2025/09/12 02:05:12 Increased receive buffer size to 14336 kiB 2025/09/12 02:05:12 Increased send buffer size to 14336 kiB 2025/09/12 02:05:12 Setting DF for IPv4 and IPv6. 2025/09/12 02:05:12 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:05:12 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:05:12 server Listening for udp connections on [::]:443 2025/09/12 02:05:12 server Client offered version 0x57414954, sending Version Negotiation 2025/09/12 02:05:13 server <- Received Initial packet. 2025/09/12 02:05:13 server <- Received Initial packet. 2025/09/12 02:05:13 server Long Header{Type: Initial, DestConnectionID: 38c426f76e78bee585fafaeef92ed3be11da1f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 0, Length: 1223, Version: v1} 2025/09/12 02:05:13 server Changing connection ID to be403000. 2025/09/12 02:05:13 server -> Sending Retry 2025/09/12 02:05:13 server Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: be403000, Token: 0xf564b39dfa290b895abc7000eb9235657afaaf3f52e85ce43a177dbd59149eaa53c35bf9bddb9f900266d63d1a77381ed69b9afd4bcd4f2c50625147760ab99bb8246ce4d173b9c22c0ea256810e807f1f6c4274f53506fa470be2d50e54b227c0c0d9d61ddbd6d1727999c69e43971f, Version: v1} 2025/09/12 02:05:13 server Long Header{Type: Initial, DestConnectionID: 38c426f76e78bee585fafaeef92ed3be11da1f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 0, Length: 360, Version: v1} 2025/09/12 02:05:13 server Changing connection ID to 179b9879. 2025/09/12 02:05:13 server -> Sending Retry 2025/09/12 02:05:13 server Long Header{Type: Retry, DestConnectionID: (empty), SrcConnectionID: 179b9879, Token: 0x75537e820744cb1485056f6f0cd090d21bc38af00e9846cc4d0885f11595ce18db14f2df983015969c3781188fa2018154f7c6cc30382de2715acc639e1d1ab5ff4694d4b3fcbd023648532569533ea27fa0b37cbb3a1564c4fe99e1c1202783183565fea37e781ad57f7d524e3c76a7, Version: v1} 2025/09/12 02:05:13 server <- Received Initial packet. 2025/09/12 02:05:13 Created qlog file: /logs/qlog/38c426f76e78bee585fafaeef92ed3be11da1f.sqlog 2025/09/12 02:05:13 server Changing connection ID to 56d9b057. 2025/09/12 02:05:13 Adding connection IDs be403000 and 56d9b057 for a new connection. 2025/09/12 02:05:13 server <- Reading packet 29 (1252 bytes) for connection be403000, Initial 2025/09/12 02:05:13 server Long Header{Type: Initial, DestConnectionID: be403000, SrcConnectionID: (empty), Token: 0xf564b39dfa290b895abc7000eb9235657afaaf3f52e85ce43a177dbd59149eaa53c35bf9bddb9f900266d63d1a77381ed69b9afd4bcd4f2c50625147760ab99bb8246ce4d173b9c22c0ea256810e807f1f6c4274f53506fa470be2d50e54b227c0c0d9d61ddbd6d1727999c69e43971f, PacketNumber: 29, PacketNumberLen: 1, Length: 1125, Version: v1} 2025/09/12 02:05:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 1104, Offset + Data length: 1104} 2025/09/12 02:05:13 server -> Sending packet 0 (37 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, Initial 2025/09/12 02:05:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56d9b057, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:05:13 server -> &wire.AckFrame{LargestAcked: 29, LowestAcked: 29, DelayTime: 0s} 2025/09/12 02:05:13 server Parsed a coalesced packet. Part 1: 585 bytes. Remaining: 667 bytes. 2025/09/12 02:05:13 server <- Reading packet 30 (585 bytes) for connection be403000, Initial 2025/09/12 02:05:13 server Long Header{Type: Initial, DestConnectionID: be403000, SrcConnectionID: (empty), Token: 0xf564b39dfa290b895abc7000eb9235657afaaf3f52e85ce43a177dbd59149eaa53c35bf9bddb9f900266d63d1a77381ed69b9afd4bcd4f2c50625147760ab99bb8246ce4d173b9c22c0ea256810e807f1f6c4274f53506fa470be2d50e54b227c0c0d9d61ddbd6d1727999c69e43971f, PacketNumber: 30, PacketNumberLen: 1, Length: 458, Version: v1} 2025/09/12 02:05:13 server <- &wire.CryptoFrame{Offset: 1104, Data length: 436, Offset + Data length: 1540} 2025/09/12 02:05:13 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:05:13 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:05:13 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:05:13 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 1048576, InitialMaxStreamDataBidiRemote: 1048576, InitialMaxStreamDataUni: 1048576, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 16, MaxUniStreamNum: 16, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 20ms, ActiveConnectionIDLimit: 8, MaxDatagramFrameSize: 1200, EnableResetStreamAt: false} 2025/09/12 02:05:13 Adding connection ID 8c301ac1. 2025/09/12 02:05:13 Adding connection ID a6bcbf17. 2025/09/12 02:05:13 Adding connection ID 6eb4c0c5. 