443 2025/04/30 11:54:15 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:54:15 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:54:15 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:54:16 server <- Received Initial packet. 2025/04/30 11:54:16 Created qlog file: /logs/qlog/bab57fb96fd3e00a.sqlog 2025/04/30 11:54:16 server Changing connection ID to 19580223. 2025/04/30 11:54:16 Adding connection IDs bab57fb96fd3e00a and 19580223 for a new connection. 2025/04/30 11:54:16 server <- Received Initial packet. 2025/04/30 11:54:16 server <- Reading packet 0 (1252 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:16 server Long Header{Type: Initial, DestConnectionID: bab57fb96fd3e00a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:54:16 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:54:16 server -> Sending packet 0 (40 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:54:16 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:54:16 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:54:16 server <- Reading packet 1 (366 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:16 server Long Header{Type: Initial, DestConnectionID: bab57fb96fd3e00a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:54:16 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:54:16 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:54:16 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:54:16 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:54:16 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 0} 2025/04/30 11:54:16 Adding connection ID 36dbed8f. 2025/04/30 11:54:16 Adding connection ID 830b2503. 2025/04/30 11:54:16 Adding connection ID 173386c8. 2025/04/30 11:54:16 Adding connection ID fe556854. 2025/04/30 11:54:16 Adding connection ID ffb7c880. 2025/04/30 11:54:16 server coalesced packet has different destination connection ID: 00000000, expected bab57fb96fd3e00a 2025/04/30 11:54:16 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bab57fb96fd3e00a 2025/04/30 11:54:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 395, Version: v1} 2025/04/30 11:54:16 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:54:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:54:16 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19580223, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:54:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:54:16 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 173386c8, StatelessResetToken: 0xd459e0710eb5a1c8450e6cb24a9e8b59} 2025/04/30 11:54:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ffb7c880, StatelessResetToken: 0x14881e57991ea42b4d8cb08366fd5766} 2025/04/30 11:54:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36dbed8f, StatelessResetToken: 0x828e18c8859b24cea90945da7c2d1205} 2025/04/30 11:54:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 830b2503, StatelessResetToken: 0x002ee45205a0eaacd6daa372db03bde1} 2025/04/30 11:54:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fe556854, StatelessResetToken: 0x60653d576e52d4e30e7cf87c62ee4552} 2025/04/30 11:54:16 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:54:16 server -> Sending packet 2 (1280 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:54:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:54:16 server -> Sending packet 3 (1280 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:16 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:54:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:54:16 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 11:54:17 server <- Reading packet 2 (1252 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: bab57fb96fd3e00a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:54:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:54:17 server -> Sending packet 4 (40 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:54:17 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:54:17 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:54:17 server <- Reading packet 3 (366 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: bab57fb96fd3e00a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:54:17 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:54:17 server coalesced packet has different destination connection ID: 00000000, expected bab57fb96fd3e00a 2025/04/30 11:54:17 server -> Sending packet 5 (40 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:54:17 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:54:17 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:54:17 server -> Sending packet 1 (732 bytes) for connection bab57fb96fd3e00a, Handshake 2025/04/30 11:54:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19580223, PacketNumber: 1, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:54:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:54:17 server -> Sending packet 2 (732 bytes) for connection bab57fb96fd3e00a, Handshake 2025/04/30 11:54:17 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19580223, PacketNumber: 2, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:54:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:54:17 server <- Reading packet 4 (1252 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: bab57fb96fd3e00a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1234, Version: v1} 2025/04/30 11:54:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 1213, Offset + Data length: 1213} 2025/04/30 11:54:17 server -> Sending packet 6 (40 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:54:17 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:54:17 server Parsed a coalesced packet. Part 1: 366 bytes. Remaining: 886 bytes. 