2025/09/12 02:05:13 Adding connection ID f14ab331. 2025/09/12 02:05:13 Adding connection ID a67f3fa2. 2025/09/12 02:05:13 server coalesced packet has different destination connection ID: 00000000, expected be403000 2025/09/12 02:05:13 server -> Sending packet 1 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, Initial 2025/09/12 02:05:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 56d9b057, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:05:13 server -> &wire.AckFrame{LargestAcked: 30, LowestAcked: 29, DelayTime: 0s} 2025/09/12 02:05:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:05:13 server -> Sending packet 0 (903 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, Handshake 2025/09/12 02:05:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 56d9b057, PacketNumber: 0, PacketNumberLen: 2, Length: 751, Version: v1} 2025/09/12 02:05:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 729, Offset + Data length: 729} 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a67f3fa2, StatelessResetToken: 0x08ccdc3f8c8a13d00e300395b448ac6b} 2025/09/12 02:05:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c301ac1, StatelessResetToken: 0x16e84a2344aa76b64810156f8bf02a34} 2025/09/12 02:05:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6eb4c0c5, StatelessResetToken: 0x95e179b8e84ce1cfe213d4128906e71a} 2025/09/12 02:05:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f14ab331, StatelessResetToken: 0xf3d82b150294c0eb64b8fefb1f0b795b} 2025/09/12 02:05:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a6bcbf17, StatelessResetToken: 0xce31a8305ba617c6e54fb94289cfe522} 2025/09/12 02:05:13 server Parsed a coalesced packet. Part 1: 150 bytes. Remaining: 1102 bytes. 2025/09/12 02:05:13 server <- Reading packet 31 (150 bytes) for connection 56d9b057, Initial 2025/09/12 02:05:13 server Long Header{Type: Initial, DestConnectionID: 56d9b057, SrcConnectionID: (empty), Token: 0xf564b39dfa290b895abc7000eb9235657afaaf3f52e85ce43a177dbd59149eaa53c35bf9bddb9f900266d63d1a77381ed69b9afd4bcd4f2c50625147760ab99bb8246ce4d173b9c22c0ea256810e807f1f6c4274f53506fa470be2d50e54b227c0c0d9d61ddbd6d1727999c69e43971f, PacketNumber: 31, PacketNumberLen: 1, Length: 23, Version: v1} 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 592µs} 2025/09/12 02:05:13 server newly acked packets (1): [1] 2025/09/12 02:05:13 server updated RTT: 33.102489ms (σ: 16.551244ms) 2025/09/12 02:05:13 server coalesced packet has different destination connection ID: 00000000, expected 56d9b057 2025/09/12 02:05:13 server <- Reading packet 0 (36 bytes) for connection 56d9b057, Handshake 2025/09/12 02:05:13 server Long Header{Type: Handshake, DestConnectionID: 56d9b057, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 23, Version: v1} 2025/09/12 02:05:13 server Dropping Initial keys. 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 696µs} 2025/09/12 02:05:13 server newly acked packets (1): [0] 2025/09/12 02:05:13 server updated RTT: 33.098ms (σ: 12.419ms) 2025/09/12 02:05:13 server Canceling loss detection timer. 2025/09/12 02:05:13 server Parsed a coalesced packet. Part 1: 69 bytes. Remaining: 42 bytes. 2025/09/12 02:05:13 server <- Reading packet 1 (69 bytes) for connection 56d9b057, Handshake 2025/09/12 02:05:13 server Long Header{Type: Handshake, DestConnectionID: 56d9b057, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/09/12 02:05:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:05:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:05:13 server Dropping Handshake keys. 2025/09/12 02:05:13 server <- Reading packet 0 (42 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:05:13 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:05:13 server -> Sending packet 1 (293 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 177.781µs} 2025/09/12 02:05:13 server -> &wire.NewTokenFrame{Token: 0x6e095be6f98e6a8a26970d0f83d1561c4fc945579aa6137a094ccfe7a88152ea7a93b26c38345b9dde2c1a03b3bc2878c7a091e85c5a97e9993313cff1c0235d05b9745abb1ed943883ca6d842ba28e93b43680bf65233ebe59ef7} 2025/09/12 02:05:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:05:13 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:05:13 Received request: GET /amzbtqagpt 2025/09/12 02:05:13 server -> Sending packet 2 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1259, Offset + Data length: 1259} 2025/09/12 02:05:13 server -> Sending packet 3 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1259, Data length: 1257, Offset + Data length: 2516} 2025/09/12 02:05:13 server -> Sending packet 4 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2516, Data length: 1257, Offset + Data length: 3773} 2025/09/12 02:05:13 server -> Sending packet 5 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3773, Data length: 1257, Offset + Data length: 5030} 2025/09/12 02:05:13 server -> Sending packet 6 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 5030, Data length: 1257, Offset + Data length: 6287} 2025/09/12 02:05:13 server -> Sending packet 7 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 6287, Data length: 1257, Offset + Data length: 7544} 2025/09/12 02:05:13 server -> Sending packet 8 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 7544, Data length: 1257, Offset + Data length: 8801} 2025/09/12 02:05:13 server -> Sending packet 9 (1280 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 8801, Data length: 1257, Offset + Data length: 10058} 2025/09/12 02:05:13 server -> Sending packet 10 (205 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 10058, Data length: 182, Offset + Data length: 10240} 2025/09/12 02:05:13 server -> Sending packet 11 (23 bytes) for connection 38c426f76e78bee585fafaeef92ed3be11da1f, 1-RTT (ECN: Not-ECT) 2025/09/12 02:05:13 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:05:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 10240, Data length: 0, Offset + Data length: 10240} 2025/09/12 02:05:13 server <- Reading packet 1 (28 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 21.384ms} 2025/09/12 02:05:13 server newly acked packets (1): [0] 2025/09/12 02:05:13 server updated RTT: 33.16ms (σ: 9.439ms) 2025/09/12 02:05:13 server <- Reading packet 2 (1352 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.PingFrame{} 2025/09/12 02:05:13 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:05:13 server <- Reading packet 3 (30 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 16µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:05:13 server newly acked packets (2): [1 2] 2025/09/12 02:05:13 server updated RTT: 32.988ms (σ: 7.423ms) 2025/09/12 02:05:13 server ECN capability confirmed. 2025/09/12 02:05:13 server Ignoring all packets below 1. 2025/09/12 02:05:13 server <- Reading packet 4 (30 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 48µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:05:13 server newly acked packets (2): [3 4] 2025/09/12 02:05:13 server updated RTT: 33.088ms (σ: 5.767ms) 2025/09/12 02:05:13 server <- Reading packet 5 (30 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 32µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 02:05:13 server newly acked packets (2): [5 6] 2025/09/12 02:05:13 server updated RTT: 33.434ms (σ: 5.017ms) 2025/09/12 02:05:13 server <- Reading packet 6 (30 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, DelayTime: 16µs, ECT0: 8, ECT1: 0, CE: 0} 2025/09/12 02:05:13 server newly acked packets (2): [7 8] 2025/09/12 02:05:13 server updated RTT: 33.997ms (σ: 4.889ms) 2025/09/12 02:05:13 server <- Reading packet 7 (30 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, DelayTime: 24µs, ECT0: 10, ECT1: 0, CE: 0} 2025/09/12 02:05:13 server newly acked packets (2): [9 10] 2025/09/12 02:05:13 server updated RTT: 34.648ms (σ: 4.969ms) 2025/09/12 02:05:13 server <- Reading packet 8 (41 bytes) for connection 56d9b057, 1-RTT 2025/09/12 02:05:13 server Short Header{DestConnectionID: 56d9b057, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:05:13 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, DelayTime: 80µs, ECT0: 10, ECT1: 0, CE: 0} 2025/09/12 02:05:13 server newly acked packets (1): [11] 2025/09/12 02:05:13 server updated RTT: 35.203ms (σ: 4.838ms) 2025/09/12 02:05:13 server Canceling loss detection timer. 2025/09/12 02:05:13 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye!"} 2025/09/12 02:05:13 server Closing connection with error: Application error 0x0 (remote): kthxbye! 2025/09/12 02:05:13 Replacing connection for connection IDs [8c301ac1 a6bcbf17 6eb4c0c5 f14ab331 a67f3fa2 56d9b057 be403000] with a closed connection. 2025/09/12 02:05:13 Error accepting stream: Application error 0x0 (remote): kthxbye! 2025/09/12 02:05:13 server Connection 38c426f76e78bee585fafaeef92ed3be11da1f closed. 2025/09/12 02:05:13 Removing connection IDs [8c301ac1 a6bcbf17 6eb4c0c5 f14ab331 a67f3fa2 56d9b057 be403000] for a closed connection after it has been retired.