2025/04/30 11:54:17 server <- Reading packet 5 (366 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: bab57fb96fd3e00a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 348, Version: v1} 2025/04/30 11:54:17 server <- &wire.CryptoFrame{Offset: 1213, Data length: 326, Offset + Data length: 1539} 2025/04/30 11:54:17 server coalesced packet has different destination connection ID: 00000000, expected bab57fb96fd3e00a 2025/04/30 11:54:17 server -> Sending packet 7 (40 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 11:54:17 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:54:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:54:17 server -> Sending packet 8 (1280 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:54:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:54:17 server -> Sending packet 9 (1280 bytes) for connection bab57fb96fd3e00a, Initial 2025/04/30 11:54:17 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 19580223, Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:54:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:54:18 server Parsed a coalesced packet. Part 1: 37 bytes. Remaining: 36 bytes. 2025/04/30 11:54:18 server <- Reading packet 6 (37 bytes) for connection 19580223, Initial 2025/04/30 11:54:18 server Long Header{Type: Initial, DestConnectionID: 19580223, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:54:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.176ms} 2025/04/30 11:54:18 server Parsed a coalesced packet. Part 2: 36 bytes. Remaining: 0 bytes. 2025/04/30 11:54:18 server <- Reading packet 0 (36 bytes) for connection 19580223, Handshake 2025/04/30 11:54:18 server Long Header{Type: Handshake, DestConnectionID: 19580223, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 11:54:18 server Dropping Initial keys. 2025/04/30 11:54:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.176ms} 2025/04/30 11:54:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:54:18 server -> Sending packet 3 (732 bytes) for connection bab57fb96fd3e00a, Handshake 2025/04/30 11:54:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19580223, PacketNumber: 3, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:54:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:54:18 server -> Sending packet 4 (732 bytes) for connection bab57fb96fd3e00a, Handshake 2025/04/30 11:54:18 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 19580223, PacketNumber: 4, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 11:54:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 11:54:18 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/04/30 11:54:18 server <- Reading packet 1 (69 bytes) for connection 19580223, Handshake 2025/04/30 11:54:18 server Long Header{Type: Handshake, DestConnectionID: 19580223, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 11:54:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:54:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:54:18 Retiring connection ID bab57fb96fd3e00a in 5s. 2025/04/30 11:54:18 server Dropping Handshake keys. 2025/04/30 11:54:18 server <- Reading packet 0 (42 bytes) for connection 19580223, 1-RTT 2025/04/30 11:54:18 server Short Header{DestConnectionID: 19580223, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:54:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:54:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:54:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:54:18 Received request: GET /dshmwxhghd 2025/04/30 11:54:18 server -> Sending packet 2 (373 bytes) for connection bab57fb96fd3e00a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:54:18 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 235.33µs} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 173386c8, StatelessResetToken: 0xd459e0710eb5a1c8450e6cb24a9e8b59} 2025/04/30 11:54:18 server -> &wire.NewTokenFrame{Token: 0xc92b23f8e4dcf46229db13bdac1b2425f7927fac6396465f8aefa2784f946195420c5881efdcfc52e369b58c017a90e94efe1ef59c4e9c00e7c0ae5a082fa5f94f33aa83b53a2e919fd146066bb5b24d50149fceac76} 2025/04/30 11:54:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:54:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ffb7c880, StatelessResetToken: 0x14881e57991ea42b4d8cb08366fd5766} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 830b2503, StatelessResetToken: 0x002ee45205a0eaacd6daa372db03bde1} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36dbed8f, StatelessResetToken: 0x828e18c8859b24cea90945da7c2d1205} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fe556854, StatelessResetToken: 0x60653d576e52d4e30e7cf87c62ee4552} 2025/04/30 11:54:18 server -> Sending packet 3 (368 bytes) for connection bab57fb96fd3e00a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:54:18 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ffb7c880, StatelessResetToken: 0x14881e57991ea42b4d8cb08366fd5766} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fe556854, StatelessResetToken: 0x60653d576e52d4e30e7cf87c62ee4552} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 173386c8, StatelessResetToken: 0xd459e0710eb5a1c8450e6cb24a9e8b59} 2025/04/30 11:54:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:54:18 server -> &wire.NewTokenFrame{Token: 0xc92b23f8e4dcf46229db13bdac1b2425f7927fac6396465f8aefa2784f946195420c5881efdcfc52e369b58c017a90e94efe1ef59c4e9c00e7c0ae5a082fa5f94f33aa83b53a2e919fd146066bb5b24d50149fceac76} 2025/04/30 11:54:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 830b2503, StatelessResetToken: 0x002ee45205a0eaacd6daa372db03bde1} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36dbed8f, StatelessResetToken: 0x828e18c8859b24cea90945da7c2d1205} 2025/04/30 11:54:18 server -> Sending packet 4 (1366 bytes) for connection bab57fb96fd3e00a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:54:18 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:18 server -> &wire.PingFrame{} 2025/04/30 11:54:18 server -> Sending packet 5 (1045 bytes) for connection bab57fb96fd3e00a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:54:18 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:54:18 server <- Reading packet 1 (28 bytes) for connection 19580223, 1-RTT 2025/04/30 11:54:18 server Short Header{DestConnectionID: 19580223, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:54:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.984ms} 2025/04/30 11:54:18 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:54:18 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:54:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:54:18 server -> Sending packet 7 (368 bytes) for connection bab57fb96fd3e00a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:54:18 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:18 server -> &wire.NewTokenFrame{Token: 0xc92b23f8e4dcf46229db13bdac1b2425f7927fac6396465f8aefa2784f946195420c5881efdcfc52e369b58c017a90e94efe1ef59c4e9c00e7c0ae5a082fa5f94f33aa83b53a2e919fd146066bb5b24d50149fceac76} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fe556854, StatelessResetToken: 0x60653d576e52d4e30e7cf87c62ee4552} 2025/04/30 11:54:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 173386c8, StatelessResetToken: 0xd459e0710eb5a1c8450e6cb24a9e8b59} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 830b2503, StatelessResetToken: 0x002ee45205a0eaacd6daa372db03bde1} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ffb7c880, StatelessResetToken: 0x14881e57991ea42b4d8cb08366fd5766} 2025/04/30 11:54:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36dbed8f, StatelessResetToken: 0x828e18c8859b24cea90945da7c2d1205} 2025/04/30 11:54:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:54:18 server Skipping packet number 6 2025/04/30 11:54:18 server -> Sending packet 8 (1045 bytes) for connection bab57fb96fd3e00a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:54:18 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:54:18 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 11:54:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:54:19 server -> Sending packet 10 (368 bytes) for connection bab57fb96fd3e00a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:54:19 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:54:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36dbed8f, StatelessResetToken: 0x828e18c8859b24cea90945da7c2d1205} 2025/04/30 11:54:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fe556854, StatelessResetToken: 0x60653d576e52d4e30e7cf87c62ee4552} 2025/04/30 11:54:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 173386c8, StatelessResetToken: 0xd459e0710eb5a1c8450e6cb24a9e8b59} 2025/04/30 11:54:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ffb7c880, StatelessResetToken: 0x14881e57991ea42b4d8cb08366fd5766} 2025/04/30 11:54:19 server -> &wire.NewTokenFrame{Token: 0xc92b23f8e4dcf46229db13bdac1b2425f7927fac6396465f8aefa2784f946195420c5881efdcfc52e369b58c017a90e94efe1ef59c4e9c00e7c0ae5a082fa5f94f33aa83b53a2e919fd146066bb5b24d50149fceac76} 2025/04/30 11:54:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 830b2503, StatelessResetToken: 0x002ee45205a0eaacd6daa372db03bde1} 2025/04/30 11:54:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:54:19 server Skipping packet number 9 2025/04/30 11:54:19 server -> Sending packet 11 (1045 bytes) for connection bab57fb96fd3e00a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:54:19 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:54:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:54:19 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:54:19 server Dropping %!s(logging.PacketType=1) packet (74 bytes) because we already dropped the keys. 2025/04/30 11:54:19 server <- Reading packet 2 (1352 bytes) for connection 19580223, 1-RTT 2025/04/30 11:54:19 server Short Header{DestConnectionID: 19580223, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:54:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 312µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:54:19 server <- &wire.PingFrame{} 2025/04/30 11:54:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:54:19 server <- Reading packet 3 (32 bytes) for connection 19580223, 1-RTT 2025/04/30 11:54:19 server Short Header{DestConnectionID: 19580223, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:54:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 32µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:54:19 server newly acked packets (1): [4] 2025/04/30 11:54:19 server updated RTT: 1.503093269s (σ: 751.546634ms) 2025/04/30 11:54:19 server ECN capability confirmed. 2025/04/30 11:54:19 server <- Reading packet 4 (43 bytes) for connection 19580223, 1-RTT 2025/04/30 11:54:19 server Short Header{DestConnectionID: 19580223, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 11:54:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 144µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:54:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/04/30 11:54:19 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/04/30 11:54:19 Replacing connection for connection IDs [ffb7c880 19580223 36dbed8f 830b2503 173386c8 fe556854] with a closed connection. 2025/04/30 11:54:19 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/04/30 11:54:19 server Connection bab57fb96fd3e00a closed. 2025/04/30 11:54:20 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 11:54:22 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 11:54:23 Removing connection ID bab57fb96fd3e00a after it has been retired. 2025/04/30 11:54:24 Removing connection IDs [ffb7c880 19580223 36dbed8f 830b2503 173386c8 fe556854] for a closed connection after it has been retired. 2025/04/30 11:54:24 Tracking 0 connection IDs and 0 reset tokens.